## Securitylab.ir
# Application Info:
# Name: PHP168
# Version: 6.0
#
# Discoverd By: Securitylab.ir
# Website: http://securitylab.ir
# Contacts: admin[at]securitylab.ir
Hi all,
We've developed a Wireshark plugin that will allow you to view obfuscated
pcaps of traffic from a Mariposa infected client and actually decrypt them
within Wireshark. The software is available to all as open source software
under the GNU GPL license. We hope that it helps in doing
On Tue, Oct 27, 2009 at 4:29 AM, Tony Finch d...@dotat.at wrote:
According to POSIX, if you open the directory with O_SEARCH then openat()
does not re-check search (+x) permissions.
I stand corrected. (Though my test system doesn't appear to have O_SEARCH.)
Symantec multiple products - Generic PDF bypass
***
Cheap plug :
On 27.10.2009 14:04, Vincent Zweije wrote:
On Mon, Oct 26, 2009 at 12:14:36PM -0400, Stephen Harris wrote:
|| User1 creates file with permissions 0644
|| User2 opens file for read access on file descriptor 4
|| User1 chmod's directory to 0700
|| User1 chmod's file to
==
Secunia Research 28/10/2009
- Mozilla Firefox Floating Point Memory Allocation Vulnerability -
==
Table of Contents
Affected
#2009-015 KDE multiple issues
Description:
KDE, an open source desktop environment, suffers from several bugs that
pose a security risk.
The oCERT team was contacted by Portcullis Security requesting help in
handling a series of issues reported to the KDE project back in July 2007.
Because of
My buy.. :-( I persumed a re-use of the read-only FD, but that's not
the case.
I replayed it on a test-box and did some strace meanwhile and also
took a look
at the sourcecode of kernel/fs/proc.
It seems that the /proc filedescriptor is directly referring the file
inode
When creating
On Mon, Oct 26, 2009 at 07:37:38PM +0100, Ansgar Wiechers wrote:
On 2009-10-24 Derek Martin wrote:
1. It circumvents the fact that to write to a file, you MUST be able
to write to its directory, so that the file attributes can be updated.
Wrong, because the file's attributes aren't stored
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1921-1 secur...@debian.org
http://www.debian.org/security/ Giuseppe Iuculano
October 28, 2009
Tony Finch d...@dotat.at wrote:
According to POSIX, if you open the directory with O_SEARCH then openat()
does not re-check search (+x) permissions.
My 2.6.26 kernel (or Debian lenny) does not seem to know about O_SEARCH.
But anyway... even if openat() does not re-check permissions, it should
On Sat, Oct 24, 2009 at 10:36:11PM +0400, Dan Yefimov scribbled thusly:
Thus Debian kernel team should be blamed for that misbehaviour. Don't
worry, hardlinks behave just the same way, as you describe. Use authentic
Linux kernels, if you dislike that.
Shall we blame Red Hat too? Just tested
McAfee multiple products - Generic PDF detection bypass
***
Cheap plug :
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
VMware Security Advisory
Advisory ID: VMSA-2009-0015
Synopsis: VMware hosted products and ESX patches resolve two
security
Invalid #PF Exception Code in VMware can result in Guest Privilege Escalation
-
In protected mode, cpl is usually equal to the two least significant bits of
the cs register. However, there is an exception: in Virtual-8086
F-SECURE multiple products - Generic PDF detection bypass
***
Cheap plug
16 matches
Mail list logo