Cisco Security Advisory – A vulnerability in the Common Internet File System (CIFS) optimization feature of the Cisco Wide Area Application Service (WAAS) device could allow an unauthenticated, remote attacker to perform a resource consumption attack which, could result in a complete denial of service (DoS) condition. The vulnerability is due to insufficient flow handling of incoming CIFS traffic. An attacker could exploit this vulnerability by sending malicious traffic designed to trigger the vulnerability. An exploit could allow the attacker to cause a DoS condition by exhausting system buffering resources, resulting in a reload of the affected device.
Monthly Archives: January 2016
Cisco Security Advisory 20160127-rv220
Cisco Security Advisory – A vulnerability in the web-based management interface of Cisco RV220W Wireless Network Security Firewall devices could allow an unauthenticated, remote attacker to bypass authentication and gain administrative privileges on a targeted device. The vulnerability is due to insufficient input validation of HTTP request headers that are sent to the web-based management interface of an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted HTTP request that contains malicious SQL statements to the management interface of a targeted device. Depending on whether remote management is configured for the device, the management interface may use the SQL code in the HTTP request header to determine user privileges for the device. A successful exploit could allow the attacker to bypass authentication on the management interface and gain administrative privileges on the device. Cisco released a firmware update that addresses this vulnerability. There are workarounds that mitigate this vulnerability.
Ubuntu Security Notice USN-2882-1
Ubuntu Security Notice 2882-1 – Isaac Boukris discovered that curl could incorrectly re-use NTLM proxy credentials when subsequently connecting to the same host.
Debian Security Advisory 3457-1
Debian Linux Security Advisory 3457-1 – Multiple security issues have been found in Iceweasel, Debian’s version buffer overflow may lead to the execution of arbitrary code. In addition the bundled NSS crypto library addresses the SLOTH attack on TLS 1.2.
Debian Security Advisory 3458-1
Debian Linux Security Advisory 3458-1 – Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in breakouts of the Java sandbox, information disclosure, denial of service and insecure cryptography.
Red Hat Security Advisory 2016-0078-01
Red Hat Security Advisory 2016-0078-01 – The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND followed DNS delegations. A remote attacker could use a specially crafted zone containing a large number of referrals which, when looked up and processed, would cause named to use excessive amounts of memory or crash.
Log2Space Central 6.2 Cross Site Scripting
Log2Space Central version 6.2 suffers from multiple reflective cross site scripting vulnerabilities.
Getting A Reverse Shell On Your Seagate Personal NAS
Wendy’s launches investigation into possible data breach
The fast food chain Wendy’s may have been the victim of a data breach, the security expert Brian Krebs has revealed. Unusual activity has been reported.
The post Wendy’s launches investigation into possible data breach appeared first on We Live Security.
![]()
Suricata IDPE 3.0
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It’s capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.