Libnsgif[1] is a decoding library for GIF images. It is primarily
developed and used as part of the NetSurf project.
As of version 0.1.2, libnsgif is vulnerable to a stack overflow
(CVE-2015-7505) and an out-of-bounds read (CVE-2015-7506) due to the way
LZW-compressed GIF data is processed.
Details
=======
src/libnsgif.c #80..133:
,—-
| /* Maximum LZW bits available
| */
| #define GIF_MAX_LZW 12
| […]
| static int…
A vulnerability in Grub2 (Back to 28) has been found. Versions from 1.98
(December, 2009) to 2.02 (December, 2015) are affected. The vulnerability can be
exploited under certain circumstances, allowing local attackers to bypass any
kind of authentication (plain or hashed passwords). And so, the attacker may
take control of the computer.
Positive Hack Days VI, the international forum on practical information security, opens Call For Papers
(http://www.phdays.com/call_for_papers/). Our international program comittee
(http://www.phdays.com/program/review-board/) consisting of very competent and experienced experts will consider every
application, whether from a novice or a recognized expert in information security, and select the best proposals.
This module enables you to add custom classes to blocks.
The module doesn’t sufficiently scrub class names written by a malicious block class administrator.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission “Administer block classes”.
CVE identifier(s) issued
A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
block_class 7.x-2.x versions prior to 7.x-2.2.
Drupal core is not affected. If you do not use the contributed Block Class module, there is nothing you need to do.
Solution
Install the latest version:
If you use the block_class module for Drupal 7.x, upgrade to block_class 7.x-2.2
The Buffer Overflow Protection (BOP) feature in McAfee VirusScan Enterprise before 8.8 Patch 6 allocates memory with Read, Write, Execute (RWX) permissions at predictable addresses on 32-bit platforms when protecting another application, which allows attackers to bypass the DEP and ASLR protection mechanisms via unspecified vectors.
AVG Internet Security 2015 allocates memory with Read, Write, Execute (RWX) permissions at predictable addresses when protecting user-mode processes, which allows attackers to bypass the DEP and ASLR protection mechanisms via unspecified vectors.