Might have been helpful to attach the advisory.
Tim
--
Tim Brown
mailto:t...@nth-dimension.org.uk
http://www.nth-dimension.org.uk/
NDSA20140311.txt.asc
Description: PGP signature
signature.asc
Description: This is a digitally signed message part.
been
disclosed by a 3rd party. In light of this and in the absence of any timely
response from BlackBerry, Nth Dimension have opted to make full details
public.
--
Tim Brown
mailto:t...@nth-dimension.org.uk
http://www.nth-dimension.org.uk/
signature.asc
Description: This is a digitally signed
VDBs, please note that the referenced CVE ID is wrong. CVE-2014-1643 was
actually assigned to this issue by Symantec.
Tim
--
Tim Brown
mailto:t...@65535.com
signature.asc
Description: This is a digitally signed message part.
and OpenVAS Administrator have also been created which incorporate
these patches.
Thanks
OpenVAS would like to thank Antonio Sanchez Arago for his help in reporting
the vulnerability and apologise to all concerned for the substantial delay
in triaging his report.
--
Tim Brown
mailto:t...@openvas.org
a patch which it is believed
successfully resolves the reported issue.
Thanks
Nth Dimension would like to thank all the security folk at RIM, in
particular the BlackBerry Incident Response team for the way they worked
to resolve the issue.
--
Tim Brown
mailto:t...@nth-dimension.org.uk
http://www.nth
releases of both 3.0.x
and 4.0.x have also been created which incorporate this patch.
Thanks
OpenVAS would like to thank Andre Heinecke of Greenbone Networks for
his help in reporting the vulnerability.
--
Tim Brown
mailto:timb@openvas,org
http://www.openvas.org/
OpenVAS Security Advisory
Doh, a document gets proof read by multiple people and yet it contains a
mistake. In the Current Status section of the advisory, the date is
incorrect. A corrected advisory is attached.
Tim
--
Tim Brown
mailto:timb@openvas,org
http://www.openvas.org/
OpenVAS Security Advisory (OVSA20121112
-dimension.org.uk/downloads.php?id=80 - Generic attack on
the QNX runtime linker which abuses an arbitrary file overwrite and race
condition to get root.
CVE-2011-4060.
Cheers,
Tim
--
Tim Brown
mailto:t...@nth-dimension.org.uk
http://www.nth-dimension.org.uk/
signature.asc
Description
this does not allow
the wrong file to be overwritten, after closing the default view, Ark will then
attempt to delete the temporary file which could result in the deletion of
the incorrect file.
After discussions with the vendor, CVE-2011-2725 was assigned to this
vulnerability.
Tim
--
Tim Brown
-2011-3366
* Arora - CVE-2011-3367
Note that no CVE has yet been assigned to Psi IM. Nokia have also
updated the QLabel class section of the Qt documentation to provide
updated security information regarding this issue.
--
Tim Brown
mailto:t...@nth-dimension.org.uk
http://www.nth-dimension.org.uk
to get root.
The paper is still a work in progress but both DB2 and QNX are available for
download if you want to take them for a spin. Anyway, enjoy!
Tim
--
Tim Brown
mailto:t...@nth-dimension.org.uk
http://www.nth-dimension.org.uk/
signature.asc
Description: This is a digitally signed
--
Tim Brown
mailto:t...@nth-dimension.org.uk
http://www.nth-dimension.org.uk/
NDSA20110321.txt.asc
Description: PGP signature
signature.asc
Description: This is a digitally signed message part.
On Tuesday 12 April 2011 03:36:24 Vincent Danen wrote:
* [2011-04-11 22:07:24 +0100] Tim Brown wrote:
I was recently taking a look at Konquerer and spotted an example of
universal XSS. Essentially, the error page displayed when a requested
URL is not available includes said URL. If said URL
of an arbitrary
file. Moreover the technique by which this can be achieved can be triggered
even where the binary being executed is setUID and is running as another user.
Tim
--
Tim Brown
mailto:t...@nth-dimension.org.uk
http://www.nth-dimension.org.uk/
NDSA20110310.txt.asc
Description: PGP signature
to thank Ronald Kingma and Alexander van Eee of ISSX for
their help in reporting the vulnerability.
--
Tim Brown
mailto:t...@openvas.org
http://www.openvas.org/
OpenVAS Security Advisory (OVSA20110118)
Date: 18th January 2011
Product: OpenVAS Manager = 1.0.3 and 2.0rc2
Vendor: OpenVAS http
.
Tim
--
Tim Brown
mailto:t...@nth-dimension.org.uk
http://www.nth-dimension.org.uk/
NDSA20100830.txt.asc
Description: PGP signature
signature.asc
Description: This is a digitally signed message part.
been defined. It's worth checking for this kind of thing in scripts
that may be run via sudo/su when auditing hosts. I don't believe it's a
vulnerability per se, but particular instances of broken scripts may well be.
Tim
--
Tim Brown
mailto:t...@nth-dimension.org.uk
http://www.nth
, an attacker probably doesn't need to make the distinction
anyway.
Tim
--
Tim Brown
mailto:t...@nth-dimension.org.uk
http://www.nth-dimension.org.uk/
signature.asc
Description: This is a digitally signed message part.
in that the administrative
interface can be disabled, I'm not convinced that making a C compiler
available over a network interface without authentication is sound practice,
especially when the resultant compiled code can be made to run as root rather
trivially.
Tim
--
Tim Brown
mailto:t...@nth
Hi,
I've identified a couple of security flaws affecting the NullLogic Groupware
which may allow compromise of accounts, denial of service or even remote code
execution. These issues were reported by email to the developer but no
response was forthcoming.
Tim
--
Tim Brown
mailto:t...@nth
Hi,
I've identified a couple of security flaws affecting the TekRADIUS radius
server for Windows which may allow privilege escalation. These issues were
reported by email to the vendor and have I believe been resolved.
Tim
--
Tim Brown
mailto:t...@nth-dimension.org.uk
http://www.nth
this flaw. An
advisory for this flaw which provides further information is attached. A
short analysis of Debian's response can be found at
http://www.nth-dimension.org.uk/blog.php?id=68.
Cheers,
Tim
--
Tim Brown
mailto:[EMAIL PROTECTED]
http://www.nth-dimension.org.uk/
NDSA20080215.txt.asc
or assigned to the best of my
knowledge.
Tim
--
Tim Brown
mailto:[EMAIL PROTECTED]
http://www.nth-dimension.org.uk/
Index: command.php
===
--- command.php (revision 412)
+++ command.php (working copy)
@@ -94,8 +94,15
-dimension.org.uk/downloads.php?id=34.
Remember, auditing systems without permission may be a crime, always read the
label.
Tim
--
Tim Brown
mailto:[EMAIL PROTECTED]
http://www.nth-dimension.org.uk/
does the trust model for gadgets consist of full trust
and nothing more. Why not allow gadgets to state in their manifest that for
example they don't need to execute things, won't make use of ActiveX controls
and will only connect to a specific host?
Tim
--
Tim Brown
mailto:[EMAIL PROTECTED]
(the default gadgets in Vista, in the case of
the PoC). Essentially anywhere a gadget calls for example eval() on
untrusted data you *may* have a a problem.
Tim
--
Tim Brown
mailto:[EMAIL PROTECTED]
analysis.
Tim
--
Tim Brown
mailto:[EMAIL PROTECTED]
paper can be found at http://www.portcullis-security.com/165.php.
Cheers,
Tim
--
Tim Brown
mailto:[EMAIL PROTECTED]
provide some
inspiration to others.
The full paper can be found at:
http://www.nth-dimension.org.uk/utils/get.php?downloadsid=35.
Cheers,
Tim
PS If anyone wants to try a release candidate of Fuzzled 1.1, contact me off
list and we'll see what we can do.
--
Tim Brown
mailto:[EMAIL PROTECTED
with the developers,
the holes have been resolved. Attached are the advisory and patch relating
to these flaws.
Tim
--
Tim Brown
mailto:[EMAIL PROTECTED]
http://www.nth-dimension.org.uk/
diff -Nru -x'*.png' -x'*.ini' -x'*.*sql' -x'*.patch' jffnms-0.8.3/htdocs/admin/adm/test.php jffnms-0.8.4-pre2/htdocs
in a
manner whereby they actually respond to the reports when contacted. Not
holding my breath though.
Tim
--
Tim Brown
mailto:[EMAIL PROTECTED]
http://www.nth-dimension.org.uk/
vendors who respond[1] quickly even more :).
[1] such as our alternate discussion
--
Tim Brown
mailto:[EMAIL PROTECTED]
http://www.nth-dimension.org.uk/
not
function adequately using either Firefox nor Konqueror.
Tim
--
Tim Brown
mailto:[EMAIL PROTECTED]
http://www.nth-dimension.org.uk/
Nth Dimension Security Advisory (NDSA20070412)
Date: 12th April 2007
Author: Tim Brown mailto:[EMAIL PROTECTED]
URL: http://www.nth-dimension.org.uk/ / http
available
on the 24th. Full details can be found in the attached advisory.
--
Tim Brown
mailto:[EMAIL PROTECTED]
http://www.nth-dimension.org.uk/
NDSA20070206.txt.asc
Description: application/pgp-keys
to attack other applications hosted on the same web server.
I contacted the author (Krischan Jodies - http://www.jodies.de/) on the 7th,
offering them 14 days to respond but have had no reply to acknowledge that
the problem even exists, I've decided to publish this warning.
Tim
--
Tim Brown, Nth
they never bothered to
acknowledge our contact last time, we're expecting no official response.
Hopefully this time they will be able to correct the bug in less than 4
months.
Cheers,
Tim
- --
Tim Brown
mailto:securityfocus;machine.org.uk
http://www.machine.org.uk/
-BEGIN PGP SIGNATURE-
Version
to acknowledge that the problem even exists,
I've decided to publish this warning:
- -BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Nth Dimension Security Advisory (NDSA20020719)
Date: 19th July 2002
Author: Tim Brown mailto:[EMAIL PROTECTED]
URL: http://www.nth-dimension.org.uk/ / http
37 matches
Mail list logo