#146416 Ruby:HTTP Header injection in 'net/http'

Posted by redrain root on Jun 24

TIMELINE
rootredrain submitted a report to Ruby.

show raw
Jun 22nd

Hi,

I would like to report a HTTP Header injection vulnerability in
‘net/http’ that allows attackers to inject arbitrary headers in
request even create a new evil request.

PoC

require ‘net/http’
http = Net::HTTP.new(‘192.168.30.214′,’80’)
res = http.get(“/r.php HTTP/1.1rnx-injection: memeda”)

Example

Server Code:…

libical 0.47 SEGV on unknown address

Posted by Brandon Perry on Jun 24

Hello lists

Attached is a test case for causing a crash in libical 0.47 (shipped with Thunderbird) and this was also tested against
1.0 (various versions shipped with various email clients).

=================================================================
==24662==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x0000004fbb80 bp 0x7ffd68d966f0 sp
0x7ffd68d96520 T0)
#0 0x4fbb7f in icalproperty_new_clone…

[ERPSCAN-16-018] SAP Application server for Javat – DoS vulnerability

Posted by ERPScan inc on Jun 24

Application: SAP NetWeaver AS JAVA

Versions Affected: SAP Application server for Java 7.2 – 7.4

Vendor URL: http://SAP.com

Bugs: denial of service

Sent: 04.12.2015

Reported: 05.12.2015

Vendor response: 05.12.2015

Date of Public Advisory: 14.03.2016

Reference: SAP Security Note 2259547

Author: Dmitry Yudin (ERPScan) @ret5et

Description

1. ADVISORY INFORMATION

Title: SAP Application server for Java – DoS vulnerability

Advisory…

Faraday v1.0.21 with our new GTK interface!

Posted by Francisco Amato on Jun 24

Faraday is the Integrated Multiuser Risk Environment you were looking
for! It maps and leverages all the knowledge you generate in real
time, letting you track and understand your audits. Our dashboard for
CISOs and managers uncovers the impact and risk being assessed by the
audit in real-time without the need for a single email. Developed with
a specialized set of functionalities that help users improve their own
work, the main purpose is to…

[ERPSCAN-16-017] SAP JAVA AS icman – DoS vulnerability

Posted by ERPScan inc on Jun 24

Application: SAP NetWeaver AS JAVA

Versions Affected: SAP NetWeaver AS JAVA 7.2 – 7.4

Vendor URL: http://SAP.com

Bugs: denial of service

Sent: 04.12.2015

Reported: 05.12.2015

Vendor response: 05.12.2015

Date of Public Advisory: 14.03.2016

Reference: SAP Security Note 2256185

Author: Dmitry Yudin (ERPScan) @ret5et

Description

1. ADVISORY INFORMATION

Title: SAP JAVA AS icman – DoS vulnerability

Advisory ID:…

CVE-2016-4519

Stack-based buffer overflow in Unitronics VisiLogic OPLC IDE before 9.8.30 allows remote attackers to execute arbitrary code via a crafted filename field in a ZIP archive in a vlp file.

CVE-2016-4525

Unspecified ActiveX controls in Advantech WebAccess before 8.1_20160519 allow remote authenticated users to obtain sensitive information or modify data via unknown vectors, related to the INTERFACESAFE_FOR_UNTRUSTED_CALLER (aka safe for scripting) flag.

IRS Announces Safeguards to Protect Taxpayer Information

Original release date: June 24, 2016

The Internal Revenue Service (IRS) has issued two news releases addressing new safeguards to protect taxpayers and strengthen authentication requirements. The electronic filing (e-File) PIN, an alternative signature verification tool used to assist with electronic tax filing, will no longer be available after suspicious activity was recently detected. Additionally, new requirements are in place to enhance validation for participants using the Income Verification Express Service (IVES), a service used to verify loan applicants’ incomes.

US-CERT encourages users and administrators to review the IRS news releases e-File PIN and Steps to Strengthen IVES Program for details and refer to US-CERT Security Tip ST04-013 for information on protecting your privacy.


This product is provided subject to this Notification and this Privacy & Use policy.