Category Archives: Checkpoint

Checkpoint

SQL Servers SQL Injection Obfuscation Techniques

Attackers may use SQL injection techniques in order to execute SQL commands on SQL servers. To avoid detection by security devices, such attackers might use various obfuscation techniques to conceal their actions. Successful exploitation could allow an attacker to disclose confidential information, modify or shut down the database, or execute arbitrary code on affected servers.

OpenSSL SSL_peek Infinite Loop Denial of Service (CVE-2016-6305)

A denial-of-service vulnerability exists in OpenSSL. The vulnerability is due to an error in SSL_peek() API that causes an infinite loop to occur when processing empty records. A remote, unauthenticated attacker can exploit this vulnerability by supplying an empty record during an SSL connection. Successful exploitation will cause the server application to use up 100% of its CPU resources, resulting in a denial-of-service condition.

Alienvault Unified Security Management and OSSIM gauge.php SQL Injection (CVE-2016-8582)

An SQL injection vulnerability exists in Alienvault Unified Security Management and OSSIM. The vulnerability is due to a lack of input validation on a component of the dashboard widgets. A remote, authenticated user can exploit this vulnerability by sending a crafted HTTP request to the affected page. Successful exploitation could result in information disclosure from the database.

ShadowGate Redirector

ShadowGate is an initial redirection point for exploit kits. Exploit Kits operate by delivering a malicious payload to the victim’s computer. Successful exploitation could result in remote code execution on the target system once the malicious page is loaded.

Adobe ColdFusion OOXML XXE Information Disclosure (CVE-2016-4264)

An XML external entity (XXE) processing vulnerability has been reported in the Office Open XML (OOXML) parsing component of Adobe ColdFusion. The vulnerability is due to a lack of validation on user-supplied input when parsing OOXML documents. A remote attacker could exploit this vulnerability by uploading a maliciously crafted OOXML document to the target server. Successful exploitation could allow the attacker to read arbitrary files from the target server.