OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.
53cb818c3b90e507a8348f4f5eaedb05d8bfe5358aabb508b7263cc670c3e028
A missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64k of memory to a connected client or server. Only 1.0.1 and 1.0.2-beta releases of OpenSSL are affected including 1.0.1f and 1.0.2-beta1.
4f8f0dc9e93799002c4bef191b0e8f5e142452409064b95a52255aa7f737badb
Ubuntu Security Notice 2165-1 - Neel Mehta discovered that OpenSSL incorrectly handled memory in the TLS heartbeat extension. An attacker could use this issue to obtain up to 64k of memory contents from the client or server, possibly leading to the disclosure of private keys and other sensitive information. Yuval Yarom and Naomi Benger discovered that OpenSSL incorrectly handled timing during swap operations in the Montgomery ladder implementation. An attacker could use this issue to perform side-channel attacks and possibly recover ECDSA nonces. Various other issues were also addressed.
f2b6af710c9e36df9d737d33d189c7c4552996014d2a9d3f94e1a4b698dfa7de
This Metasploit module abuses a filename spoofing vulnerability in WinRAR. The vulnerability exists when opening ZIP files. The file names showed in WinRAR when opening a ZIP file come from the central directory, but the file names used to extract and open contents come from the Local File Header. This inconsistency allows to spoof file names when opening ZIP files with WinRAR, which can be abused to execute arbitrary code, as exploited in the wild in March 2014.
77adfa4fa0e23c97becb1de4580cf456d6594ca7beef63394258815f48627e38
Different Fritz!Box devices are vulnerable to an unauthenticated OS command injection. This Metasploit module was tested on a Fritz!Box 7270 from the LAN side. The vendor reported the following devices vulnerable: 7570, 7490, 7390, 7360, 7340, 7330, 7272, 7270, 7170 Annex A A/CH, 7170 Annex B English, 7170 Annex A English, 7140, 7113, 6840 LTE, 6810 LTE, 6360 Cable, 6320 Cable, 5124, 5113, 3390, 3370, 3272, 3270
3c9438ad3242628774c0c9001c0fa55a918947a138a8407300ecd933463e3bf5
The NoSuchCon 2014 Call For Papers has been announced. It will take place November 19th through the 21st, 2014 in Paris, France.
b69832c225089330f3fbb4d741e2886231ce145072955697f9ff8a5ee3f5e772
Microsoft Windows Help and Support Center contains multiple vulnerabilities that can be exploited by attackers to run arbitrary code when a drag and drop operation is performed on a webpage, cause a buffer overrun condition, and Denial of Service (DOS). Proof of concept code included.
cc111b1430c4133bf0687641eb7cc07665dae44f35945c0b99ba586fc437fef5
Microsoft Windows Help (Winhlp32) contains an HLP file loading hijack vulnerability because programs that invokes help from HLP files passes relative paths, causing it to load HLP files from the directory in which it was started, if they exist. Proof of concept code included.
555250bab20bf8be89a3b9e62da9fd89d8bfae7044864dbc0df99dbc189d1d0e
HP Security Bulletin HPSBGN02986 - A potential security vulnerability has been identified with HP IceWall Identity Manager and HP IceWall SSO Password Reset Option Running Apache Commons FileUpload. The vulnerability could be exploited remotely resulting in a Denial of Service (DoS). Revision 1 of this advisory.
bc5084b0478ae4f88250fcf94c8305e05e0e1b2d87da2fb27e6884c9671bca79
Debian Linux Security Advisory 2891-3 - The Mediawiki update issued as DSA 2891-1 caused regressions. This update fixes those problems.
f4c93e740a251c7b3e60a20bbabc1c65f7a49c750380dbd5a2a67ee2e253ae01
Gentoo Linux Security Advisory 201404-1 - A vulnerability in CUPS may allow for arbitrary file access. Versions less than 1.6.2-r5 are affected.
39a8944fe3211ba9f3dd3a733ebfff6ff3d9c90c663ccc86cbba90efde06c940
Gentoo Linux Security Advisory 201404-5 - Multiple vulnerabilities have been found in OpenAFS, worst of which can allow attackers to execute arbitrary code. Versions less than 1.6.5 are affected.
bdd4ed6538ff78bf057d8dfb17d273d308bbeb4af917a10d1c972e171f1ca870
Gentoo Linux Security Advisory 201404-4 - A vulnerability in Crack might allow remote attackers to execute arbitrary code. Versions less than 0.3.2 are affected.
787bea35901f30a270ecc027971222399b9ca460eb3dc5673b85b2518f5fce06
Gentoo Linux Security Advisory 201404-3 - A use-after-free error in OptiPNG could result in execution of arbitrary code or Denial of Service. Versions less than 0.7.3 are affected.
889ec44646a291d50cef5fcd069e6d9c2dbb09b6d0d8e3a1bec6aa5c2a96d9c6
Ubuntu Security Notice 2164-1 - Matthew Vernon discovered that OpenSSH did not correctly check SSHFP DNS records if a server presented an unacceptable host certificate. A malicious server could use this issue to disable SSHFP checking.
7b0f4e976b236236294b1d5252c077f746751ea14dd4ae1c72fe2805931b990f
Gentoo Linux Security Advisory 201404-2 - A buffer overflow in libproxy might allow remote attackers to execute arbitrary code. Versions less than 0.4.10 are affected.
13c9b943b1ffcfba6bbba3bd40ae7cfa2ece2d10b6a05055367f668057cbd60d
Ubuntu Security Notice 2163-1 - It was discovered that PHP's embedded libmagic library incorrectly handled PE executables. An attacker could use this issue to cause PHP to crash, resulting in a denial of service.
0d091488d02a2ca4f7952cb6422ce82ecaf309d9b79a81b19e91969a3b2faf20
Ubuntu Security Notice 2162-1 - It was discovered that file incorrectly handled PE executable files. An attacker could use this issue to cause file to crash, resulting in a denial of service.
b4dd95e2b702ef1f1d6c8585d60662427e21c67c1030d55acf046c239cb3f865
Debian Linux Security Advisory 2895-1 - A denial-of-service vulnerability has been reported in Prosody, a XMPP server. If compression is enabled, an attacker might send highly-com- pressed XML elements (attack known as "zip bomb") over XMPP streams and consume all the resources of the server.
a67c98bdadab4fc478a257deefe2123d0476ddf5992461747b709aa8a8eca333
Debian Linux Security Advisory 2894-1 - Two vulnerabilities were discovered in OpenSSH, an implementation of the SSH protocol suite.
5dba7d2302bdc35d448e8e95c5a203d4d00214d3bc18d6bf10df23d92a218c95