Security Advisories & Alerts

CVE-2016-0099: Microsoft Windows 7 < 10 / Server 2008 < 2012 R2 (x86/x64) - Privilege Escalation (MS16-032)

CVE-2016-0099: The Secondary Logon Service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold and 1511 does not properly process request handles, which allows local users to gain privileges via a crafted application, aka “Secondary Logon Elevation of Privilege Vulnerability.” Mitigation: Microsoft has released patches...

Read More


CVE-2016-5195: Linux Kernel 2.6.22 < 3.9 (x86/x64) - 'Dirty COW' Privilege Escalation Linux exploit

CVE-2016-5195: Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka “Dirty COW.” Mitigation: Updates are available. Please check vendor advisory for more information. Reference URL’s: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195 https://dirtycow.ninja/ https://access.redhat.com/security/cve/cve-2016-5195 https://access.redhat.com/security/vulnerabilities/DirtyCow https://security-tracker.debian.org/tracker/CVE-2016-5195


MS15-051: Vulnerabilities in Windows kernel-mode drivers could allow Elevation of Privilege

The more severe of these vulnerabilities could allow elevation of privilege if an attacker logs on locally and runs arbitrary code in kernel mode. An attacker could then install programs, view, change or delete data or create new accounts with full user rights. Mitigation: Microsoft has released patches for Windows Platform. Reference URL’s: http://www.cvedetails.com/cve/cve-2015-1676 http://www.cvedetails.com/cve/cve-2015-1677 http://www.cvedetails.com/cve/cve-2015-1678 http://www.cvedetails.com/cve/cve-2015-1679 http://www.cvedetails.com/cve/cve-2015-1680 http://www.cvedetails.com/cve/cve-2015-1701 https://technet.microsoft.com/library/security/MS15-051 https://support.microsoft.com/en-us/help/3057191/ms15-051-vulnerabilities-in-windows-kernel-mode-drivers-could-allow-information-disclosure-may-12,-2015


CVE-2017-6074: Linux local root exploit

New CVE-2017-6074 Linux local root exploit was published. CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call. Mitigation: Recent versions of the SELinux policy can mitigate this flaw....

Read More


CVE-2017-3135: denial-of-service vulnerability in ISC BIND 9

ISC announced CVE-2017-3135, a denial-of-service vulnerability that can affect resolvers using both DNS64 and RPZ to rewrite responses for the same view. This affects all BIND 9.9 releases since 9.9.3, all BIND 9.10 releases, and all BIND 9.11 releases, including the 9.9.10b1, 9.10.5b1, and 9.11.1b1 releases. Mitigation: Upgrade to the patched release most closely related to your current version of BIND.  These can all be...

Read More


Page 131 of 132« First...102030...128129130131132