Security News

CarolinaCon CFP

Full Disclosure - 21 January, 2020 - 13:24

Posted by CarolinaCon on Jan 21

CarolinaCon16 will be hosted in Charlotte, North Carolina at the Embassy
Suites, April 10th through the 11th. All interested in speaking in the
realm of hacking, technology, science, robotics or any other related
field are invited to submit a proposal to speak at the Con. A proposal
should include the following:

* Name or handle/alias
* Presentation name
* A brief abstract, 1-2 paragraphs
* An estimated time-length of your...

[REVIVE-SA-2020-001] Revive Adserver Vulnerability

Full Disclosure - 21 January, 2020 - 13:23

Posted by Matteo Beccati via Fulldisclosure on Jan 21

========================================================================
Revive Adserver Security Advisory REVIVE-SA-2020-001
------------------------------------------------------------------------
https://www.revive-adserver.com/security/revive-sa-2020-001
------------------------------------------------------------------------
CVE-IDs: t.b.a.
Date: 2020-01-21
Risk Level: Low...

Neowise CarbonFTP v1.4 / Insecure Proprietary Password Encryption / CVE-2020-6857

Full Disclosure - 21 January, 2020 - 13:22

Posted by hyp3rlinx on Jan 21

[+] Credits: John Page (aka hyp3rlinx)
[+] Website: hyp3rlinx.altervista.org
[+] Source:
http://hyp3rlinx.altervista.org/advisories/NEOWISE-CARBONFTP-v1.4-INSECURE-PROPRIETARY-PASSWORD-ENCRYPTION.txt
[+] twitter.com/hyp3rlinx
[+] ISR: ApparitionSec

[Vendor]
www.neowise.com

[Product]
CarbonFTP v1.4

CarbonFTP is a file synchronization tool that enables you to synch local
files with a remote FTP server and vice versa.
It provides a step-by-step...

[SECURITY] [DSA 4607-1] openconnect security update

Bug Traq - 21 January, 2020 - 02:49

Posted by Salvatore Bonaccorso on Jan 20

-------------------------------------------------------------------------
Debian Security Advisory DSA-4607-1 security () debian org
https://www.debian.org/security/ Salvatore Bonaccorso
January 20, 2020 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : openconnect
CVE ID : CVE-2019-16239
Debian Bug...

Neowise CarbonFTP v1.4 Insecure Proprietary Password Encryption CVE-2020-6857

Bug Traq - 21 January, 2020 - 02:45

Posted by apparitionsec on Jan 20

[+] Credits: John Page (aka hyp3rlinx)
[+] Website: hyp3rlinx.altervista.org
[+] Source:
http://hyp3rlinx.altervista.org/advisories/NEOWISE-CARBONFTP-v1.4-INSECURE-PROPRIETARY-PASSWORD-ENCRYPTION.txt
[+] twitter.com/hyp3rlinx
[+] ISR: ApparitionSec

[Vendor]
www.neowise.com

[Product]
CarbonFTP v1.4

CarbonFTP is a file synchronization tool that enables you to synch local files with a remote FTP server and vice versa.
It provides a...

Trend Micro Security 2019 (Consumer) Multiple Products Security Bypass Protected Service Tampering CVE-2019-19697

Bug Traq - 21 January, 2020 - 02:42

Posted by apparitionsec on Jan 20

[+] Credits: John Page (aka hyp3rlinx)
[+] Website: hyp3rlinx.altervista.org
[+] Source:
http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-SECURITY-BYPASS-PROTECTED-SERVICE-TAMPERING.txt
[+] ISR: ApparitionSec

[Vendor]
www.trendmicro.com

[Product]
Trend Micro Security 2019 (Consumer) Multiple Products

Trend Micro Security provides comprehensive protection for your devices.
This includes protection...

Trend Micro Security (Consumer) Multiple Products Persistent Arbitrary Code Execution CVE-2019-20357

Bug Traq - 21 January, 2020 - 02:38

Posted by apparitionsec on Jan 20

[+] Credits: John Page (aka hyp3rlinx)
[+] Website: hyp3rlinx.altervista.org
[+] Source:
http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-PERSISTENT-ARBITRARY-CODE-EXECUTION.txt
[+] twitter.com/hyp3rlinx
[+] ISR: ApparitionSec

[Vendor]
www.trendmicro.com

[Product(s)]
Trend Micro Security (Consumer) Multiple Products

Trend Micro Security provides comprehensive protection for your devices.
This includes...

[SECURITY] [DSA 4606-1] chromium security update

Bug Traq - 20 January, 2020 - 09:26

Posted by Michael Gilbert on Jan 20

-------------------------------------------------------------------------
Debian Security Advisory DSA-4606-1 security () debian org
https://www.debian.org/security/ Michael Gilbert
January 20, 2020 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : chromium
CVE ID : CVE-2019-13725 CVE-2019-13726...

[SECURITY] [DSA 4603-1] thunderbird security update

Bug Traq - 20 January, 2020 - 05:10

Posted by Moritz Muehlenhoff on Jan 20

-------------------------------------------------------------------------
Debian Security Advisory DSA-4603-1 security () debian org
https://www.debian.org/security/ Moritz Muehlenhoff
January 17, 2020 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : thunderbird
CVE ID : CVE-2019-17016 CVE-2019-17017...

[SECURITY] [DSA 4604-1] cacti security update

Bug Traq - 20 January, 2020 - 05:06

Posted by Moritz Muehlenhoff on Jan 20

-------------------------------------------------------------------------
Debian Security Advisory DSA-4604-1 security () debian org
https://www.debian.org/security/ Hugo Lefeuvre
January 19, 2020 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : cacti
CVE ID : CVE-2019-16723 CVE-2019-17357...

[SECURITY] [DSA 4605-1] openjdk-11 security update

Bug Traq - 20 January, 2020 - 05:02

Posted by Moritz Muehlenhoff on Jan 20

-------------------------------------------------------------------------
Debian Security Advisory DSA-4605-1 security () debian org
https://www.debian.org/security/ Moritz Muehlenhoff
January 19, 2020 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : openjdk-11
CVE ID : CVE-2020-2583 CVE-2020-2590...

[TZO-10-2020] - Bitdefender Malformed Archive bypass (RAR Compression Information)

Full Disclosure - 17 January, 2020 - 13:21

Posted by Thierry Zoller on Jan 17


[TZO-09-2020] - Bitdefender Malformed Archive bypass (RAR Uncompressed Size)

Full Disclosure - 17 January, 2020 - 13:21

Posted by Thierry Zoller on Jan 17


.diagcab directory traversal leading to arbitrary code execution

Full Disclosure - 17 January, 2020 - 13:21

Posted by Imre Rad on Jan 17

I identified a flaw in the implementation of Microsoft's
Troubleshooter technology that could lead to remote code execution if
a crafted .diagcab file is opened by the victim. The exploit leverages
a rogue webdav server to trick MSDT to drop files to attacker
controller locations on the file system.

If you see the following pattern in any Windows applications, they
might be vulnerable too:

#define MAXPATH 0x104

TCHAR...

Re: Fortinet FortiSIEM Hardcoded SSH Key

Full Disclosure - 17 January, 2020 - 13:21

Posted by Fortinet PSIRT on Jan 17

Hi, A patch to fix this issue is available to customers and detailed in the following public advisory at
https://fortiguard.com/psirt/FG-IR-19-296.
We can confirm that in addition to the automatic replies, emails were sent to Mr. Klaus on December 5th and December
24th.
However, after some investigation we have learned that the emails were not successfully delivered.
We offer our sincere apologies to Mr. Klaus and have acknowledged his work in...

CVE-2020-2696 - Local privilege escalation via CDE dtsession

Full Disclosure - 17 January, 2020 - 13:19

Posted by Marco Ivaldi on Jan 17

Dear Full Disclosure,

Please find attached an advisory for the following vulnerability, fixed in Oracle's Critical Patch Update (CPU) of
January 2020:

"A buffer overflow in the CheckMonitor() function in the Common Desktop Environment 2.3.1 and earlier and 1.6 and
earlier, as distributed with Oracle Solaris 10 1/13 (Update 11) and earlier, allows local users to gain root privileges
via a long palette name passed to dtsession in a...

CVE-2020-2656 - Low impact information disclosure via Solaris xlock

Full Disclosure - 17 January, 2020 - 13:19

Posted by Marco Ivaldi on Jan 17

Dear Full Disclosure,

Please find attached an advisory for the following vulnerability, fixed in Oracle's Critical Patch Update (CPU) of
January 2020:

"A low impact information disclosure vulnerability in the setuid root xlock binary distributed with Solaris may allow
local users to read partial contents
of sensitive files. Due to the fact that target files must be in a very specific format, exploitation of this flaw to
escalate...

CVE-2019-19697 / Trend Micro Security 2019 (Consumer) / Security Bypass Protected Service Tampering

Full Disclosure - 17 January, 2020 - 13:17

Posted by hyp3rlinx on Jan 17

[+] Credits: John Page (aka hyp3rlinx)
[+] Website: hyp3rlinx.altervista.org
[+] Source:
http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-SECURITY-BYPASS-PROTECTED-SERVICE-TAMPERING.txt
[+] ISR: ApparitionSec

[Vendor]
www.trendmicro.com

[Product]
Trend Micro Security 2019 (Consumer) Multiple Products

Trend Micro Security provides comprehensive protection for your devices.
This includes protection against ransomware,...

CVE-2019-20357 / Trend Micro Security (Consumer) / Persistent Arbitrary Code Execution

Full Disclosure - 17 January, 2020 - 13:17

Posted by hyp3rlinx on Jan 17

[+] Credits: John Page (aka hyp3rlinx)
[+] Website: hyp3rlinx.altervista.org
[+] Source:
http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-PERSISTENT-ARBITRARY-CODE-EXECUTION.txt
[+] twitter.com/hyp3rlinx
[+] ISR: ApparitionSec

[Vendor]
www.trendmicro.com

[Product(s)]
Trend Micro Security (Consumer) Multiple Products

Trend Micro Security provides comprehensive protection for your devices.
This includes protection against...

CVE-2020-2656 - Low impact information disclosure via Solaris xlock

Bug Traq - 17 January, 2020 - 04:15

Posted by Marco Ivaldi on Jan 17

Dear Bugtraq,

Please find attached an advisory for the following vulnerability, fixed in Oracle's Critical Patch Update (CPU) of
January 2020:

"A low impact information disclosure vulnerability in the setuid root xlock binary distributed with Solaris may allow
local users to read partial contents
of sensitive files. Due to the fact that target files must be in a very specific format, exploitation of this flaw to
escalate privileges...
Syndicate content