Re: Watch your Downloads: the risk of the "auto-download" feature on Microsoft Edge and Google Chrome

Posted by Curtis Lee Bolin on Oct 13

I didn’t mean that enterprise windows was different from other
editions with respect to security. I just meant that in an enterprise
environment, windows would most likely be attached to an active
directory and the user would login with active directory credentials.
So unless they had a local admin account (or unlocked one with chntpw)
and added their AD username to the Administrator group, they would
most likely have a limited account and…

Re: Watch your Downloads: the risk of the "auto-download" feature on Microsoft Edge and Google Chrome

Posted by lists on Oct 13

Hi Haifei,

FYI, something similar was presented in 2012:

http://blog.acrossecurity.com/2012/02/downloads-folder-binary-planting.html

Thanks,
Mitja

Behalf Of

feature

simple

the file will

finally got

talked

appropriate one,

but

started by

DLL with

webpage

hijacked.

Anyway,

when

years

when you

the

so the

sitting in

a

it

“Downloads”

Instead,

(see

Windows

2nd,

adobe.com

modified

browser

calc.exe,

it’s…

Mozilla extensions: a security nightmare (part 2)

Posted by Stefan Kanthak on Oct 13

Hi @ll,

Mozilla Firefox 38 (both standard and ESR) and newer installs and per
default activates Cisco’s OpenH264 video codec; see <about:plugins>

Firefox 33 to 37 downloaded this codec and installed it on demand; see
<http://blogs.cisco.com/collaboration/ciscos-openh264-now-part-of-firefox>

This extension comes as “Gecko media plugin”[*]; for Windows it is
implemented as DLL … and installed into the Firefox…

Vantage Point Security Advisory 2015-002

Posted by Lyon Yang on Oct 13

Vantage Point Security Advisory 2015-002
========================================

Title: Multiple Vulnerabilities found in ZHONE
Vendor: Zhone
Vendor URL: http://www.zhone.com
Device Model: ZHONE ZNID GPON 2426A
(24xx, 24xxA, 42xx, 42xxA, 26xx, and 28xx series models)
Versions affected: < S3.0.501
Severity: Low to medium
Vendor notified: Yes
Reported:
Public release:
Author: Lyon Yang <lyon[at]vantagepoint[dot]sg>…

IntelliSec Advisory – Multiple Vulnerabilities in Kerio Control Firewall

Posted by research on Oct 13

IntelliSec Security Advisory

==============================================================================================

Title: Multiple Vulnerabilities in Kerio Control (Virtual
Appliance)

Vulnerabilities: XSS, SQL Injection, Remote Code Execution through CSRF

Product: Kerio Control
Homepage: http://www.kerio.com
Affected Version: <= 8.6.1
Fixed Version: 8.6.2 (partially fixed)
Impact:…

Full Path Disclosure vulnerability in JM Twitter Cards reveals the location of the WordPress installation on the server (WordPress plugin)

Posted by dxw Security on Oct 13

Details
================
Software: JM Twitter Cards
Version: 6.0
Homepage: https://wordpress.org/plugins/jm-twitter-cards
Advisory report:
https://security.dxw.com/advisories/full-path-disclosure-vulnerability-in-jm-twitter-cards-reveals-the-location-of-the-wordpress-installation-on-the-server/
CVE: Awaiting assignment
CVSS: 5 (Medium; AV:N/AC:L/Au:N/C:P/I:N/A:N)

Description
================
Full Path Disclosure vulnerability in JM Twitter…

Vantage Point Security Advisory 2015-003

Posted by Lyon Yang on Oct 13

Vantage Point Security Advisory 2015-003
========================================

Title: Multiple Remote Code Execution found in ZHONE
Vendor: Zhone
Vendor URL: http://www.zhone.com
Device Model: ZHONE ZNID GPON 2426A
(24xx, 24xxA, 42xx, 42xxA, 26xx, and 28xx series models)
Versions affected: < S3.0.501
Severity: High
Vendor notified: Yes
Reported:
Public release:
Author: Lyon Yang <lyon[at]vantagepoint[dot]sg>…

JScript 5.7 (MSIE 8) RegExpBase::FBadHeader regular expression use-after-free

Posted by Berend-Jan Wever on Oct 13

Recompiling the regular expression pattern during a replace can cause
the code
to reuse a freed string, but only if the string is freed from the cache by
allocating and freeing a number of strings of certain size.

CVE-2015-2482:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2482
ZDI-15-515: http://www.zerodayinitiative.com/advisories/ZDI-15-515/
MS15-108: https://technet.microsoft.com/en-us/library/security/MS15-108

Repro:…

Buffer overflow in tiny-AES128-C

Posted by Pascal Cuoq on Oct 13

The library tiny-AES128-C, available from https://github.com/kokke/tiny-AES128-C , contains a buffer overflow in its
AES128_CBC_encrypt_buffer() function, where 15 bytes beyond the end of the input buffer can be overwritten. For
instance, if the function is invoked with an input buffer of length 33, the bytes at offsets 33…47 with respect to the
beginning of the input buffer will be overwritten. An attacker controlling either the key or the…

Ubuntu Security Notice USN-2767-1

Ubuntu Security Notice 2767-1 – Gustavo Grieco discovered that the GDK-PixBuf library did not properly handle scaling tga image files, leading to a heap overflow. If a user or automated system were tricked into opening a tga image file, a remote attacker could use this flaw to cause GDK-PixBuf to crash, resulting in a denial of service, or possibly execute arbitrary code. Gustavo Grieco discovered that the GDK-PixBuf library contained an integer overflow when handling certain GIF images. If a user or automated system were tricked into opening a GIF image file, a remote attacker could use this flaw to cause GDK-PixBuf to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.