Microsoft Office 2010 running under Windows 7 x86 with Application Verifier enabled suffers from a heap out-of-bounds access issue that leads to a memory corruption condition.
Monthly Archives: February 2017
AIEngine 1.7.0
AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.
Microsoft Office 2010 MSO!Ordinal5429 Heap Corruption
Microsoft Office 2010 running under Windows 7 x86 with Application Verifier enabled suffers from a heap corruption issue due to a missing length check.
Elefant CMS 1.3.12-RC Code Execution
Elefant CMS version 1.3.12-RC suffers from remote code execution vulnerabilities.
Plone 5.0.5 Cross Site Scripting
Plone version 5.0.5 suffers from a cross site scripting vulnerability.
Microsoft SQL Server Clr Stored Procedure Payload Execution
This Metasploit module executes an arbitrary native payload on a Microsoft SQL server by loading a custom SQL CLR Assembly into the target SQL installation, and calling it directly with a base64-encoded payload. The module requires working credentials in order to connect directly to the MSSQL Server. This method requires the user to have sufficient privileges to install a custom SQL CRL DLL, and invoke the custom stored procedure that comes with it. This exploit does not leave any binaries on disk. Tested on MS SQL Server versions: 2005, 2012, 2016 (all x64).
RSA – day 3: Security for those who don’t know what that means
Here at RSA, an increasing amount of security purchases are made by those who got the task dumped in their laps, but who have little or no formal or practical training.
The post RSA – day 3: Security for those who don’t know what that means appeared first on WeLiveSecurity
![]()
Bugtraq: [SECURITY] [DSA 3790-1] spice security update
[SECURITY] [DSA 3790-1] spice security update
NetBSD-SA2017-002 Several vulnerabilities in ARP
USN-3199-2: Python Crypto regression
Ubuntu Security Notice USN-3199-2
17th February, 2017
Python Crypto regression
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary
USN-3199-1 introduced a regression in the Python Cryptography Toolkit which
caused programs which relied on the original behavior to fail.
Software description
- python-crypto
– cryptographic algorithms and protocols for Python
Details
USN-3199-1 fixed a vulnerability in the Python Cryptography Toolkit.
Unfortunately, various programs depended on the original behavior of the Python
Cryptography Toolkit which was altered when fixing the vulnerability. This
update retains the fix for the vulnerability but issues a warning rather than
throwing an exception. Code which produces this warning should be updated
because future versions of the Python Cryptography Toolkit re-introduce the
exception.
We apologize for the inconvenience.
Original advisory details:
It was discovered that the ALGnew function in block_template.c in the Python
Cryptography Toolkit contained a heap-based buffer overflow vulnerability.
A remote attacker could use this flaw to execute arbitrary code by using
a crafted initialization vector parameter.
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 16.10:
-
python3-crypto
2.6.1-6ubuntu0.16.10.3
-
python-crypto
2.6.1-6ubuntu0.16.10.3
- Ubuntu 16.04 LTS:
-
python3-crypto
2.6.1-6ubuntu0.16.04.2
-
python-crypto
2.6.1-6ubuntu0.16.04.2
- Ubuntu 14.04 LTS:
-
python3-crypto
2.6.1-4ubuntu0.2
-
python-crypto
2.6.1-4ubuntu0.2
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.