what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 33 of 33 RSS Feed

Files Date: 2008-02-27 to 2008-02-28

Gentoo Linux Security Advisory 200802-12
Posted Feb 27, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200802-12 - Damian Frizza and Alfredo Ortega (Core Security Technologies) discovered a stack-based buffer overflow within the open_flac_file() function in the file demux_flac.c when parsing tags within a FLAC file (CVE-2008-0486). A buffer overflow when parsing ASF headers, which is similar to CVE-2006-1664, has also been discovered. Versions less than 1.1.10.1 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2006-1664, CVE-2008-0486
SHA-256 | 0cacd54cfae9fb2047f86db8000a63689e32a991f03a64e0f671e6df2ba0a24d
Mandriva Linux Security Advisory 2008-051
Posted Feb 27, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A flaw was found in how CUPS handled the addition and removal of remote printers via IPP that could allow a remote attacker to send a malicious IPP packet to the UDP port causing CUPS to crash.

tags | advisory, remote, udp
systems | linux, mandriva
advisories | CVE-2008-0886
SHA-256 | 12147b573472bdc8bd17888a443b482c258f574cbe5f9670b1dc12fc05b1a2f6
Mandriva Linux Security Advisory 2008-050
Posted Feb 27, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Dave Camp at Critical Path Software discovered a buffer overflow in CUPS 1.1.23 and earlier could allow local admin users to execute arbitrary code via a crafted URI to the CUPS service. The Red Hat Security Team also found two flaws in CUPS 1.1.x where a malicious user on the local subnet could send a set of carefully crafted IPP packets to the UDP port in such a way as to cause CUPS to crash or consume memory and lead to a CUPS crash. Finally, another flaw was found in how CUPS handled the addition and removal of remote printers via IPP that could allow a remote attacker to send a malicious IPP packet to the UDP port causing CUPS to crash.

tags | advisory, remote, overflow, arbitrary, local, udp
systems | linux, redhat, mandriva
advisories | CVE-2007-5848, CVE-2008-0596, CVE-2008-0597, CVE-2008-0886
SHA-256 | a649ed2550f2724a2be3856c2b5d7185726ab19f41cbc7efcef59a823da612a9
Secunia Security Advisory 29084
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with unknown impact has been reported in H-Sphere SiteStudio.

tags | advisory
SHA-256 | 51335d5dee14e938d980f918dde6572a91e991b86de2c2eaa53cc84897e99b19
Secunia Security Advisory 29095
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for dnssec-tools. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
SHA-256 | 7bdf78115ff32261ef8ba001bde2c8bd78c5e38bc291463c17117e9d99febe6e
Secunia Security Advisory 29120
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | ba709b34dd0e4f7cee4a940c5e29a0001f27c2a02c77ca01dfb11c8fe47b7300
Secunia Security Advisory 29127
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in DNSSEC-Tools, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 36909bc04dbc01f24032fbb9d5f0639b1087630ed57abd4c4e9b4f5e7ee6a121
DumpRam.c
Posted Feb 27, 2008
Authored by WarGame

A simple tool for Linux that allows the dumping of all physical memory (RAM).

systems | linux
SHA-256 | 8940b92686ddb42ffeb087be201962d17d9c9304b3048caabf25ba699a58da90
Page 2 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close