UAC Bypass Vulnerability on Windows 7 in Windows Script Host

2015-08-27 Thread vozzie
UAC Bypass Vulnerability in Windows Script Host. The Windows Script Host executables suffer from a vulnerability due to a missing embedded manifest. Using another exploit, the combination of wusa.exe and makecab.exe files can be copied to the Windows folder. Copies of a manifest and the script

[security bulletin] HPSBGN03402 rev.2 - HP Performance Manager, Remote Disclosure of Information

2015-08-27 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04772190 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04772190 Version: 2 HPSBGN03402

[SECURITY] [DSA 3344-1] php5 security update

2015-08-27 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-3344-1 secur...@debian.org https://www.debian.org/security/ Sebastien Delafond August 27, 2015

Re: UAC Bypass Vulnerability on Windows 7 in Windows Script Host

2015-08-27 Thread Rich Pieri
On 8/26/15 8:09 PM, voz...@gmail.com wrote: Both ZDI and Microsoft are aware of this issue, expectedly ZDI didn't accept the admission because it's not a remote vulnerability. Surprisingly Microsoft didn't accept the vulnerability because UAC isn't considered a security boundary. UAC is not a

[security bulletin] HPSBHF03408 rev.1 - HP PCs with HP lt4112 LTE/HSPA+ Gobi 4G Module, Remote Execution of Arbitrary Code

2015-08-27 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04773272 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04773272 Version: 1 HPSBHF03408