> 2014-06-03 16:16 GMT+02:00 Hector Marco :
>
> Hi everyone,
>
> Recently we discovered a bug in bash. After some time after reporting
> it to bash developers, it has not been fixed.
>
> We think that this is a security issue because in some circumstances
> the bash security feature could be bypass
On Thu, Jun 5, 2014 at 8:36 PM, Ivan .Heca wrote:
> http://www.dailymail.co.uk/news/article-2649452/Computer-hackers-face-life-prison-new-Government-crackdown-cyber-terrorism.html?ITO=1490&ns_mchannel=rss&ns_campaign=1490
>
I can see where this could be abused. Its a lot like the Computer
Fraud an
Per the security advisory:
"The attack can only be performed between a vulnerable client *and* server."
This would have produced quite a media nightmare if most browsers used
OpenSSL instead of NSS, etc.
Chrome for Android was affected and is patched in 35.0.1916.141.
Brandon Vincent
_
http://www.dailymail.co.uk/news/article-2649452/Computer-hackers-face-life-prison-new-Government-crackdown-cyber-terrorism.html?ITO=1490&ns_mchannel=rss&ns_campaign=1490
___
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/f
On 04/06/14 11:13, Jose Carlos Luna Duran wrote:
In my opinion the drop of privs in bash was mostly a "help" measure
for poorly written setuid programs executing system() calls. I don't
think is the role of bash to do this as the problem that could be
exploited by that would really be in the ori
Jose Carlos Luna Duran writes:
> In my opinion the drop of privs in bash was mostly a "help" measure
> for poorly written setuid programs executing system() calls. I don't
> think is the role of bash to do this ...
True, but it is a slight help and I'm in favour of keeping it.
> Correct me if I'
Advisory: PHPBTTracker+ 2.2 SQL Injection
Disclosure by: BackBox Team
Severity: High
I. INTRODUCTION
SQL Injection through User-Agent.
User agent is an HTTP header section provided by appliaction used by the
original clie
The latest available version of Scrumworks Pro does not perform proper
authorization checks when users attempt to change passwords via the Java
Web Start client.
If you capture the request the web start client makes when changing the
'administrator' user's password, and substitute the JSESSIONID c
Ladies and Gentlemen,
https://www.openssl.org/news/secadv_20140605.txt
There's an MITM in there, and a potential for buffer over-runs.
Patch up :-)
Jordan
--
Jordan R. Urie
UP Technology Consulting, Inc.
1129 - 177A St. SW
Edmonton, AB T6W 2A1
Phone: (780) 809-0932
www.uptech.ca
Advisory: Directory Traversal in DevExpress ASP.NET File Manager
During a penetration test RedTeam Pentesting discovered a directory
traversal vulnerability in DevExpress' ASP.NET File Manager and File
Upload. Attackers are able to read arbitrary files by specifying a
relative path.
Details
=
10 matches
Mail list logo