본문 바로가기

취약점 정보2

apache Struts 업데이트 안내 (S2-052) Possible Remote Code Execution attack when using the Struts REST plugin with XStream handler to handle XML payloads Who should read this All Struts 2 developers and users Impact of vulnerability A RCE attack is possible when using the Struts REST plugin with XStream handler to deserialise XML requests Maximum security rating Critical Recommendation Upgrade to Struts 2.5.13 Affected Software Stru.. 더보기
iptime 업데이트 Iptime T3008 ◾ 변경사항 1. SDK업데이트 2. 링크설정정보 문제점 해결 ipTIME A704NS-BCM ◾ 변경사항 1. 일부 USB저장장치가 Sleep모드로 전환되지 않는 문제점 해결 2. UI 개선 ipTIME A3004NS-BCM ◾ 변경사항 1. 일부 USB저장장치가 Sleep모드로 전환되지 않는 문제점 해결 2. UI 개선 ipTIME A2003NS-MU ◾ 변경사항 1. 10.00.8 버전으로 자동업그레이드가 되지 않는 문제 해결 2. USB 테더링 기능 추가 3. UI 개선 더보기
libgd2 security update Package : libgd2 CVE ID : CVE-2017-6362 A double-free vulnerability was discovered in the gdImagePngPtr() function in libgd2, a library for programmatic graphics creation and manipulation, which may result in denial of service or potentially the execution of arbitrary code if a specially crafted file is processed. For the oldstable distribution (jessie), this problem has been fixed in version 2... 더보기
어도비 제품군 업데이트 안내 The Security Bulletin (APSB17-24) published on August 8 regarding updates for Adobe Acrobat and Reader has been updated to reflect the availability of new updates as of August 29. The August 29 updates resolve a functional regression with XFA forms functionality that affected some users, as well as provide a resolution to security vulnerability CVE-2017-11223. This CVE was originally addressed i.. 더보기
ffmpeg security update Several vulnerabilities have been discovered in FFmpeg, a multimedia player, server and encoder. These issues could lead to Denial-of-Service and, in some situation, the execution of arbitrary code. CVE-2017-9608 Yihan Lian of Qihoo 360 GearTeam discovered a NULL pointer access when parsing a crafted MOV file. CVE-2017-9993 Thierry Foucu discovered that it was possible to leak information from f.. 더보기
WinDbg 업데이트 윈도우즈 커널 디버깅의 필수품이자 그 강력한 기능에도 불구하고, CLI 인터페이스만 제공해(제한적 GUI) 접근성이 떨어지던 WinDbg 가 Metro UI 로 업그레이드 됐다. 분석가들에게 희소식. 아래는 업데이트 된 기능https://developer.microsoft.com/en-us/windows/hardware/download-windbghttps://www.microsoft.com/en-us/store/p/windbg/9pgjgd53tn86 [출처] 2017.08.30 – Daily Security Issue (바이러스 제로 시즌 2) |작성자 쩜핑고래 더보기
Lg 모바일 8월 업데이트 안내 LG Mobile Security Maintenance Release Summary (SMR)The August Security Bulletin contains the 61 patches for the vulnerabilities from Google and LGE. The most severe of these issues is a critical security vulnerability in Media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. It also includes patche.. 더보기
삼성 모바일 8월 업데이트 안내 SMR-AUG-2017 Samsung Mobile is releasing a maintenance release for major flagship models as part of monthly Security Maintenance Release (SMR) process. This SMR package includes patches from Google and Samsung. Google patches include patches up to Android Security Bulletin - August 2017 package. The Bulletin (August 2017) contains the following CVE items: Critical: CVE-2017-0714, CVE-2017-0715, .. 더보기
Apache2Triad 1.5.4 CSRF / XSS / Session Fixation Apache2Triad v1.5.4 Apache2Triad spells instant and facile deployment of web software on any windows server along the lines of the WAMP paradigm in a point and click manner in just minutes and is a ideal solution for the setup of server farms. Vulnerability Type(s): ====================== Session Fixation Cross Site Request Forgery Persistent Cross Site Scripting CVE Reference: ============== CV.. 더보기
Microsoft Resnet - DNS Configuration Web Vulnerability Microsoft Resnet - DNS Configuration Web Vulnerability References (Source): ==================== https://www.vulnerability-lab.com/get_content.php?id=2087 Acknowledgements: https://technet.microsoft.com/en-us/security/cc308589.aspx Release Date: ============= 2017-08-16 Vulnerability Laboratory ID (VL-ID): ==================================== 2087 Common Vulnerability Scoring System: ===========.. 더보기