[FD] AxxonSoft Axxon Next - AxxonSoft Client Directory Traversal via an initial /css//..%2f substring in a URI. CVE-2018-7467

2018-02-27 Thread Anthony Cicalla
Title AxxonSoft Axxon Next - AxxonSoft Client Directory Traversal via an initial /css//..%2f substring in a URI. CVE-2018-7467 [Vulnerability Type] Directory Traversal via an initial /css//..%2f substring in a URI [Vendor of Product] AxxonSoft Client [Affected Product Code Base] Axxon Next

Re: [FD] Defense in depth -- the Microsoft way (part 51): Skype's home-grown updater allows escalation of privilege to SYSTEM

2018-02-27 Thread Stefan Kanthak
"Kevin Beaumont" wrote: >I did a fresh install of Win7 Home yesterday and can confirm impacted Skype > version was offered by Windows Update for install. Thanks for the confirmation. See for my writeup of Skype's and Microsoft's epic failures i

[FD] ES2018-04 Asterisk pjsip tcp segfault

2018-02-27 Thread Sandro Gauci
# Crash occurs when sending a repeated number of INVITE messages over TCP or TLS transport - Authors: - Alfred Farrugia - Sandro Gauci - Latest vulnerable version: Asterisk 15.2.0 running `chan_pjsip` installed with `--with-pjproject-bundled` - References: AST-2018-005, CVE-2018-7286 -

[FD] ES2018-03 Asterisk pjsip sdp invalid media format description segfault

2018-02-27 Thread Sandro Gauci
# Segmentation fault occurs in Asterisk with an invalid SDP media format description - Authors: - Alfred Farrugia - Sandro Gauci - Latest vulnerable version: Asterisk 15.2.0 running `chan_pjsip` - References: AST-2018-002 - Enable Security Advisory:

[FD] ES2018-02 Asterisk pjsip sdp invalid fmtp segfault

2018-02-27 Thread Sandro Gauci
# Segmentation fault occurs in asterisk with an invalid SDP fmtp attribute - Authors: - Alfred Farrugia - Sandro Gauci - Latest vulnerable version: Asterisk 15.2.0 running `chan_pjsip` - References: AST-2018-003 - Enable Security Advisory:

[FD] ES2018-01 Asterisk pjsip subscribe stack corruption

2018-02-27 Thread Sandro Gauci
# SUBSCRIBE message with a large Accept value causes stack corruption - Authors: - Alfred Farrugia - Sandro Gauci - Latest vulnerable version: Asterisk 15.2.0 running `chan_pjsip` - Tested vulnerable versions: 15.2.0, 13.19.0, 14.7.5, 13.11.2 - References: AST-2018-004, CVE-2018-7284

[FD] Download Protection Bypass in Google’s Chrome (multiple)

2018-02-27 Thread Nightwatch Cybersecurity Research
[Blog post here: https://wwws.nightwatchcybersecurity.com/2018/02/26/multiple-instances-of-download-protection-bypass-in-googles-chrome/] SUMMARY We have found several instances of files bypassing the download protection offered by Google’s Chrome browser. All of these have been reported to the v

[FD] Auto-detection of Compressed Files in Apple’s macOS

2018-02-27 Thread Nightwatch Cybersecurity Research
[On the web here: https://wwws.nightwatchcybersecurity.com/2018/02/25/research-compressed-files-auto-detection-on-macos/] [NOTE: This was originally discovered as a result of a different set of bugs in Google’s Chrome browser, details of which will be posted soon. While the impact of this particul

[FD] ActivePDF Toolkit < 8.1.0 multiple RCE

2018-02-27 Thread François Goichon via Fulldisclosure
ActivePDF Toolkit < 8.1.0 multiple RCE Introduction The ActivePDF Toolkit is a Windows library which enhances business processes to stamp, stitch, merge, form-fill, add digital signatures, barcodes to PDF. Both .NET and native APIs are provided. Amongst many other operations, this li

[FD] SEC Consult SA-20180227-0 :: OS command injection, arbitrary file upload & SQL injection in ClipBucket

2018-02-27 Thread SEC Consult Vulnerability Lab
SEC Consult Vulnerability Lab Security Advisory < 20180227-0 > === title: OS command injection, arbitrary file upload & SQL injection product: ClipBucket vulnerable version: <4.0.0 -