Security Advisories & Alerts


The Stack Clash – Linux root privilege escalation vulnerability

Description: The flaw was discovered last month by security researchers from Qualys, who worked with various vendors to make sure patches are available before going public with their findings. According to Qualys researchers, the issue affects a host of *NIX systems, such as Linux, OpenBSD, NetBSD, FreeBSD, and Solaris. Researchers only tested Stack Clash on the i386 and amd64 platforms, and they don’t exclude that...

Read More


Wireshark ‘dissectors/asn1/ros/packet-ros-template.c’ Denial of Service Vulnerability

Description: In Wireshark 2.2.0 to 2.2.6, the ROS dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/asn1/ros/packet-ros-template.c by validating an OID. Impact: Attackers can exploit this issue to crash the affected application, resulting in denial-of-service conditions. Mitigation: Upgrade to Wireshark 2.2.7 or later. Reference URL’s: http://www.securityfocus.com/bid/98800/info http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9347 https://www.wireshark.org/security/wnpa-sec-2017-31.html


Mozilla Network Security Services CVE-2017-5461 Memory Corruption Vulnerability

Description: Mozilla Network Security Services (NSS) before 3.21.4, 3.22.x through 3.28.x before 3.28.4, 3.29.x before 3.29.5, and 3.30.x before 3.30.1 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by leveraging incorrect base64 operations. Impact: An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit...

Read More


Multiple Asterisk Products Denial of Service Vulnerability: CVE-2017-9359

Description: The multi-part body parser in PJSIP, as used in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1, Certified Asterisk 13.13 before 13.13-cert4, and other products, allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet. Impact: Attackers can exploit this issue to crash the affected application, resulting in a denial-of-service condition. Mitigation: Updates are...

Read More


Oracle Solaris CVE-2017-3622 Local Privilege Escalation Vulnerability

Description: Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Common Desktop Environment (CDE)). The supported version that is affected is 10. Easily “exploitable” vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in takeover of Solaris. Impact: A local attacker may exploit this issue to gain elevated...

Read More


Oracle Solaris CVE-2017-3623 Remote Code Execution Vulnerability

Description: Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel RPC). Easily “exploitable” vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Solaris. While the vulnerability is in Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Solaris. Impact: An attacker can exploit this issue to execute arbitrary code within...

Read More


Linux Sudo ‘/src/ttyname.c’ Local Privilege Escalation Vulnerability (CVE-2017-1000367)

Description: When determining tty, Sudo does not correctly parse the contents of /proc/[pid]/ stat, local attackers may use this method to overwrite any file on the file system, bypassing expected permissions or getting the root shell. Impact: Local attackers could exploit this issue to run arbitrary commands with root privileges. Sudo versions 1.8.6p7 through 1.8.20 are vulnerable. Mitigation: Updates are available. Please see the references...

Read More


FreeRADIUS TLS CVE-2017-9148 Authentication Bypass Vulnerability

Description: The TLS session cache in FreeRADIUS before 3.0.14 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS. Impact:  An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may lead to further attacks. FreeRADIUS versions prior to 3.0.14 are vulnerable. Mitigation: Updates...

Read More


Linux Kernel CVE-2017-6214 Remote Denial of Service Vulnerability

Description: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag. Impact:  Attackers can exploit this issue to cause the kernel to enter into an infinite loop which may cause denial-of-service conditions. Mitigation: Updates are available. Please see the references...

Read More


Juniper Junos Space CVE-2017-2305 Remote Privilege Escalation Vulnerability

Description: On Juniper Networks EX Series Ethernet Switch, running affected Junos OS versions, has been discovered with a vulnerability in IPv6 processing that may allow a specially crafted IPv6 Neighbor Discovery (ND) packet destined to an EX Series Ethernet Switch to cause a slow memory leak. A malicious network-based packet flood of these crafted IPv6 NDP packets may eventually lead to resource exhaustion and a...

Read More


Page 60 of 65« First...102030...5859606162...Last »