|
Prev week |
Colapse all |
Post message
Firefox 3.6.13 pseudo-URL SOP check bug (CVE-2010-3774) 2010-12-09 Michal Zalewski (lcamtuf coredump cx) XSS vulnerability in Diferior 2010-12-09 advisory htbridge ch Vulnerability ID: HTB22720 Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_diferior.html Product: Diferior Vendor: Povilas Musteikis ( http://www.diferior.com/ ) Vulnerable Version: 8.03 and probably prior versions Vendor Notification: 25 November 2010 Vulnerability Type: Stored XS [ more ] [ reply ] www.eVuln.com : Non-persistent XSS in WWWThreads (perl version) 2010-12-09 bt evuln com www.eVuln.com advisory: Non-persistent XSS in WWWThreads (perl version) Summary: http://evuln.com/vulns/157/summary.html Details: http://evuln.com/vulns/157/description.html -----------Summary----------- eVuln ID: EV0157 Software: n/a Vendor: WWWThreads Version: v5.0.8 Pro (perl version) [ more ] [ reply ] Re: [Full-disclosure] Linux kernel exploit 2010-12-08 niklas|brueckenschlaeger (niklas brueckenschlaeger de) RE: [Full-disclosure] Linux kernel exploit 2010-12-08 John Jacobs (flamdugen hotmail com) > I've included here a proof-of-concept local privilege escalation exploit > for Linux. Please read the header for an explanation of what's going > on. Without further ado, I present full-nelson.c: Hello Dan, is this exploitation not mitigated by best practice defense-in-depth strategies such a [ more ] [ reply ] [USN-1030-1] Kerberos vulnerabilities 2010-12-09 Marc Deslauriers (marc deslauriers canonical com) =========================================================== Ubuntu Security Notice USN-1030-1 December 09, 2010 krb5 vulnerabilities CVE-2010-1323, CVE-2010-1324, CVE-2010-4020, CVE-2010-4021 =========================================================== A security issue affects the following [ more ] [ reply ] [security bulletin] HPSBUX02612 SSRT100345 rev.1 - HP-UX Apache-based Web Server, Local Information Disclosure, Increase of Privilege, Remote Denial of Service (DoS) 2010-12-09 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c02579879 Version: 1 HPSBUX02612 SSRT100345 rev.1 - HP-UX Apache-based Web Server, Local Information Disclosure, Increase of Privilege, Remote Denial of Service (DoS) NOTICE: The information in t [ more ] [ reply ] XSRF (CSRF) in CMScout 2010-12-09 advisory htbridge ch Vulnerability ID: HTB22719 Reference: http://www.htbridge.ch/advisory/xsrf_csrf_in_cmscout.html Product: CMScout Vendor: CMScout Team ( http://www.cmscout.co.za/ ) Vulnerable Version: 2.09 and probably prior versions Vendor Notification: 25 November 2010 Vulnerability Type: CSRF (Cross-Site Reques [ more ] [ reply ] Cross Site Scripting vulnerability in Diferior 2010-12-09 advisory htbridge ch Vulnerability ID: HTB22722 Reference: http://www.htbridge.ch/advisory/cross_site_scripting_vulnerability_in_di ferior.html Product: Diferior Vendor: Povilas Musteikis ( http://www.diferior.com/ ) Vulnerable Version: 8.03 and probably prior versions Vendor Notification: 25 November 2010 Vulnerabilit [ more ] [ reply ] Google Website Optimizer security issue reportedly fixed 2010-12-08 Juha-Matti Laurio (juha-matti laurio netti fi) Google has acknowledged information about fixed versions of Website Optimizer control scripts. A potential XSS was reported by unnamed person. More details at http://websiteoptimizer.blogspot.com/2010/12/update-your-website-optimiz er-scripts.html including link to Help Center page with update inst [ more ] [ reply ] Follow-up on HTTP Parameter Pollution 2010-12-08 embyte (embyte madlab it) Hi all, I have just blogged about a research we recently did on HTTP Parameter Pollution [1]. I would like to share it with you. HPP attacks consist of injecting encoded query string delimiters into other existing parameters. If a web application does not properly sanitize the user input, a malici [ more ] [ reply ] [USN-1029-1] OpenSSL vulnerabilities 2010-12-08 Steve Beattie (sbeattie ubuntu com) =========================================================== Ubuntu Security Notice USN-1029-1 December 08, 2010 openssl vulnerabilities CVE-2008-7270, CVE-2010-4180 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 6. [ more ] [ reply ] [security bulletin] HPSBUX02611 SSRT090201 rev.1 - HP-UX Running Threaded Processes, Remote Denial of Service (DoS) 2010-12-07 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c02586517 Version: 1 HPSBUX02611 SSRT090201 rev.1 - HP-UX Running Threaded Processes, Remote Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted upon as soon [ more ] [ reply ] iDefense Security Advisory 12.07.10: Apple QuickTime PICT Memory Corruption Vulnerability 2010-12-07 labs-no-reply (labs-no-reply idefense com) iDefense Security Advisory 12.07.10 http://labs.idefense.com/intelligence/vulnerabilities/ Dec 07, 2010 I. BACKGROUND QuickTime is Apple's media player product used to render video and other media. The PICT file format was developed by Apple Inc. in 1984. PICT files can contain both object-oriente [ more ] [ reply ] Re: [Full-disclosure] Linux kernel exploit 2010-12-07 Kai (kai rhynn net) > Anyone tested this in sandbox yet? 00:37 linups:../expl/kernel > cat /etc/*release* openSUSE 11.3 (i586) VERSION = 11.3 00:37 linups:../expl/kernel > uname -r 2.6.34.4-0.1-desktop 00:37 linups:../expl/kernel > gcc _2.6.37.local.c -o test 00:37 linups:../expl/kernel > ./test [*] Failed to open f [ more ] [ reply ] Re: [Full-disclosure] Linux kernel exploit 2010-12-07 Ryan Sears (rdsears mtu edu) Yep, just tested it in an Ubuntu 10.10 sandbox I have (running kernel 2.6.35-22-generic). Works as expected. Great job Dan. You're full of win! Regards, Ryan Sears ----- Original Message ----- From: "Cal Leeming [Simplicity Media Ltd]" <cal.leeming (at) simplicitymedialtd.co (dot) uk [email concealed]> To: "Dan Rosenberg" <d [ more ] [ reply ] Re: [Full-disclosure] Linux kernel exploit 2010-12-07 Cal Leeming [Simplicity Media Ltd] (cal leeming simplicitymedialtd co uk) Anyone tested this in sandbox yet? On 07/12/2010 20:25, Dan Rosenberg wrote: > Hi all, > > I've included here a proof-of-concept local privilege escalation exploit > for Linux. Please read the header for an explanation of what's going > on. Without further ado, I present full-nelson.c: > > Happy [ more ] [ reply ] Linux kernel exploit 2010-12-07 Dan Rosenberg (dan j rosenberg gmail com) Hi all, I've included here a proof-of-concept local privilege escalation exploit for Linux. Please read the header for an explanation of what's going on. Without further ado, I present full-nelson.c: Happy hacking, Dan --snip-- /* * Linux Kernel <= 2.6.37 local privilege escalation * by Dan [ more ] [ reply ] [USN-1028-1] ImageMagick vulnerability 2010-12-07 Marc Deslauriers (marc deslauriers canonical com) =========================================================== Ubuntu Security Notice USN-1028-1 December 07, 2010 imagemagick vulnerability CVE-2010-4167 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 8.04 LTS Ubunt [ more ] [ reply ] [USN-1027-1] Quagga vulnerabilities 2010-12-07 Marc Deslauriers (marc deslauriers canonical com) =========================================================== Ubuntu Security Notice USN-1027-1 December 07, 2010 quagga vulnerabilities CVE-2010-2948, CVE-2010-2949 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 6. [ more ] [ reply ] [USN-1026-1] Python Paste vulnerability 2010-12-07 Marc Deslauriers (marc deslauriers canonical com) =========================================================== Ubuntu Security Notice USN-1026-1 December 07, 2010 paste vulnerability CVE-2010-2477 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 10.04 LTS This advi [ more ] [ reply ] [security bulletin] HPSBMI02614 SSRT100344 rev.1 - HP webOS Contacts Application, Remote Execution of Arbitrary Code 2010-12-07 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c02639302Version: 1 HPSBMI02614 SSRT100344 rev.1 - HP webOS Contacts Application, Remote Execution of Arbitrary Code NOTICE: The information in this Security Bulletin should be acted upon as soon [ more ] [ reply ] www.eVuln.com : HTTP Response Splitting in WWWThreads (php version) 2010-12-08 bt evuln com www.eVuln.com advisory: HTTP Response Splitting in WWWThreads (php version) Summary: http://evuln.com/vulns/156/summary.html Details: http://evuln.com/vulns/156/description.html -----------Summary----------- eVuln ID: EV0156 Software: n/a Vendor: WWWThreads Version: 2006.11.25 Critical [ more ] [ reply ] Secunia Research: QuickTime Track Dimensions Buffer Overflow Vulnerability 2010-12-08 Secunia Research (remove-vuln secunia com) Multiple XSS in Solarwinds Orion NPM 10.1 2010-12-07 John Blakley (john blakley gmail com) Values placed in the URI of the browser are rendered correctly. Orion NPM 10.1 has just been released, so there is no known fix available as of yet. Examples: Most "variable=" that I've checked are vulnerable: http://<server>/Orion/NetPerfMon/MapView.aspx?Map=4f89095c-35fa-4b1b-813 f-231270=0225b7 [ more ] [ reply ] Kryptos Logic Advisory: Winamp 5.6 Arbitrary Code Execution in MIDI Parser 2010-12-07 Kryptos Logic Secure (secure kryptoslogic com) Re: [Full-disclosure] Linux kernel exploit 2010-12-08 Marcus Meissner (meissner suse de) On Wed, Dec 08, 2010 at 12:44:09AM +0300, Kai wrote: > > > Anyone tested this in sandbox yet? > > 00:37 linups:../expl/kernel > cat /etc/*release* > openSUSE 11.3 (i586) > VERSION = 11.3 > 00:37 linups:../expl/kernel > uname -r > 2.6.34.4-0.1-desktop > 00:37 linups:../expl/kernel > gcc _2.6.37.lo [ more ] [ reply ] |
|
Privacy Statement |
Firefox 3.6.13 fixes an interesting bug in their same-origin policy
logic for pseudo-URLs that do not have any inherent origin associated
with them. These documents are normally expected to inherit the
context from their parent, or be assigned a unique one. This didn't
work as expected in
[ more ] [ reply ]