Adobe Acrobat 9.1.2 NOS Local Privilege Escalation Exploit
This exploit is based on the brief information provided by
Nine:Situations:Group (http://www.milw0rm.com/exploits/9199).
Exploiting improper permissions is fun.
A few notes are in order though. The getPlus service (that I tested,
via 9.1
ZDI-09-046: Novell Privileged User Manager Remote DLL Injection
Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-09-046
July 21, 2009
-- Affected Vendors:
Novell
-- Affected Products:
Novell Privileged User Manager
-- Vulnerability Details:
This vulnerability allows remote attackers
On Tue, 21 Jul 2009, Thierry Zoller wrote:
> Yeah, security is too complex. Dude, the fix was to LIMIT the the
> number of elements. This is not rocket science.
I believe Michal and I are having the conversation in a larger context.
What you found is valid on its own merit and got addressed, wh
On Tue, 21 Jul 2009, Michal Zalewski wrote:
> The code created an oversized list, which does not seem to be that far
> from creating an overly nested DOM tree, or drawing an oversized CANVAS
> shape, or any other creating-too-many-things-for-the-renderer-to-handle
> attacks... but really, I'm not
Hi Steven,
SMC> we will quickly run
SMC> into lots of complexity that may well enter the realm of undecidable
SMC> problems,
Yeah, security is too complex. Dude, the fix was to LIMIT the
the number of elements. This is not rocket science.
--
http://blog.zoller.lu
Thierry Zoller
> Yes, we all know that. The flaw here was not looping on itself a
> thousands of times, wow. It was a DOM implementation flaw.
The code created an oversized list, which does not seem to be that far
from creating an overly nested DOM tree, or drawing an oversized
CANVAS shape, or any oth
Hi Michal,
Yes, we all know that. The flaw here was not looping on itself a
thousands of times, wow. It was a DOM implementation flaw. That's
what made it interesting. A border case that was not accounted for.
That's all, still interesting. I don't see how Javascripts endless
loops
> + The bug was present in a 9 year old version of Netscape - draw your own
> conclusions.
There are literally thousands of HTML- and JavaScript-related denial
of service vectors in modern browsers. If you want a silly, ad hoc
example I just made up on the spot (and so could any reader of the
list
I understand what you're saying, but you're not so good at explaining things
like this in a clear manner. What I understand from reading your studies, is
that gmail implements one of two (or possibly both) systems where
authentication is forcefully denied (to either the IP or the account):
i. I
Advisory Title: mChek 3.4 Information Disclosure
Advisory ID: FSSA-2009-0401
Author: Gursev Kalra (gursev.ka...@foundstone.com)
Vendor Contact Date: 4/21/2009 (Vendor notified by email)
Release Date: 07/21/2009
Platform: Symbian OS 9.1, Series 60 v3.0. Other mobile platforms might behave
in same w
===
'Celebrating 40 years of Apollo and 20 years of buffer overflows'
===
INFIGO IS Security Advisory #ADV-2009-07-09
http://www.infigo.hr/en/
Hello Jeremiah!
It's possible that Microsoft made IE8 more stable then IE6, so you have such
result with this exploit.
Also take into account the hardware of your computer. If your computer is
powerful enough, then this attack on IE8 and even on IE6 and IE7 can be not
so effective (because it's
I've tested this DoS on Internet Explorer 8, does not significantly impact my
system.
-Original Message-
From: MustLive [mailto:mustl...@websecurity.com.ua]
Sent: Sunday, July 19, 2009 10:33 AM
To: bugtraq@securityfocus.com
Subject: DoS vulnerabilities in Firefox, Internet Explorer, Oper
One bug to rule them all
IE5,IE6,IE7,IE8,Netscape,Firefox,Safari,Opera,Konqueror,
Seamonkey,Wii,PS3,iPhone,iPod,Nokia,Siemens and more.
__
14 matches
Mail list logo