what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files from MU Dynamics

Email addresslabs at mudynamics.com
First Active2006-03-22
Last Active2012-03-21
MU Security Advisory 201202-01 / 201202-02
Posted Mar 21, 2012
Authored by MU Dynamics, M. Hall | Site labs.musecurity.com

Mu Dynamics has discovered vulnerabilities in GnuTLS and Libtasn1. The block cipher decryption logic in GnuTLS assumed that a record containing any data which was a multiple of the block size was valid for further decryption processing, leading to a heap corruption vulnerability. Various functions using the ASN.1 length decoding logic in Libtasn1 were incorrectly assuming that the return value from asn1_get_length_der is always less than the length of the enclosing ASN.1 structure, which is only true for valid structures and not for intentionally corrupt or otherwise buggy structures.

tags | advisory, vulnerability
SHA-256 | 5c22831c56b5d7f5cefb792251ddbea761d9ea8806a0c02c5e304b7b960abf12
MU Security Advisory 2009-08.01
Posted Aug 13, 2009
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

The Mu Dynamics Research team has found several vulnerabilities stemming from unsafe use of the sscanf C standard library function. Asterisk versions 1.6.1 through 1.6.1.2 are affected.

tags | advisory, vulnerability
SHA-256 | 4b4ca564af6eb635dec77a8869f1db6582e448ddc90620d17fb84789c0b6f227
MU Security Advisory 2008-09.01
Posted Sep 20, 2008
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

An IKE_SA_INIT message with a Key Exchange payload containing a large number of NULL values can cause a crash of the IKEv2 charon daemon. The problem is strongSwan dereferences a NULL pointer returned by the mpz_export() function of the GNU Multiprecision Library (GMP). strongSwan versions 4.2.6 and below are affected.

tags | advisory
SHA-256 | a3597b49066b341935ee93779ea9ca112ab0a8104c7b1a8d4db0e4628d8bde6a
MU Security Advisory 2008-07.01
Posted Jul 15, 2008
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

The Mu Security Research team has found that repro SIP proxy/registrar version 1.3.2 suffers from a remote denial of service vulnerability.

tags | advisory, remote, denial of service
SHA-256 | 91a6d43a2baf5a2b2ed067a279c38f21a6b845cf53483affa1bdf220b1303342
MU Security Advisory 2008-03.01
Posted Mar 19, 2008
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

The Mu Security Research team has found two security issues in the SDP parser in Asterisk 1.4.18. One is an invalid write to an attacker-controllable, almost arbitrary memory location and the other is a stack buffer overflow with limited attacker-controllable values.

tags | advisory, overflow, arbitrary
advisories | CVE-2008-1289
SHA-256 | 22b9f55626db7117f3ba9d0b616eac257212d9c93020ffbcecfcfa095604f614
MU Security Advisory 2008-02.01
Posted Feb 15, 2008
Authored by MU Dynamics, Adam Bozanich | Site labs.musecurity.com

MPlayer versions 1.0rc2 and below suffer from a remote stack overflow vulnerability.

tags | advisory, remote, overflow
SHA-256 | 1a59d6f531ad1e6263a34f3777c052f01a4db023ad45f6e63307d5f8ccdd1488
MU Security Advisory 2007-09.02
Posted Sep 19, 2007
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

There are multiple vulnerabilities where a maliciously-crafted packet can crash Dibbler version 0.6.0. These include packets with options with large lengths (memory allocation failure via integer overflow), invalid lengths (buffer overread), and malformed IA_NA options in a REBIND message (null pointer dereference).

tags | advisory, overflow, vulnerability
SHA-256 | f2b090fcf8285f4556684e70a8d80dc062ceda4f629aff5c30aed4839cb633a6
MU Security Advisory 2007-09.01
Posted Sep 13, 2007
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

Quagga bgpd version 0.99.8 suffers from a remote denial of service vulnerability.

tags | advisory, remote, denial of service
SHA-256 | a643fe7b20e97d462b4461df79f25858f310676b357a7736c5fd8f8217bcdf15
MU Security Advisory 2007-08.01
Posted Aug 25, 2007
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

A remote heap overflow condition in Real Helix's RTSP service could allow for arbitrary code execution. The vulnerable code is triggered with the use of an RTSP command with multiple 'Require' headers. Versions prior to 11.1.4 are affected.

tags | advisory, remote, overflow, arbitrary, code execution
SHA-256 | 99fbe1a74de2e483e58433d3eafc5f2697345d9fc0f9bf9de2e4664637001ed8
MU Security Advisory 2007-04.01
Posted Apr 24, 2007
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

An integer overflow vulnerability exists in the RPC runtime library (libinfo) that handles AUTH_UNIX authentication. By sending maliciously-crafted requests to the any RPC service (portmap, mount, nfs, etc), a remote attacker can trigger the overflow which may lead to arbitrary code execution as the 'daemon' user. Mac OS X versions 10.3.9 and 10.4.9 are affected.

tags | advisory, remote, overflow, arbitrary, code execution
systems | apple, osx
SHA-256 | 97e5e87dca373f256dac237d93184a10f3eab15b0ae01172cebbd02bfd5db45b
MU Security Advisory 2007-03.01
Posted Mar 9, 2007
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

Asterisk crashes when handed an otherwise valid request message but with no URI and no SIP-version in the request-line of the message. Asterisk versions 1.2.15 and 1.4.0, along with prior versions, are affected.

tags | advisory
SHA-256 | 4df0189ab0730598e7eef2261fe6960b91fbe72020bb219fd37a290679ce1e96
MU Security Advisory 2006-10.01
Posted Oct 20, 2006
Authored by MU Dynamics | Site labs.musecurity.com

Mu Security MU-200610-01: Denial of Service in XORP OSPFv2: OSPF carries link state information using Link State Advertisements. Each LSA contains a length field as well as a checksum. XORP performs a checksum verification when processing an LSA. During the checksum verification, the length field is used to calculate the payload. An invalid length field causes an out of bounds read, causing the OSPF daemon to crash.

tags | advisory, denial of service
SHA-256 | ba8f5f4a3cbb2887f475beee8d4367ae57c087c94175bdd0caae9389252befbd
MU Security Advisory 2006-09.01
Posted Oct 4, 2006
Authored by MU Dynamics | Site labs.musecurity.com

Mu Security Advisory: Multiple Pre-Authentication Vulnerabilities in MailEnable SMTP [MU-200609-01]

tags | advisory, vulnerability
SHA-256 | f16c24e6e5e0894662a9bc5a294d4f5854f06b80208788c3261aef62da2517b7
MU Security Advisory 2006-08.01
Posted Aug 27, 2006
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

A remote stack buffer overflow condition in Asterisk's MGCP implementation could allow for arbitrary code execution. The vulnerable code is triggered with the use of a malformed AUEP (audit endpoint) response message. A second issue exists in the handling of file names sent to the Record() application which could lead to arbitrary code execution via a format string attack or arbitrary file-overwrite via directory traversal techniques. The impact of this vulnerability is minimal, however, as it requires an administrator to use a client-controlled variable as part of the filename. Asterisk versions 1.0.0 through 1.2.10 are affected.

tags | advisory, remote, overflow, arbitrary, code execution
SHA-256 | dbdc141ab5d77885c8dca0d5658fe534d27d30e676035e308e313dba03713a10
MU Security Advisory 2006-06.02
Posted Jun 29, 2006
Authored by MU Dynamics | Site labs.musecurity.com

Apple Open Directory Pre-Authentication Denial of Service: A denial of service condition exists in slapd (OpenLDAP-2.2.19) during the anonymous bind operation. By sending a malformed ldap-bind message, the slapd server can be forced to abort

tags | advisory, denial of service
systems | apple
SHA-256 | d9553f5df18483b93dbebdc0884e1242dbb918c1e00d9668340b5b3a8f0e9f9e
MU Security Advisory 2006-06.01
Posted Jun 27, 2006
Authored by MU Dynamics | Site labs.musecurity.com

A remote buffer overflow condition in Real Helix's RTSP service could allow for arbitrary code execution. The vulnerable code is triggered with the use of a malformed HTTP header. A second vulnerability of equal criticality was also discovered. This bug involved the parsing of HTTP URLs. Affected versions include Real Networks Helix DNA Server 11.0.x and Real Networks Helix DNA Server 10.0.x.

tags | advisory, remote, web, overflow, arbitrary, code execution
SHA-256 | 4022b34c3349145110e125c8bc13def3346578012e5faac7c27a6d60fc1afa73
MU Security Advisory 2006-05.02
Posted May 21, 2006
Authored by MU Dynamics | Site labs.musecurity.com

MU-200605-02 - A remote buffer overflow condition in Apple's RTSP service could allow for arbitrary code execution. The vulnerable code is triggered with the use of a malformed RTSP header. QuickTime Streaming Server versions 5.5 and below are affected.

tags | advisory, remote, overflow, arbitrary, code execution
systems | apple
SHA-256 | 193c81cd2ec447f58781bf500a1dcd68539eacc3a38e3fe8c308fb7fd356f9a2
MU Security Advisory 2006-04.01
Posted Apr 12, 2006
Authored by MU Dynamics | Site labs.musecurity.com

MU-200604-01: Cyrus SASL DIGEST-MD5 Pre-Authentication Denial of Service - A denial of service condition exists in the SASL authentication library during DIGEST-MD5 negotiation. This potentially affects multiple products that use SASL DIGEST-MD5 authentication including OpenLDAP, Sendmail, Postfix, Apple, etc.

tags | advisory, denial of service
systems | apple
SHA-256 | 3a2e74c99b10fb7186b0276d863f1e37f31bf044add47a6bcf9ace11369bed1e
MU Security Advisory 2006-03.01
Posted Mar 22, 2006
Authored by MU Dynamics | Site labs.musecurity.com

MailEnable POP3 Pre-Authentication Buffer Overflow [MU-200603-01] - A remote buffer overflow condition in MailEnable's POP3 service could allow for arbitrary code execution. The vulnerable code can be exercised remotely without authentication.

tags | advisory, remote, overflow, arbitrary, code execution
SHA-256 | 13622f86f57e20faad4fea32d02d1fe528d85b0c0a4897015d09a293505ad909
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close