Category Archives: Full Disclosure

Full Disclosure

APPLE-SA-2017-04-03-1 iOS 10.3.1

Posted by Apple Product Security on Apr 03

APPLE-SA-2017-04-03-1 iOS 10.3.1

iOS 10.3.1 is now available and addresses the following:

Wi-Fi
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: Impact: An attacker within range may be able to execute
arbitrary code on the Wi-Fi chip
Description: A stack buffer overflow was addressed through improved
input validation.
CVE-2017-6975: Gal Beniamini of Google Project Zero

Installation…

Cross-site request forgery (CSRF) vulnerability in the D-Link (DIR 615 ) Wireless Router Firmware:20.09

Posted by pratik shah on Apr 03

*Title:*
====

D-Link DIR 615 HW: T1 FW:20.09 is vulnerable to Cross-Site Request Forgery
(CSRF) vulnerability

*Credit:*
======

Name: Pratik S. Shah

*Reference:*
=========

CVE Details: CVE-2017-7398.

*Date:*
====

1-04-2017

*Vendor:*
======

D-Link wireless router

*Product:*
=======

DIR-615

*Affected Version:*
=============

Hardware: T1 , Firmware: 20.09

*Abstract:*
=======

D-Link DIR 615 (HW: T1 FW:20.09) is vulnerable to Cross-Site…

CVE Request — mapr: information disclosure vulnerability

Posted by Mark Felder on Apr 03

Hello,

The mapr web frontend component creates an information disclosure
vulnerability. During the setup of mapr the configure.sh script calls a
function ConfigureWSRole:

function ConfigureWSRole() {
if [ $clientOnly -eq 0 -a $dontChangeSecurityPermissionsOn -eq 0 ];
then
ConfigureRunUserForWS
fi

This calls ConfigureRunUserForWS from configure-common.sh:

function ConfigureRunUserForWS() {
local val=`getent group shadow…

CVE-2017-7239: ninka license identification tool: insufficient escaping of external input [vs]

Posted by Dirk-Willem van Gulik on Apr 03

ninka license identification tool
insufficient escaping of external input

CVE-2017-7239 / CVSS 9.3
1.06

The ninka license identification tool does not properly escape
special characters in the files it encounters – such as the ‘&’.

In case of an alien code bases; or a code base that is brought in for
examination – a third party may doctor the file names as to cause
a…

SEC Consult SA-20170403-0 :: Misbehavior of PHP fsockopen function

Posted by SEC Consult Vulnerability Lab on Apr 03

SEC Consult Vulnerability Lab Security Advisory < 20170403-0 >
=======================================================================
title: Misbehavior of the “fsockopen” function
product: PHP
vulnerable version: 7.1.2
fixed version:
CVE number: CVE-2017-7272
impact: Medium
homepage: http://www.php.net/
found: 2017-03-06
by: Fikri…

Splunk Enterprise Information Theft – CVE-2017-5607

Posted by hyp3rlinx on Mar 30

[+] Credits: John Page AKA hyp3rlinx
[+] Website: hyp3rlinx.altervista.org
[+] Source:
http://hyp3rlinx.altervista.org/advisories/SPLUNK-ENTERPRISE-INFORMATION-THEFT.txt
[+] ISR: ApparitionSec

Vendor:
===============
www.splunk.com

Product:
==================
Splunk Enterprise

Splunk provides the leading platform for Operational Intelligence.
Customers use Splunk to search, monitor, analyze
and visualize machine data. Splunk Enterprise,…

APPLE-SA-2017-03-28-2 Additional information for APPLE-SA-2017-03-22-1 iTunes for Windows 12.6

Posted by Apple Product Security on Mar 29

APPLE-SA-2017-03-28-2 Additional information for
APPLE-SA-2017-03-22-1 iTunes for Windows 12.6

iTunes for Windows 12.6 addresses the following:

APNs Server
Available for: Windows 7 and later
Impact: An attacker in a privileged network position can track a
user’s activity
Description: A client certificate was sent in plaintext. This issue
was addressed through improved certificate handling.
CVE-2017-2383: Matthias Wachs and Quirin Scheitle…

APPLE-SA-2017-03-28-1 iCloud for Windows 6.2

Posted by Apple Product Security on Mar 29

APPLE-SA-2017-03-28-1 iCloud for Windows 6.2

iCloud for Windows 6.2 is now available and addresses the following:

APNs Server
Available for: Windows 7 and later
Impact: An attacker in a privileged network position can track a
user’s activity
Description: A client certificate was sent in plaintext. This issue
was addressed through improved certificate handling.
CVE-2017-2383: Matthias Wachs and Quirin Scheitle of Technical
University…