Search n00bz.net

Entries in Core Impact Pro (1)

Monday
Jun142010

Released Updates for Core IMPACT Professional last week

Archive Searcher Zip Buffer Overflow Exploit (NOCVE-9999-43282)

Released: 2010-06-07

Category: Exploits/Client Side

Targets: Windows

 

The vulnerability is caused due to a boundary error in Archive Searcher Zip, when processing ZIP archives, which can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into searching in a specially crafted ZIP archive.

 

----------------------------------------------------------------------------

Novell ZENworks Configuration Management UploadServlet Remote Code Execution Exploit (NOCVE-9999-43302)

Released: 2010-06-07

Category: Exploits/Remote

Targets: Windows

 

A remote code execution vulnerability in the UploadServlet component of Novell ZENworks Configuration Management allows remote attackers to execute arbitrary code.

 

----------------------------------------------------------------------------

ZipWrangler Buffer Overflow Exploit (NOCVE-9999-43301)

Released: 2010-06-07

Category: Exploits/Client Side

Targets: Windows

 

ZipWrangler contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in ZipWrangler when handling .ZIP files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .ZIP file.

 

----------------------------------------------------------------------------

Microsoft Office PowerPoint Sound Data Exploit (MS09-017) (CVE-2009-1128)

Released: 2010-06-08

Category: Exploits/Client Side

Targets: Windows

 

Microsoft Office PowerPoint allows remote attackers to execute arbitrary code via crafted sound data in a file that uses a PowerPoint 95 native file format.

 

----------------------------------------------------------------------------

Adobe Acrobat Reader authplay Exploit (CVE-2010-1297)

Released: 2010-06-08

Category: Exploits/Client Side

Targets: Windows

 

This module exploits a vulnerability in Adobe Reader when parsing .PDF files. The vulnerability is caused due to a boundary error in authplay.dll when handling crafted malicious Flash (.SWF) file or by embedding a malicious Flash application in a .PDF file.

WARNING: This is an early release module. 

This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.

 

----------------------------------------------------------------------------

Exploit Improvements Update Package (CVE-2009-3676 CVE-2010-0016)

Released: 2010-06-10

Category: Denial of Service/Client Side

Targets: Windows

 

This update improves exploit functionality and exploit documentation.

 

----------------------------------------------------------------------------

Apple Safari Use-After-Free Rtl Exploit (CVE-2010-0049)

Released: 2010-06-10

Category: Exploits/Client Side

Targets: Windows

 

A use-after-free vulnerability in WebKit/Apple Safari (in versions prior to 4.0.5) allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via HTML elements with right-to-left (RTL) text directionality.

 

----------------------------------------------------------------------------

Microsoft Windows helpctr Invalid URL Processing Exploit (CVE-2010-1885)

Released: 2010-06-11

Category: Exploits/Client Side

Targets: Windows

 

This module exploits a vulnerability caused due to an error in the MPC::HTML::UrlUnescapeW() function in helpctr.exe when escaping URLs.

WARNING: This is an early release module.This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.

 

----------------------------------------------------------------------------