All Hot News World. Public world blog, journal online reviewed.

SUSE Operating System, PacketStorm Security

RSS feed: SUSE Operating System, PacketStorm Security
Tue, 19 Sep 2017 15:23:59 GMT
Operating System: SUSE ≈ Packet Storm
Packet Storm - Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers [ + ]
Tue, 22 Aug 2017 05:44:56 GMT
SUSE/Portus 2.2 Cross Site Scripting
SUSE/Portus version 2.2 suffers from a persistent cross site scripting vulnerability. [ + ]
Mon, 30 Mar 2015 21:48:37 GMT
IBM OpenAdmin Tool SOAP welcomeServer PHP Code Execution
This Metasploit module exploits an unauthenticated remote PHP code execution vulnerability in IBM OpenAdmin Tool included with IBM Informix versions 11.5, 11.7, and 12.1. The 'welcomeServer' SOAP service does not properly validate user input in the 'new_home_page' parameter of the 'saveHomePage' method allowing arbitrary PHP code to be written to the config.php file. The config.php file is executed in most pages within the application, and accessible directly via the web root, resulting in code execution. This Metasploit module has been tested successfully on IBM OpenAdmin Tool 3.14 on Informix 12.10 Developer Edition (SUSE Linux 11) virtual appliance. [ + ]
Thu, 12 Feb 2015 16:45:56 GMT
Mandriva Linux Security Advisory 2015-140
Mandriva Linux Security Advisory 2015-140 - If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated. ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys. A remote unauthenticated attacker may craft special packets that trigger buffer overflows in the ntpd functions crypto_recv() (when using autokey authentication), ctl_putdata(), and configure(). The resulting buffer overflows may be exploited to allow arbitrary malicious code to be executed with the privilege of the ntpd process. A section of code in ntpd handling a rare error is missing a return statement, therefore processing did not stop when the error was encountered. This situation may be exploitable by an attacker. Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. The ntp package has been patched to fix these issues. [ + ]
Tue, 02 Apr 2013 15:07:51 GMT
Mandriva Linux Security Advisory 2015-046
Mandriva Linux Security Advisory 2015-046 - Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. [ + ]
Wed, 13 Feb 2013 11:12:37 GMT
Novell ZENworks Configuration Management Remote Execution
This Metasploit module exploits a code execution flaw in Novell ZENworks Configuration Management 10 SP3 and 11 SP2. The vulnerability exists in the ZEnworks Control Center application, allowing an unauthenticated attacker to upload a malicious file outside of the TEMP directory and then make a second request that allows for arbitrary code execution. This Metasploit module has been tested successfully on Novell ZENworks Configuration Management 10 SP3 and 11 SP2 on Windows 2003 SP2 and SUSE Linux Enterprise Server 10 SP3. [ + ]
Wed, 13 Feb 2013 11:12:33 GMT
Secunia Security Advisory 52149
Secunia Security Advisory - SUSE has issued an update for ruby on rails. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks and to compromise a vulnerable system. [ + ]
Wed, 13 Feb 2013 11:12:21 GMT
Secunia Security Advisory 52153
Secunia Security Advisory - SUSE has issued an update for libvirt. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [ + ]
Wed, 13 Feb 2013 11:12:18 GMT
Secunia Security Advisory 52135
Secunia Security Advisory - SUSE has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to conduct clickjacking attacks. [ + ]
Wed, 13 Feb 2013 10:56:14 GMT
Secunia Security Advisory 52077
Secunia Security Advisory - SUSE has issued an update for libvirt. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system. [ + ]
Wed, 13 Feb 2013 10:56:01 GMT
Secunia Security Advisory 52152
Secunia Security Advisory - SUSE has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [ + ]
Wed, 13 Feb 2013 04:59:55 GMT
Secunia Security Advisory 52151
Secunia Security Advisory - SUSE has issued an update for flash-player. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. [ + ]
Tue, 12 Feb 2013 06:40:42 GMT
Secunia Security Advisory 52204
Secunia Security Advisory - SUSE has issued an update for opera. This fixes a vulnerability with an unknown impact. [ + ]
Tue, 12 Feb 2013 06:40:05 GMT
Secunia Security Advisory 52150
Secunia Security Advisory - SUSE has issued an update for opera. This fixes multiple vulnerabilities, where one has an unknown impact and others can be exploited by malicious people to compromise a user's system. [ + ]
Mon, 11 Feb 2013 06:47:31 GMT
Secunia Security Advisory 52148
Secunia Security Advisory - SUSE has issued an update for gnutls. This fixes a vulnerability, which can be exploited by malicious people to potentially cause a DoS (Denial of Service) in an application using the library. [ + ]
Mon, 11 Feb 2013 06:47:27 GMT
Secunia Security Advisory 52159
Secunia Security Advisory - SUSE has issued an update for MySQL. This fixes multiple vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct brute force attacks. [ + ]
Thu, 07 Feb 2013 07:10:05 GMT
Secunia Security Advisory 52160
Secunia Security Advisory - SUSE has issued an update for kernel. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [ + ]
Thu, 07 Feb 2013 07:10:02 GMT
Secunia Security Advisory 52049
Secunia Security Advisory - SUSE has issued an update for v8. This fixes two vulnerabilities, which can be exploited by malicious people to compromise an application using the library. [ + ]
Thu, 07 Feb 2013 07:09:56 GMT
Secunia Security Advisory 52113
Secunia Security Advisory - SUSE has issued an update for apache2. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [ + ]
Thu, 07 Feb 2013 06:50:11 GMT
Secunia Security Advisory 52111
Secunia Security Advisory - SUSE has issued an update for apache2. This fixes two weaknesses, a security issue, and a vulnerability, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to bypass certain security restrictions and conduct cross-site scripting attacks. [ + ]
Mon, 04 Feb 2013 06:43:18 GMT
Secunia Security Advisory 52124
Secunia Security Advisory - SUSE has issued an update for libupnp. This fixes three vulnerabilities, which can be exploited by malicious people to compromise an application using the library. [ + ]
Mon, 04 Feb 2013 04:57:58 GMT
Secunia Security Advisory 52044
Secunia Security Advisory - SUSE has issued an update for virtualbox. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [ + ]
Mon, 28 Jan 2013 06:24:14 GMT
Secunia Security Advisory 52039
Secunia Security Advisory - SUSE has issued an update for chromium. This fixes multiple vulnerabilities, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. [ + ]
Fri, 25 Jan 2013 03:09:16 GMT
Secunia Security Advisory 52008
Secunia Security Advisory - SUSE has issued an update for java-1_7_0-openjdk. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. [ + ]
Fri, 25 Jan 2013 03:09:09 GMT
Secunia Security Advisory 51947
Secunia Security Advisory - SUSE has issued an update for WebYaST and SUSE Studio Standard Edition. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data. [ + ]

Secunia Security Advisory 51973
Secunia Security Advisory - SUSE has issued an updated for libtiff. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system. [ + ]
PacketStorm Security

Booking.com B.V. is based in Amsterdam in the Netherlands. Ready for some statistics? Our 1,534,024 properties, including 860,482 holiday rentals, are located in 123,105 destinations in 229 countries and territories, and are supported internationally by 198 offices in 70 countries.
2013 Copyright Techhap.com Mobile version 2015 | PeterLife & company
Skimlinks helps publishers monetize editorial content through automated affiliate links for products. Affiliate programm.
Link at is mandatory if site materials are using fully or particulary.
Were treated to the site administrator, a cup of coffee *https://paypal.me/peterlife
Yandex.ru