[FD] [TZO-10-2020] - Bitdefender Malformed Archive bypass (RAR Compression Information)

2020-01-17 Thread Thierry Zoller
From the low-hanging-fruit-department Bitdefender Malformed Archive Bypass (RAR Compression Information) Release mode: Forced Dis

[FD] [TZO-09-2020] - Bitdefender Malformed Archive bypass (RAR Uncompressed Size)

2020-01-17 Thread Thierry Zoller
From the low-hanging-fruit-department Bitdefender Generic Malformed Archive Bypass (RAR Uncompressed Size) Release mode: Forced

[FD] .diagcab directory traversal leading to arbitrary code execution

2020-01-17 Thread Imre Rad
I identified a flaw in the implementation of Microsoft's Troubleshooter technology that could lead to remote code execution if a crafted .diagcab file is opened by the victim. The exploit leverages a rogue webdav server to trick MSDT to drop files to attacker controller locations on the file system

Re: [FD] Fortinet FortiSIEM Hardcoded SSH Key

2020-01-17 Thread Fortinet PSIRT
Hi, A patch to fix this issue is available to customers and detailed in the following public advisory at https://fortiguard.com/psirt/FG-IR-19-296. We can confirm that in addition to the automatic replies, emails were sent to Mr. Klaus on December 5th and December 24th. However, after some invest

[FD] CVE-2020-2696 - Local privilege escalation via CDE dtsession

2020-01-17 Thread Marco Ivaldi
Dear Full Disclosure, Please find attached an advisory for the following vulnerability, fixed in Oracle's Critical Patch Update (CPU) of January 2020: "A buffer overflow in the CheckMonitor() function in the Common Desktop Environment 2.3.1 and earlier and 1.6 and earlier, as distributed with O

[FD] CVE-2020-2656 - Low impact information disclosure via Solaris xlock

2020-01-17 Thread Marco Ivaldi
Dear Full Disclosure, Please find attached an advisory for the following vulnerability, fixed in Oracle's Critical Patch Update (CPU) of January 2020: "A low impact information disclosure vulnerability in the setuid root xlock binary distributed with Solaris may allow local users to read partia

[FD] CVE-2019-19697 / Trend Micro Security 2019 (Consumer) / Security Bypass Protected Service Tampering

2020-01-17 Thread hyp3rlinx
[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-SECURITY-BYPASS-PROTECTED-SERVICE-TAMPERING.txt [+] ISR: ApparitionSec [Vendor] www.trendmicro.com [Product] Trend Micro Security 201

[FD] CVE-2019-20357 / Trend Micro Security (Consumer) / Persistent Arbitrary Code Execution

2020-01-17 Thread hyp3rlinx
[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-SECURITY-CONSUMER-PERSISTENT-ARBITRARY-CODE-EXECUTION.txt [+] twitter.com/hyp3rlinx [+] ISR: ApparitionSec [Vendor] www.trendmicro.com [Product(s)] Tre