«
Expand/Collapse
332 items tagged "buffer overflow vulnerabilities"
Related tags:
proof of concept [+],
openoffice [+],
format [+],
cisco security [+],
multiple [+],
stack [+],
media [+],
jasper [+],
ftp server [+],
freefloat [+],
advisory [+],
activex [+],
wrf [+],
symantec [+],
libtiff [+],
libreoffice [+],
knftpd [+],
indusoft [+],
freetype [+],
freeradius [+],
font format [+],
font [+],
factory [+],
compact [+],
application versions [+],
zoner [+],
vlc media player [+],
vlc [+],
realwin [+],
photo studio [+],
photo [+],
ibm [+],
datac [+],
advantech [+],
veritas [+],
security [+],
safer use [+],
rle [+],
python [+],
poor efficiency [+],
package [+],
linux [+],
libotr [+],
insecure method [+],
gnu [+],
glibc [+],
enterprise [+],
chaos communication congress [+],
buffer overflow vulnerability [+],
buffer [+],
vulnerable version [+],
threedify [+],
technique [+],
stack overflow [+],
ssl c [+],
sony vaio 4 [+],
samsung [+],
safenet [+],
s system [+],
rsa [+],
remote controllers [+],
recording [+],
qnx [+],
privilege [+],
privagent [+],
phrelay [+],
phditto [+],
office [+],
netbsd [+],
microsoft [+],
method [+],
meeting sites [+],
martin vuagnoux [+],
lotus notes [+],
lotus [+],
linux kernel [+],
libc [+],
leverage [+],
impress [+],
gentoo linux security [+],
gentoo [+],
ftp commands [+],
exploits [+],
disclosure [+],
designer [+],
debian [+],
concept test [+],
cisco advanced [+],
c version [+],
bugtraq [+],
buffer overflows [+],
bsafe [+],
autodaf [+],
apple quicktime [+],
active x [+],
xnview [+],
winpdm [+],
video converter [+],
updtl [+],
sunway [+],
squashfs [+],
sony [+],
smart card [+],
smart [+],
sieve [+],
service vulnerability [+],
secunia [+],
scada [+],
research [+],
quicktime [+],
packets [+],
openttd [+],
opensc [+],
notes [+],
manager [+],
libzip [+],
kaillera [+],
iriap [+],
intel [+],
forcecontrol [+],
flashpix [+],
esignal [+],
emulation [+],
converter [+],
computer associates [+],
computer [+],
card [+],
avayawinpdm [+],
avaya [+],
autonomy [+],
audio [+],
asterisk [+],
arcserve [+],
apple [+],
anvsoft [+],
alert management [+],
alert [+],
abbs [+],
Wireless [+],
Software [+],
based buffer overflow [+],
remote buffer overflow [+],
stack buffer [+],
file [+],
heap [+],
xcf [+],
wonderware [+],
winamp 5 [+],
winamp [+],
webcam center [+],
webcam [+],
vorbis decoder [+],
vorbis [+],
voc [+],
visual [+],
visprj [+],
videospirit [+],
video [+],
uplusware [+],
uplusftp [+],
unixodbc [+],
tvmobili [+],
trillian [+],
tivoli storage manager [+],
tivoli [+],
tiff image [+],
system [+],
swi prolog [+],
suspected [+],
studios [+],
storage [+],
sqldriverconnect [+],
sql [+],
splitter [+],
spam [+],
sblim sfcb [+],
retired [+],
power [+],
poc [+],
plugin [+],
paper [+],
oracle [+],
ntr [+],
nci [+],
mp3 splitter joiner [+],
movie [+],
microsoft office [+],
meeting [+],
media server [+],
malloc [+],
lwp [+],
lite [+],
libsndfile [+],
keyview [+],
kernel [+],
jp1 [+],
joiner [+],
jk2 [+],
invensys wonderware [+],
invensys [+],
injection [+],
information disclosure [+],
inbatch [+],
host header [+],
hmi [+],
hitachi [+],
gypsy information [+],
gypsy [+],
getnum [+],
fpx [+],
flash [+],
filter [+],
filedsn [+],
ffmpeg [+],
exploit [+],
elba [+],
ecw [+],
driver options [+],
dovecot [+],
domain [+],
document [+],
dell [+],
default [+],
decoder [+],
cyberlink power2go [+],
cyberlink [+],
csound [+],
credentials [+],
cerulean studios trillian [+],
cerulean [+],
center [+],
capture [+],
calloc [+],
boehm [+],
bisonftp server [+],
bisonftp [+],
atas [+],
arf [+],
apache [+],
aiff [+],
adobe flash player [+],
adobe [+],
activex control buffer overflow [+],
actfax [+],
overflow [+],
server [+],
multiple file [+],
autostart [+],
plugins [+],
emc [+],
remote [+],
ftp [+],
cisco webex [+],
cisco security advisory [+],
studio [+],
player [+],
issymbol [+],
multiple buffer overflow [+],
zsl,
yassl,
xosoft,
xfile,
word,
wireshark,
version,
ultraiso,
ufo alien invasion,
ufo,
txt,
softartisans,
slideshow,
sarg,
reflection,
realplayer,
realnetworks realplayer,
realnetworks,
poppler,
pico mp,
php,
photoshop,
personal ftp server,
personal,
pdf,
novell netware,
novell iprint,
novell,
nos,
netware,
mysqlnd,
module,
modul,
microsystems,
messenger,
memory registers,
memory,
mdvsa,
mandriva linux,
mandriva,
maker,
lwres,
linux security,
libmikmod,
keyworks,
keyhelp,
ivr,
iprint,
invasion,
informix dynamic server,
informix,
html email,
html,
help,
glsa,
ftpd,
fss,
flash slideshow maker,
filemanager,
extension,
email,
edisplay,
easy,
dynamic,
download,
document table,
dissector,
cups,
creator,
control stack,
client,
bigant,
attachmate,
arbitrary code execution,
alien,
activex controls,
activex control
-
-
16:00
»
SecuriTeam
TVMOBiLi is prone to multiple buffer-overflow vulnerabilities because it fails to properly bounds check user-supplied input.
-
-
10:22
»
Packet Storm Security Exploits
ELBA 5 version 5.5.0 R00006 build 0796 suffers from remote SQL injection, unencrypted password storage, default credential use, and buffer overflow vulnerabilities.
-
-
16:00
»
SecuriTeam
SafeNet Privilege is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input.
-
-
16:00
»
SecuriTeam
Hitachi JP1/File Transmission Server/FTP is prone to multiple security vulnerabilities including: 1. A security bypass vulnerability 2. A buffer-overflow vulnerability
-
-
16:00
»
SecuriTeam
Apple QuickTime is prone to multiple buffer-overflow vulnerabilities.
-
-
16:00
»
SecuriTeam
Multiple Buffer Overflow Vulnerabilities have been found in the official Zoner Photo Studio Software v15 (b3).
-
-
0:17
»
Packet Storm Security Advisories
Cisco Security Advisory - The Cisco WebEx Recording Format (WRF) player contains six buffer overflow vulnerabilities. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user. Cisco has updated affected versions of the WebEx meeting sites and Cisco WebEx WRF Player to address these vulnerabilities.
-
0:17
»
Packet Storm Security Recent Files
Cisco Security Advisory - The Cisco WebEx Recording Format (WRF) player contains six buffer overflow vulnerabilities. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user. Cisco has updated affected versions of the WebEx meeting sites and Cisco WebEx WRF Player to address these vulnerabilities.
-
0:17
»
Packet Storm Security Misc. Files
Cisco Security Advisory - The Cisco WebEx Recording Format (WRF) player contains six buffer overflow vulnerabilities. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user. Cisco has updated affected versions of the WebEx meeting sites and Cisco WebEx WRF Player to address these vulnerabilities.
-
-
15:24
»
SecDocs
Authors:
Martin Vuagnoux Tags:
fuzzing Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Automated vulnerability searching tools have led to a dramatic increase of the rate at which such flaws are discovered. One particular searching technique is fault injection – i.e. insertion of random data into input files, buffers or protocol packets, combined with a systematic monitoring of memory violations. Even if these tools allow to uncover a lot of vulnerabilities, they are still very primitive; despite their poor efficiency, they are useful because of the very high density of such vulnerabilities in modern software. This paper presents an innovative buffer overflow uncovering technique, which uses a more thorough and reliable approach. This technique, called "fuzzing by weighting attacks with markers", is a specialized kind of fault injection, which does not need source code or special compilation for the monitored program. As a proof of concept of the efficiency of this technique, a tool called Autodafé has been developed. It allows to detect automatically an impressive number of buffer overflow vulnerabilities.
-
10:30
»
SecDocs
Authors:
Martin Vuagnoux Tags:
fuzzing Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Automated vulnerability searching tools have led to a dramatic increase of the rate at which such flaws are discovered. One particular searching technique is fault injection – i.e. insertion of random data into input files, buffers or protocol packets, combined with a systematic monitoring of memory violations. Even if these tools allow to uncover a lot of vulnerabilities, they are still very primitive; despite their poor efficiency, they are useful because of the very high density of such vulnerabilities in modern software. This paper presents an innovative buffer overflow uncovering technique, which uses a more thorough and reliable approach. This technique, called "fuzzing by weighting attacks with markers", is a specialized kind of fault injection, which does not need source code or special compilation for the monitored program. As a proof of concept of the efficiency of this technique, a tool called Autodafé has been developed. It allows to detect automatically an impressive number of buffer overflow vulnerabilities.
-
10:30
»
SecDocs
Authors:
Martin Vuagnoux Tags:
fuzzing Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Automated vulnerability searching tools have led to a dramatic increase of the rate at which such flaws are discovered. One particular searching technique is fault injection – i.e. insertion of random data into input files, buffers or protocol packets, combined with a systematic monitoring of memory violations. Even if these tools allow to uncover a lot of vulnerabilities, they are still very primitive; despite their poor efficiency, they are useful because of the very high density of such vulnerabilities in modern software. This paper presents an innovative buffer overflow uncovering technique, which uses a more thorough and reliable approach. This technique, called "fuzzing by weighting attacks with markers", is a specialized kind of fault injection, which does not need source code or special compilation for the monitored program. As a proof of concept of the efficiency of this technique, a tool called Autodafé has been developed. It allows to detect automatically an impressive number of buffer overflow vulnerabilities.
-
10:30
»
SecDocs
Authors:
Martin Vuagnoux Tags:
fuzzing Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Automated vulnerability searching tools have led to a dramatic increase of the rate at which such flaws are discovered. One particular searching technique is fault injection – i.e. insertion of random data into input files, buffers or protocol packets, combined with a systematic monitoring of memory violations. Even if these tools allow to uncover a lot of vulnerabilities, they are still very primitive; despite their poor efficiency, they are useful because of the very high density of such vulnerabilities in modern software. This paper presents an innovative buffer overflow uncovering technique, which uses a more thorough and reliable approach. This technique, called "fuzzing by weighting attacks with markers", is a specialized kind of fault injection, which does not need source code or special compilation for the monitored program. As a proof of concept of the efficiency of this technique, a tool called Autodafé has been developed. It allows to detect automatically an impressive number of buffer overflow vulnerabilities.
-
-
17:00
»
SecuriTeam
EMC AutoStart is prone to multiple buffer-overflow vulnerabilities.
-
17:00
»
SecuriTeam
LibreOffice and OpenOffice are prone to multiple heap-based buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied data.
-
-
17:00
»
SecuriTeam
libotr2 is prone to multiple heap-based buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied data.
-
17:00
»
SecuriTeam
The Linux kernel is prone to multiple remote stack buffer-overflow vulnerabilities.
-
-
20:52
»
Packet Storm Security Advisories
Cisco Security Advisory - The Cisco WebEx Recording Format (WRF) player contains four buffer overflow vulnerabilities and the Cisco Advanced Recording Format (ARF) player contains one buffer overflow vulnerability. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user. Cisco has updated affected versions of the WebEx meeting sites and WRF and ARF players to address these vulnerabilities.
-
20:52
»
Packet Storm Security Recent Files
Cisco Security Advisory - The Cisco WebEx Recording Format (WRF) player contains four buffer overflow vulnerabilities and the Cisco Advanced Recording Format (ARF) player contains one buffer overflow vulnerability. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user. Cisco has updated affected versions of the WebEx meeting sites and WRF and ARF players to address these vulnerabilities.
-
20:52
»
Packet Storm Security Misc. Files
Cisco Security Advisory - The Cisco WebEx Recording Format (WRF) player contains four buffer overflow vulnerabilities and the Cisco Advanced Recording Format (ARF) player contains one buffer overflow vulnerability. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user. Cisco has updated affected versions of the WebEx meeting sites and WRF and ARF players to address these vulnerabilities.
-
8:22
»
Packet Storm Security Advisories
EMC AutoStart contains multiple buffer overflow vulnerabilities which can be exploited to potentially cause a denial of service, or possibly, execute arbitrary code within the context of the affected application. Versions 5.3.x and 5.4.x are affected.
-
8:22
»
Packet Storm Security Recent Files
EMC AutoStart contains multiple buffer overflow vulnerabilities which can be exploited to potentially cause a denial of service, or possibly, execute arbitrary code within the context of the affected application. Versions 5.3.x and 5.4.x are affected.
-
8:22
»
Packet Storm Security Misc. Files
EMC AutoStart contains multiple buffer overflow vulnerabilities which can be exploited to potentially cause a denial of service, or possibly, execute arbitrary code within the context of the affected application. Versions 5.3.x and 5.4.x are affected.
-
-
8:23
»
Packet Storm Security Exploits
QNX phrelay/phindows/phditto suffer from bpe_decompress stack overflow and Photon Session buffer overflow vulnerabilities. Proof of concept test code included.
-
8:23
»
Packet Storm Security Recent Files
QNX phrelay/phindows/phditto suffer from bpe_decompress stack overflow and Photon Session buffer overflow vulnerabilities. Proof of concept test code included.
-
8:23
»
Packet Storm Security Misc. Files
QNX phrelay/phindows/phditto suffer from bpe_decompress stack overflow and Photon Session buffer overflow vulnerabilities. Proof of concept test code included.
-
-
23:36
»
Packet Storm Security Exploits
Samsung devices with support for remote controllers suffer from endless restart and possible buffer overflow vulnerabilities. Proof of concept code included.
-
23:36
»
Packet Storm Security Recent Files
Samsung devices with support for remote controllers suffer from endless restart and possible buffer overflow vulnerabilities. Proof of concept code included.
-
23:36
»
Packet Storm Security Misc. Files
Samsung devices with support for remote controllers suffer from endless restart and possible buffer overflow vulnerabilities. Proof of concept code included.
-
-
18:19
»
Packet Storm Security Advisories
Cisco Security Advisory - The Cisco WebEx Recording Format (WRF) player contains three buffer overflow vulnerabilities. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user. The Cisco WebEx Players are applications that are used to play back WebEx meeting recordings that have been recorded on a WebEx meeting site or on the computer of an online meeting attendee. The players can be automatically installed when the user accesses a recording file that is hosted on a WebEx meeting site. The players can also be manually installed for offline playback after downloading the application from www.webex.com. If the WRF player was automatically installed, it will be automatically upgraded to the latest, non-vulnerable version when users access a recording file that is hosted on a WebEx meeting site. If the WRF player was manually installed, users will need to manually install a new version of the player after downloading the latest version from www.webex.com. Cisco has updated affected versions of the WebEx meeting sites and WRF player to address these vulnerabilities.
-
18:19
»
Packet Storm Security Recent Files
Cisco Security Advisory - The Cisco WebEx Recording Format (WRF) player contains three buffer overflow vulnerabilities. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user. The Cisco WebEx Players are applications that are used to play back WebEx meeting recordings that have been recorded on a WebEx meeting site or on the computer of an online meeting attendee. The players can be automatically installed when the user accesses a recording file that is hosted on a WebEx meeting site. The players can also be manually installed for offline playback after downloading the application from www.webex.com. If the WRF player was automatically installed, it will be automatically upgraded to the latest, non-vulnerable version when users access a recording file that is hosted on a WebEx meeting site. If the WRF player was manually installed, users will need to manually install a new version of the player after downloading the latest version from www.webex.com. Cisco has updated affected versions of the WebEx meeting sites and WRF player to address these vulnerabilities.
-
18:19
»
Packet Storm Security Misc. Files
Cisco Security Advisory - The Cisco WebEx Recording Format (WRF) player contains three buffer overflow vulnerabilities. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user. The Cisco WebEx Players are applications that are used to play back WebEx meeting recordings that have been recorded on a WebEx meeting site or on the computer of an online meeting attendee. The players can be automatically installed when the user accesses a recording file that is hosted on a WebEx meeting site. The players can also be manually installed for offline playback after downloading the application from www.webex.com. If the WRF player was automatically installed, it will be automatically upgraded to the latest, non-vulnerable version when users access a recording file that is hosted on a WebEx meeting site. If the WRF player was manually installed, users will need to manually install a new version of the player after downloading the latest version from www.webex.com. Cisco has updated affected versions of the WebEx meeting sites and WRF player to address these vulnerabilities.
-
-
15:57
»
Packet Storm Security Advisories
Gentoo Linux Security Advisory 201203-10 - Multiple buffer overflow vulnerabilities in libmikmod may allow an attacker to execute arbitrary code or cause a Denial of Service condition. Versions less than 3.2.0_beta2-r3 are affected.
-
15:57
»
Packet Storm Security Recent Files
Gentoo Linux Security Advisory 201203-10 - Multiple buffer overflow vulnerabilities in libmikmod may allow an attacker to execute arbitrary code or cause a Denial of Service condition. Versions less than 3.2.0_beta2-r3 are affected.
-
15:57
»
Packet Storm Security Misc. Files
Gentoo Linux Security Advisory 201203-10 - Multiple buffer overflow vulnerabilities in libmikmod may allow an attacker to execute arbitrary code or cause a Denial of Service condition. Versions less than 3.2.0_beta2-r3 are affected.
-
-
14:13
»
Packet Storm Security Exploits
KnFTPd FTP server version 1.0.0 suffers from buffer overflow vulnerabilities. Dozens of FTP commands are affected. Proof of concept exploit included.
-
14:13
»
Packet Storm Security Recent Files
KnFTPd FTP server version 1.0.0 suffers from buffer overflow vulnerabilities. Dozens of FTP commands are affected. Proof of concept exploit included.
-
14:13
»
Packet Storm Security Misc. Files
KnFTPd FTP server version 1.0.0 suffers from buffer overflow vulnerabilities. Dozens of FTP commands are affected. Proof of concept exploit included.
-
-
13:47
»
Packet Storm Security Advisories
Secunia Research has discovered multiple buffer overflow vulnerabilities in InduSoft ISSymbol ActiveX control, which can be exploited by malicious people to compromise a user's system.
-
13:47
»
Packet Storm Security Recent Files
Secunia Research has discovered multiple buffer overflow vulnerabilities in InduSoft ISSymbol ActiveX control, which can be exploited by malicious people to compromise a user's system.
-
13:47
»
Packet Storm Security Misc. Files
Secunia Research has discovered multiple buffer overflow vulnerabilities in InduSoft ISSymbol ActiveX control, which can be exploited by malicious people to compromise a user's system.
-
-
18:40
»
Packet Storm Security Advisories
EMC AutoStart contains multiple buffer overflow vulnerabilities which can be exploited to potentially cause a denial of service, or possibly, execute arbitrary code within the context of the affected application. Versions 5.3.x and 5.4.x are affected.
-
18:40
»
Packet Storm Security Recent Files
EMC AutoStart contains multiple buffer overflow vulnerabilities which can be exploited to potentially cause a denial of service, or possibly, execute arbitrary code within the context of the affected application. Versions 5.3.x and 5.4.x are affected.
-
18:40
»
Packet Storm Security Misc. Files
EMC AutoStart contains multiple buffer overflow vulnerabilities which can be exploited to potentially cause a denial of service, or possibly, execute arbitrary code within the context of the affected application. Versions 5.3.x and 5.4.x are affected.
-
-
9:43
»
Packet Storm Security Exploits
Freefloat FTP server version 1.0 suffers from multiple buffer overflow vulnerabilities. Proof of concept exploit is attached to the bottom of this advisory.
-
9:43
»
Packet Storm Security Recent Files
Freefloat FTP server version 1.0 suffers from multiple buffer overflow vulnerabilities. Proof of concept exploit is attached to the bottom of this advisory.
-
9:43
»
Packet Storm Security Misc. Files
Freefloat FTP server version 1.0 suffers from multiple buffer overflow vulnerabilities. Proof of concept exploit is attached to the bottom of this advisory.
-
-
20:24
»
SecuriTeam
VLC Media Player contains two Buffer Overflow vulnerabilities.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
21:00
»
SecuriTeam
Microsoft Office contains two Buffer Overflow vulnerabilities in FlashPix Tile Data.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
21:00
»
SecuriTeam
Microsoft Office Contains a Vulnerability in the TIFF Image Converter.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
16:30
»
SecuriTeam
Multiple vulnerabilities were identified in Oracle Document Capture.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!