A remote code execution vulnerability has been reported in Adobe Flash Player. The vulnerability is due to a type confusion condition while handling a malformed SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file. Successful exploitation would allow an attacker to execute arbitrary code on the target.
Category Archives: Checkpoint
Checkpoint
Suspicious Metadata Mail Phishing Containing Attachment
Mail attachment containing a malicious downloader was observed as part of ransomware campaigns. A remote attacker could send spam e-mails including those downloaders and convince users to manually enable them. This would allow the malicious code to run and infect the target system.
Adobe Flash Player Security Bypass (APSB16-29: CVE-2016-4277; CVE-2016-4277)
A security bypass vulnerability exists in Adobe Flash Player. The vulnerability is due to insufficient security restrictions while handling specially crafted URL of a HTTP request to SWF file. Successful exploitation could lead to information disclosure.
Adobe Flash Player Memory Corruption (APSB16-29: CVE-2016-4276; CVE-2016-4276)
A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
Suspicious Microsoft Publisher Mail Attachment
Microsoft Office Publisher files might contain a malicious downloader. A remote attacker could send spam e-mails including those downloaders, and use social engineering in order to convince users to manually enable them. This would allow the malicious code to run and infect the target system.
MySQL Remote Root Code Execution (CVE-2016-6662)
A code execution vulnerability exists in MySQL database server. Successful exploitation could allow a remote attacker to shut down the database, modify its content, or execute arbitrary code on the affected servers.
Adobe Flash Player Memory Corruption (APSB16-29: CVE-2016-4281; CVE-2016-4281)
A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
Microsoft Windows Elevation of Privilege (MS16-111: CVE-2016-3306; CVE-2016-3306)
An elevation of privilege vulnerability exists in Microsoft Windows Server. The vulnerability is caused when Microsoft Windows fails to handle executable programs being ran by two users. A remote attacker can exploit this issue by enticing a victim to run a specially crafted file.
Linux Kernel x86-64 IA32SysCall Privilege Escalation (CVE-2010-3301)
An old vulnerability has been reintroduced in certain versions of the Linux Kernel that could be exploited by local unprivileged users to elevate their default system designated privileges to the higher kernel level privileges. The vulnerability is due to an error that kernel does not zero-extend x86_64 registers in the 32bit entry path on x86_64 platforms. An attacker could elevate their local privilege resulting in a privilege escalation.
Microsoft Office Memory Corruption (MS16-107: CVE-2016-3360; CVE-2016-3360)
A remote code execution vulnerability exists in Microsoft Office. The vulnerability is due to an error in the way Microsoft Office improperly handles objects in memory while parsing specially crafted files. A remote attacker can exploit this issue by enticing a victim to open a specially crafted file.