A buffer overflow vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
Monthly Archives: December 2016
Adobe Flash Player Buffer Overflow (APSB16-39: CVE-2016-7869; CVE-2016-7869)
A buffer overflow vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
freeipa-4.3.2-3.fc24
– Fixes 1395311 – CVE-2016-9575 ipa: Insufficient permission check in certprofile-mod
– Fixes 1370493 – CVE-2016-7030 ipa: DoS attack against kerberized services
by abusing password policy
FlightGear-2016.3.1-3.fc25
This update fixes a security problem, where the route manager can potentially overwrite arbitrary files.
https://sourceforge.net/p/flightgear/flightgear/ci/280cd523686fbdb175d50417266d2487a8ce67d2
FlightGear-3.4.0-9.fc23
This update fixes a security problem, where the route manager can potentially overwrite arbitrary files.
https://sourceforge.net/p/flightgear/flightgear/ci/280cd523686fbdb175d50417266d2487a8ce67d2
FlightGear-2016.1.2-5.fc24
This update fixes a security problem, where the route manager can potentially overwrite arbitrary files.
https://sourceforge.net/p/flightgear/flightgear/ci/280cd523686fbdb175d50417266d2487a8ce67d2
freeipa-4.4.2-2.fc25
– Fixes 1395311 – CVE-2016-9575 ipa: Insufficient permission check in certprofile-mod
– Fixes 1370493 – CVE-2016-7030 ipa: DoS attack against kerberized services
by abusing password policy
Ashley Madison Dating Site Agrees to Pay $1.6 Million Fine Over Massive Breach
Ashley Madison, an American most prominent dating website that helps married people cheat on their spouses has been hacked, has agreed to pay a hefty fine of $1.6 Million for failing to protect account information of 36 Million users, after a massive data breach last year.
Yes, the parent company of Ashley Madison, Ruby Corp. will pay $1.6 Million to settle charges from both Federal Trade
![]()
CVE-2015-8542
An issue was discovered in Open-Xchange Guard before 2.2.0-rev8. The “getprivkeybyid” API call is used to download a PGP Private Key for a specific user after providing authentication credentials. Clients provide the “id” and “cid” parameter to specify the current user by its user- and context-ID. The “auth” parameter contains a hashed password string which gets created by the client by asking the user to enter his or her OX Guard password. This parameter is used as single point of authentication when accessing PGP Private Keys. In case a user has set the same password as another user, it is possible to download another user’s PGP Private Key by iterating the “id” and “cid” parameters. This kind of attack would also be able by brute-forcing login credentials, but since the “id” and “cid” parameters are sequential they are much easier to predict than a user’s login name. At the same time, there are some obvious insecure standard passwords that are widely used. A attacker could send the hashed representation of typically weak passwords and randomly fetch Private Key of matching accounts. The attack can be executed by both internal users and “guests” which use the external mail reader.
CVE-2016-2840
An issue was discovered in Open-Xchange Server 6 / OX AppSuite before 7.8.0-rev26. The “session” parameter for file-download requests can be used to inject script code that gets reflected through the subsequent status page. Malicious script code can be executed within a trusted domain’s context. While no OX App Suite specific data can be manipulated, the vulnerability can be exploited without being authenticated and therefore used for social engineering attacks, stealing cookies or redirecting from trustworthy to malicious hosts.
