A out-of-bounds array indexing vulnerability exists in ImageMagick. The vulnerability is due to improper handling of certain objects in memory. Successful exploitation could result in arbitrary code execution.
Category Archives: Checkpoint
Checkpoint
Adobe Acrobat and Reader Memory Corruption (APSB17-01: CVE-2017-2939)
A memory corruption vulnerability has been reported in Adobe Reader and Acrobat. The vulnerability is due to an error in Adobe Reader and Acrobat while parsing a file with malformed cross-reference table. A remote attacker may exploit this vulnerability by enticing a target user to open a specially crafted file.
Web Servers Malicious Upload Directory Traversal
A directory traversal vulnerability exists in web servers. The vulnerability allows unauthorized users to upload malicious files to the server. A remote attacker can exploit this vulnerability by uploading an arbitrary, executable file and executing it under the context of SYSTEM.
FreePBX Framework hotelwakeup Module Directory Traversal
A directory traversal vulnerability exists in FreePBX. The vulnerability is due to an input validation issue in the “hotelwakeup” module. A remote unauthenticated attacker can exploit this vulnerability by sending maliciously crafted requests to the page that could lead to arbitrary command execution on the server under the security context of the asterisk user.
Network Time Protocol Windows Daemon getEndptFromIoCtx Denial of Service (CVE-2016-9312)
A denial of service vulnerability has been reported in the Windows port of Network Time Foundation’s NTP Daemon. The vulnerability is due to insufficient error handling when receiving large UDP packets. A remote, unauthenticated attacker can exploit this vulnerability by sending a large UDP packet to the target server.
SSL TLS_FALLBACK_SCSV Cipher Suite
This protection detects ssl client requests including TLS_FALLBACK_SCSV cipher suite.
Vim modelines Remote Command Execution (CVE-2016-1248)
A remote code execution vulnerability exists in the modeline component of Vim due to insufficient input validation when parsing the filetype, syntax, and keymap options in modelines. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to open a file containing a malicious modeline in Vim. Successful exploitation can result in arbitrary command execution in the context of the current user.
Adobe Flash Player Heap Overflow (APSB17-02: CVE-2017-2934)
A Heap Overflow vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted file.
Adobe Flash Player Heap Overflow (APSB17-02: CVE-2017-2933)
A heap overflow vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted ATF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted ATF file.
Adobe Flash Player Heap Overflow (APSB17-02: CVE-2017-2935)
A Heap Overflow vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted file.