[PTResearch] SAP DIAG Decompress plugin for Wireshark

2011-10-14 Thread noreply
---[ SAP DIAG Decompress plugin for Wireshark

SAP DIAG Plugin extends the basic functionality of the WireShark network packet 
analyzer and provides additional features of SAP DIAG protocol analysis. This 
extension allows one to collect and decompress SAP DIAG packets in the course 
of interaction between SAP FronTend client software and SAP application servers.

Version: 0.1b
License: AS IS

More info and Download URL:
http://ptresearch.blogspot.com/2011/10/sap-diag-decompress-plugin-for.html

Thx!


DC4420 - London DEFCON - October meet - Tuesday October 18th 2011

2011-10-14 Thread Major Malfunction
As we've had a bit of a break, we've lined up something special this 
month, and, of course, your livers will be in great shape for a bit of 
extra abuse... :P


We're going to give this one plenty of headroom, so only one talk this time:

  Glenn of Sensepost will be 'hacking Penny Auctions'...

Meeting is *** DOWNSTAIRS ***

Room is ours from 17:30, talks kick off at 19:30

Venue is here:

   http://www.phoenixcavendishsquare.co.uk/

2 minutes walk from Oxford Circus tube.

Date:

   Tuesday 18th October 2011

Time:

   17:30 till kicking out

Place:

   The Phoenix
   37 Cavendish Square
   London
   W1G 0PP

As always, all this year's dates are posted on the website:

   http://www.dc4420.org

Hope to see you all there!

cheers,
MM
--
"In DEFCON, we have no names..." errr... well, we do... but silly ones...


[ GLSA 201110-11 ] Adobe Flash Player: Multiple vulnerabilities

2011-10-14 Thread Tim Sammut
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201110-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Adobe Flash Player: Multiple vulnerabilities
 Date: October 13, 2011
 Bugs: #354207, #359019, #363179, #367031, #370215, #372899,
   #378637, #384017
   ID: 201110-11

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities in Adobe Flash Player might allow remote
attackers to execute arbitrary code or cause a Denial of Service.

Background
==

The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  www-plugins/adobe-flash   < 10.3.183.10   >= 10.3.183.10

Description
===

Multiple vulnerabilities have been discovered in Adobe Flash Player.
Please review the CVE identifiers and Adobe Security Advisories and
Bulletins referenced below for details.

Impact
==

By enticing a user to open a specially crafted SWF file a remote
attacker could cause a Denial of Service or the execution of arbitrary
code with the privileges of the user running the application.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Adobe Flash Player users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-10.3.183.10"

References
==

[  1 ] APSA11-01
   http://www.adobe.com/support/security/advisories/apsa11-01.html
[  2 ] APSA11-02
   http://www.adobe.com/support/security/advisories/apsa11-02.html
[  3 ] APSB11-02
   http://www.adobe.com/support/security/bulletins/apsb11-02.html
[  4 ] APSB11-12
   http://www.adobe.com/support/security/bulletins/apsb11-12.html
[  5 ] APSB11-13
   http://www.adobe.com/support/security/bulletins/apsb11-13.html
[  6 ] APSB11-21
   https://www.adobe.com/support/security/bulletins/apsb11-21.html
[  7 ] APSB11-26
   https://www.adobe.com/support/security/bulletins/apsb11-26.html
[  8 ] CVE-2011-0558
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0558
[  9 ] CVE-2011-0559
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0559
[ 10 ] CVE-2011-0560
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0560
[ 11 ] CVE-2011-0561
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0561
[ 12 ] CVE-2011-0571
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0571
[ 13 ] CVE-2011-0572
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0572
[ 14 ] CVE-2011-0573
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0573
[ 15 ] CVE-2011-0574
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0574
[ 16 ] CVE-2011-0575
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0575
[ 17 ] CVE-2011-0577
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0577
[ 18 ] CVE-2011-0578
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0578
[ 19 ] CVE-2011-0579
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0579
[ 20 ] CVE-2011-0589
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0589
[ 21 ] CVE-2011-0607
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0607
[ 22 ] CVE-2011-0608
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0608
[ 23 ] CVE-2011-0609
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0609
[ 24 ] CVE-2011-0611
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0611
[ 25 ] CVE-2011-0618
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0618
[ 26 ] CVE-2011-0619
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0619
[ 27 ] CVE-2011-0620
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0620
[ 28 ] CVE-2011-0621
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0621
[ 29 ] CVE-2011-0622
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0622
[ 30 ] CVE-2011-0623
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0623
[ 31 ] CVE-2011-0624
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0624
[ 32 ] CVE-2011-0625
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0625
[ 33 ] CVE-2011-0626
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0626
[ 34 ] CVE-2011-0627
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0627
[ 35 ] CVE-2011-0628
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0628
[ 36 ] CVE-2011-2107
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2107
[ 37 ] CVE-2011-2110
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2110
[ 38 ] CVE-2011-2125
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2135
[ 39 ] CVE-20

[ GLSA 201110-10 ] Wget: User-assisted file creation or overwrite

2011-10-14 Thread Tim Sammut
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201110-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Wget: User-assisted file creation or overwrite
 Date: October 13, 2011
 Bugs: #329941
   ID: 201110-10

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Insecure usage of server provided filenames may allow the creation or
overwriting of local files.

Background
==

GNU Wget is a free software package for retrieving files using HTTP,
HTTPS and FTP, the most widely-used Internet protocols.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-misc/wget   < 1.12-r2 >= 1.12-r2

Description
===

It was discovered that Wget was unsafely trusting server-provided
filenames. This allowed attackers to overwrite or create files on the
user's system by sending a redirect from the expected URL to another
URL specifying the targeted file.

Impact
==

An unauthenticated remote attacker may be able to create or overwrite
local files by enticing the user to open an attacker controlled URL,
possibly leading to execution of arbitrary code.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Wget users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-misc/wget-1.12-r2"

NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since September 19, 2010. It is likely that your system is
already no longer affected by this issue.

References
==

[ 1 ] CVE-2010-2252
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2252

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 http://security.gentoo.org/glsa/glsa-201110-10.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2011 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[ GLSA 201110-09 ] Conky: Privilege escalation

2011-10-14 Thread Stefan Behte
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201110-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Conky: Privilege escalation
 Date: October 13, 2011
 Bugs: #354061
   ID: 201110-09

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A privilege escalation vulnerability was found in Conky.

Background
==

Conky is an advanced, highly configurable system monitor for X.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  app-admin/conky < 1.8.1-r2   >= 1.8.1-r2

Description
===

A privilege escalation vulnerability due to an insecure temporary file
was found in Conky.

Impact
==

A local attacker could possibly overwrite arbitrary files with the
privileges of the user running Conky.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Conky users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-admin/conky-1.8.1-r2"

References
==

[ 1 ] CVE-2011-3616
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3616

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 http://security.gentoo.org/glsa/glsa-201110-09.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2011 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[ GLSA 201110-08 ] feh: Multiple vulnerabilities

2011-10-14 Thread Stefan Behte
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201110-08
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: High
Title: feh: Multiple vulnerabilities
 Date: October 13, 2011
 Bugs: #325531, #354063
   ID: 201110-08

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities were found in feh, the worst of which leading
to remote passive code execution.

Background
==

feh is a fast, lightweight imageviewer using imlib2.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  media-gfx/feh < 1.12 >= 1.12

Description
===

Multiple vulnerabilities have been discovered in feh. Please review the
CVE identifiers referenced below for details.

Impact
==

A malicious entity might entice a user to visit a URL using the
--wget-timestamp option, thus executing arbitrary commands via shell
metacharacters; a malicious local user could perform a symlink attack
and overwrite arbitrary files.

Workaround
==

There is no known workaround at this time.

Resolution
==

All feh users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=media-gfx/feh-1.12"

References
==

[ 1 ] CVE-2010-2246
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2246
[ 2 ] CVE-2011-0702
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0702
[ 3 ] CVE-2011-1031
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1031

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 http://security.gentoo.org/glsa/glsa-201110-08.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2011 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature