Twitter
LinkedIn
RSS

About Perry Varanoid

Perry Varanoid has been a member since July 8th 2011, and has created 30132 posts from scratch.

Perry Varanoid's Bio

Perry Varanoid's Websites

This Author's Website is

Perry Varanoid's Recent Articles

VU#565580: BulletProof FTP Client 2010 is vulnerable to a stack-based buffer overflow

Vulnerability Note VU#565580

BulletProof FTP Client 2010 is vulnerable to a stack-based buffer overflow

Original Release date: 24 Jul 2014 | Last revised: 24 Jul 2014

Overview

BulletProof FTP Client 2010 is vulnerable to a stack-based buffer overflow

Description

CWE-121 - Stack-based Buffer Overflow
BulletProof FTP Client 2010 does not check the length of the host parameter set in the quick connect bar. A long host value causes a stack-based buffer overflow, possibly allowing for arbitrary code execution.

Impact

A local attacker may be able to overwrite the stack memory causing the process to crash or create unpredictable behavior. It is possible that this vulnerability may be used to execute arbitrary code in the context of the logged in user.

Solution

The CERT/CC is currently unaware of a practical solution to this problem.

Use the Microsoft Enhanced Mitigation Experience Toolkit

The Microsoft Enhanced Mitigation Experience Toolkit (EMET) can be used to help prevent exploitation of this vulnerability. CERT/CC has created a video tutorial for setting up EMET 3.0 on Windows 7. Note that platforms that do not support ASLR, such as Windows XP and Windows Server 2003, will not receive the same level of protection that modern Windows platforms will.

Vendor Information (Learn More)

Vendor Status Date Notified Date Updated
Cobham plc Not Affected - 24 Jul 2014

If you are a vendor and your product is affected, let
us know
.

CVSS Metrics (Learn More)

Group Score Vector
Base 4.3 AV:L/AC:L/Au:S/C:P/I:P/A:P
Temporal 3.9 E:POC/RL:U/RC:C
Environmental 2.9 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Gabor Seljan for reporting this vulnerability.

This document was written by Chris King.

Other Information

  • CVE IDs:
    CVE-2014-2973
  • Date Public:
    24 Jul 2014
  • Date First Published:
    24 Jul 2014
  • Date Last Updated:
    24 Jul 2014
  • Document Revision:
    12

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

The original article/video can be found at VU#565580: BulletProof FTP Client 2010 is vulnerable to a stack-based buffer overflow

Fake Googlebots Used for Layer 7 DDoS Attacks: researchers show that 34.5% of fake crawlers were explicitly malicious

13 retweets 1 favorites

The original article/video can be found at Fake Googlebots Used for Layer 7 DDoS Attacks: researchers show that 34.5% of fake crawlers were explicitly malicious

VU#669804: TestRail cross-site scripting vulnerability

Vulnerability Note VU#669804

TestRail cross-site scripting vulnerability

Original Release date: 24 Jul 2014 | Last revised: 24 Jul 2014

Overview

TestRail version 3.1.1.3130 contains a cross-site scripting vulnerability.

Description

CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)

Gurock Software TestRail version 3.1.1.3130 contains a stored cross-site scripting vulnerability. The Created By field in project activities is vulnerable to script injection.

Impact

A remote attacker may be able to execute arbitrary script in the context of the end-user’s browser session.

Solution

Apply a Patch
Gurock Software has released an update (Testrail 3.1.3) addressing this vulnerability.

Vendor Information (Learn More)

Vendor Status Date Notified Date Updated
Gurock Software GmbH Affected 18 Jul 2014 24 Jul 2014

If you are a vendor and your product is affected, let
us know
.

CVSS Metrics (Learn More)

Group Score Vector
Base 5.0 AV:N/AC:L/Au:N/C:N/I:P/A:N
Temporal 4.1 E:F/RL:OF/RC:C
Environmental 0.0 CDP:N/TD:N/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to the reporter who wishes to remain anonymous.

This document was written by Chris King.

Other Information

  • CVE IDs:
    CVE-2014-4857
  • Date Public:
    24 Jul 2014
  • Date First Published:
    24 Jul 2014
  • Date Last Updated:
    24 Jul 2014
  • Document Revision:
    11

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

The original article/video can be found at VU#669804: TestRail cross-site scripting vulnerability

How to source cyber threat intelligence. Number 1 idea? Invest your time in trusted #infosec forums: that gift is key

6 retweets 2 favorites

The original article/video can be found at How to source cyber threat intelligence. Number 1 idea? Invest your time in trusted #infosec forums: that gift is key

BOYD, CYOD, COPE – acronym soup and sensible advice: 5 things to help build good #infosec strategies

2 retweets 1 favorites

The original article/video can be found at BOYD, CYOD, COPE – acronym soup and sensible advice: 5 things to help build good #infosec strategies