The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015

Multiple Vulnerabilities in Linux kernel

Vector: Remote
Severity: Low
Patch: Patched
Impact: Denial of Service (DoS)
Escalation of Privileges
Security Restrictions Bypass
Software: Linux Kernel 3.18.x , vulnerable versions: <3.18.5

  1. The vulnerability exists due to lack of SYSENTER MSR initialization within the guest OS in em_sysenter() function in arch/x86/kvm/emulate.c. A local guest OS user can trigger usage of 16-bit code segment for emulation of a SYSENTER instruction and cause guest OS crash.
  2. A privilege escalation vulnerability exists in the Crypto API in Linux kernel. A local user can load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field and elevate privileges.
  3. Another privilege escalation vulnerability exists in the Crypto API in Linux kernel. A local user can load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field and elevate privileges.
  4. Security bypass vulnerability exists in net/netfilter/nf_conntrack_proto_generic.c within Linux kernel. The system incorrectly handles certain rule sets for SCTP, DCCP, GRE, and UDP-Lite protocols. A remote attacker can bypass intended security restrictions via packets with disallowed port numbers. The vulnerability was fixed in kernel version 3.18.
  5. An off-by-one error exists in the ecryptfs_decode_from_filename() function in fs/ecryptfs/crypto.c. A local user can trigger buffer overflow in the eCryptfs subsystem and execute arbitrary code on the system with elevated privileges. The vulnerability was fixed in kernel version 3.18.2.

Solution:
For : 3.18.5
CVE ID: 


CVSS v2: 
  • AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C
  • AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C
  • AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C
  • AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C
  • AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C

Links:  •http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.5
Solution:  Update to version 3.18.5.
Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit &quot;mbae.sys&quot;

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015