Red Hat Security Advisory 2015-2369-01 – OpenHPI is an open source project created with the intent of providing an implementation of the SA Forum’s Hardware Platform Interface. HPI provides an abstracted interface to managing computer hardware, typically for chassis and rack based servers. HPI includes resource modeling, access to and control over sensor, control, watchdog, and inventory data associated with resources, abstracted System Event Log interfaces, hardware events and alerts, and a managed hotswap interface. It was found that the “/var/lib/openhpi” directory provided by OpenHPI used world-writeable and world-readable permissions. A local user could use this flaw to view, modify, and delete OpenHPI-related data, or even fill up the storage device hosting the /var/lib directory.
Monthly Archives: November 2015
Red Hat Security Advisory 2015-2393-01
Red Hat Security Advisory 2015-2393-01 – The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network. Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file.
SuperScan 4.1 Buffer Overflow
SuperScan version 4.1 suffers from multiple buffer overflow vulnerabilities. Three exploits included.
Red Hat Security Advisory 2015-2411-01
Red Hat Security Advisory 2015-2411-01 – The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel’s file system implementation handled rename operations in which the source was inside and the destination was outside of a bind mount. A privileged user inside a container could use this flaw to escape the bind mount and, potentially, escalate their privileges on the system. A race condition flaw was found in the way the Linux kernel’s IPC subsystem initialized certain fields in an IPC object structure that were later used for permission checking before inserting the object into a globally visible list. A local, unprivileged user could potentially use this flaw to elevate their privileges on the system.
Red Hat Security Advisory 2015-2290-01
Red Hat Security Advisory 2015-2290-01 – The pcs package provides a configuration tool for Corosync and Pacemaker. It permits users to easily view, modify and create Pacemaker based clusters. The pcs package includes Rack, which provides a minimal interface between webservers that support Ruby and Ruby frameworks. A flaw was found in a way Rack processed parameters of incoming requests. An attacker could use this flaw to send a crafted request that would cause an application using Rack to crash.
Red Hat Security Advisory 2015-2315-01
Red Hat Security Advisory 2015-2315-01 – NetworkManager is a system network service that manages network devices and connections. It was discovered that NetworkManager would set device MTUs based on MTU values received in IPv6 RAs, without sanity checking the MTU value first. A remote attacker could exploit this flaw to create a denial of service attack, by sending a specially crafted IPv6 RA packet to disturb IPv6 communication. A flaw was found in the way NetworkManager handled router advertisements. An unprivileged user on a local network could use IPv6 Neighbor Discovery ICMP to broadcast a non-route with a low hop limit, causing machines to lower the hop limit on existing IPv6 routes. If this limit is small enough, IPv6 packets would be dropped before reaching the final destination.
Red Hat Security Advisory 2015-2237-03
Red Hat Security Advisory 2015-2237-03 – The rest library was designed to make it easier to access web services that claim to be RESTful. A RESTful service should have URLs that represent remote objects, which methods can then be called on. It was found that the OAuth implementation in librest, a helper library for RESTful services, incorrectly truncated the pointer returned by the rest_proxy_call_get_url call. An attacker could use this flaw to crash an application using the librest library. All users of rest are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, all applications using librest must be restarted for the update to take effect.
Cambium ePMP 1000 – Multiple Vulnerabilities
Posted by Karn Ganeshen on Nov 19
*July 14, 2015: *First contacted Cambium
*July 14, 2015: *Initial vendor response
*July 16, 2015: *Vuln Details reported to Cambium
*July 31, 2015:* Followup on advisory and fix timelines
*August 03, 2015: *Vendor gives mid-Aug as fix (v2.5) release
timeline. Ceases communication.
*Nov 19, 2015: *Releasing vulnerability details & poc
*Versions affected*: < v2.5
…..
*CVE-IDs* – To be assigned.
…..
*Background *…
Qualsoft Systems – (AddNewsDetails.php) Auth ByPass Vulnerability
Posted by ZoRLu Bugrahan on Nov 19
#Title : Qualsoft Systems – (AddNewsDetails.php) Auth ByPass
Vulnerability
#Author : ZoRLu / zorlu () milw00rm com
#Blog : z.milw0rm.info
#Twitter : @milw00rm
#Test : Windows7 Ultimate
#Discovery : 19/11/15
#Publish : 19/11/15
#Thks : exploit-db.com, packetstormsecurity.com, securityfocus.com,
cxsecurity.com and others
#BkiAdam : B3mB4m, Dr.Ly0n, KnocKout, LifeSteaLeR…
[CFP] No Big Thing Conference #2 San Francisco, December 5 2015
Posted by Jonathan Brossard on Nov 19
Dear hackers, dear friends, dear community,
Please find below the Call For Paper for the NBT2 Conference.
The conference will happein in San Francisco on December 5 2015, at the
Salesforce Rincon Café (121 Spear Street, San Francisco, CA 94105).
Appology for the cross postings. Help us spread the word 🙂
As usual with great, small, non profit conferences, DIY and self
motivation is the rule. The party is the people : come play with us :)…