Chercher :
Newsletter :  


Revues :
- Presse
- Presse FR
- Vidéos
- Twitter
- Secuobs





Sommaires :
- Tendances
- Failles
- Virus
- Concours
- Reportages
- Acteurs
- Outils
- Breves
- Infrastructures
- Livres
- Tutoriels
- Interviews
- Podcasts
- Communiques
- USBsploit
- Commentaires


Revue Presse:
- Tous
- Francophone
- Par mot clé
- Par site
- Le tagwall


Top bi-hebdo:
- Ensemble
- Articles
- Revue
- Videos
- Twitter
- Auteurs


Articles :
- Par mot clé
- Par auteur
- Par organisme
- Le tagwall


Videos :
- Toutes
- Par mot clé
- Par site
- Le tagwall


Twitter :
- Tous
- Par mot clé
- Par compte
- Le tagwall


Commentaires :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS/XML :
- Articles
- Commentaires
- Revue
- Revue FR
- Videos
- Twitter


RSS SecuObs :
- sécurité
- exploit
- windows
- attaque
- outil
- microsoft


RSS Revue :
- security
- microsoft
- windows
- hacker
- attack
- network


RSS Videos :
- curit
- security
- biomet
- metasploit
- biometric
- cking


RSS Twitter :
- security
- linux
- botnet
- attack
- metasploit
- cisco


RSS Comments :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS OPML :
- Français
- International











Revue de presse francophone :
- Vigilance - Joomla Kunena Cross Site Scripting, analysé le 29 06 2015
- Vigilance - TYPO3 pagenotfoundhandling Cross Site Scripting, analysé le 29 06 2015
- Vigilance - Synology injection SQL de Video Station, analysé le 29 06 2015
- Vigilance - Synology Cross Site Scripting de Download Station, analysé le 29 06 2015
- Vigilance - Cisco Unified Communications Manager obtention de mots de passe via l'interface Web, analysé le 29 06 2015
- Vigilance - Cisco Unified Communications Manager injection SQL de IM, Presence, analysé le 29 06 2015
- Vigilance - Cisco Nexus 9000 Series obtention d'information, analysé le 29 06 2015
- Vigilance - CUPS buffer overflow de texttopdf, analysé le 29 06 2015
- Kaspersky Lab annonce Kaspersky Internet Security Multi Device 2016
- CloudBerry Lab est maintenant compatible avec Numergy Cloud
- Vigilance - Xen obtention d'information via usbback, analysé le 13 08 2015
- Digital Dimension acquiert 90 pourcents des parts de la société SynerTrade
- Skycure, la sécurité qui a du mal à comprendre
- Tor est dangereux, par Odin
- Un Hum dubitatif pour les idées de Verizon

Dernier articles de SecuObs :
- Renaud Bidou (Deny All): "L'innovation dans le domaine des WAFs s'oriente vers plus de bon sens et d'intelligence, plus de flexibilité et plus d'ergonomie"
- Mises à jour en perspective pour le système Vigik
- Les russes ont-ils pwn le système AEGIS ?
- Le ministère de l'intérieur censure une conférence au Canada
- Saut d'air gap, audit de firmware et (in)sécurité mobile au programme de Cansecwest 2014
- GCHQ: Le JTRIG torpille Anonymous qui torpille le JTRIG (ou pas)
- #FIC2014: Entrée en territoire inconnu
- Le Sénat investit dans les monnaies virtuelles
- #LPM2013: Un nouvel espoir ?
- L'ANSSI durcit le ton

Revue de presse internationale :
- Michigan s Catholic workers are latest cyber victims
- Software Release fwknop-2.6.7
- 2 Important Lessons to Learn From the Ashley Madison Hack
- Turning Programs against Each Other High Coverage Fuzz-Testing using Binary-Code Mutation and Dynamic Slicing by Ulf Karge?n and Nahid Shahmehri PDF
- 3D Printed Mini Vectrex
- Boston University notifies medical research participants after server compromise
- Duty of confidentiality trumps your desire to defend your reputation
- A Courtroom Victory For Microsoft In Cellphone-Related Patent Suit
- More reaction to the Third Circuit opinion in FTC v. Wyndham
- Small breach, big impact, redux
- MA Records request yields heavily redacted letter sent to state Attorney General in wake of Amherst website data disclosure
- If Our Eyes Could See Wireless Signals, They Wouldn t Look Like This.
- Popcorn Time Blames Hollywood For Its Popularity
- Driving a 7 Segment LED Display From An FT232
- Ashley Madison hack claims another victim Its CEO

Annuaire des videos
- FUZZING ON LINE PART THREE
- Official Maltego tutorial 5 Writing your own transforms
- Official Maltego tutorial 6 Integrating with SQL DBs
- Official Maltego tutorial 3 Importing CSVs spreadsheets
- install zeus botnet
- Eloy Magalhaes
- Official Maltego tutorial 1 Google s websites
- Official Maltego tutorial 4 Social Networks
- Blind String SQL Injection
- backdoor linux root from r57 php shell VPS khg crew redc00de
- How To Attaque Pc With Back Track 5 In Arabique
- RSA Todd Schomburg talks about Roundup Ready lines available in 2013
- Nessus Diagnostics Troubleshooting
- Panda Security Vidcast Panda GateDefender Performa Parte 2 de 2
- MultiPyInjector Shellcode Injection

Revue Twitter
- RT @fpalumbo: Cisco consistently leading the way ? buys vCider to boost its distributed cloud vision #CiscoONE
- @mckeay Looks odd... not much to go on (prob some slideshow/vid app under Linux)
- [SuggestedReading] Using the HTML5 Fullscreen API for Phishing Attacks
- RT @BrianHonan: Our problems are not technical but cultural. OWASP top 10 has not changed over the years @joshcorman #RSAC
- RT @mikko: Wow. Apple kernels actually have a function called PE_i_can_has_debugger:
- [Blog Spam] Metasploit and PowerShell payloads
- PinkiePie Strikes Again, Compromises Google Chrome in Pwnium Contest at Hack in the Box: For the second time thi...
- @mikko @fslabs y'all wldn't happen to have lat/long data sets for other botnets, wld you? Doing some research (free/open info rls when done)
- RT @nickhacks: Want to crash a remote host running Snow Leopard? Just use: nmap -P0 -6 --script=targets-ipv6-multicast-mld #wishiwaskidding
- An inexpensive proxy service called is actually a front for #malware distribution -

Mini-Tagwall
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone

+ de mots clés pour la revue de presse

Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit

+ de mots clés pour les videos

Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall

+ de mots clés pour la revue Twitter

Top bi-hebdo des articles de SecuObs
- [Sécurité et PHP - Partie 3] Les failles PHP
- Les avancées de DeDECTed pour l'écoute et l'enregistrement des appels effectués via les téléphones DECT
- EFIPW récupère automatiquement le mot de passe BIOS EFI des Macbook Pro avec processeurs Intel
- USBDumper 2 nouvelle version nouvelles fonctions !
- XMPPloit, un outil exploitant les vulnérabilités XMPP
- [Ettercap – Partie 2] Ettercap par l'exemple - Man In the Middle et SSL sniffing
- Mises à jour en perspective pour le système Vigik
- Maltego un outil de cartographie d’informations
- [IDS Snort Windows – Partie 2] Installation et configuration
- Les russes ont-ils pwn le système AEGIS ?

Top bi-hebdo de la revue de presse
- Titan Datacenter annonce la création d'un Datacentre de nouvelle génération
- FakeNet Windows Network Simulation Tool For Malware Analysis
- NetJapan signe un contrat exclusif pour la France avec Yves Lecomte Sofrad DS
- ARM ASLR bypass Buffer Overflow in Dlink router
- Hadopi décapitée
- Smart City le citoyen est devenu un acteur 2.0 de sa ville
- Fuites Ashley Madison, le syndrome Pastebin
- Xerox, du DRM dans les cartouches d imprimante
- No Limit Secu cette semaine sur les radios logicielles
- Remote Server Administration Tools for Windows 10 Released

Top bi-hebdo de l'annuaire des videos
- sniff password using Wireshark
- Official Maltego tutorial 5 Writing your own transforms
- Tutoriel Supprimer Cacaoweb Botnet
- kali linux Collecte d adresses Email avec Metasploit
- MaltegoCE Bugtraq Final t31m0
- Bugtraq 2 Blackwidow Botnets Crypters
- Avoir des donuts illimit s sur le jeu Simpsons Springfield
- Comment Pirater Un Ordinateur Avec Ubuntu Metasploit
- Official Maltego tutorial 4 Social Networks
- Backtrack 5r3 Armitage Metasploit

Top bi-hebdo de la revue Twitter
- RT @PowerDNS_Bert: @kolkman Please don't say DNSSEC would've prevented the problem though ;-)
- UPDATE: Nessus 5.0.2!
- “@michaeldinn: @Wh1t3Rabbit as an #infosec enabled human, would you store e-voting data in the cloud?” You're going to gave to qualify
- I think this months price for verified longest lifespan of a 0-day goes with 540 days to #SAP for DSECRG-12-036 ;(
- RT @StopMalvertisin: MMPC | MSRT thwarts rogues with just one scan
- Cisco Systems ends ZTE partnership
- RT @nickhacks: Want to crash a remote host running Snow Leopard? Just use: nmap -P0 -6 --script=targets-ipv6-multicast-mld #wishiwaskidding
- RT @curqq: I am a big fan of irony. Downloading a whitepaper on security from Huawei in PDF format. Worth getting pwned for
- One M. Kapor/OSAF chandlerproject.org goal: to provide p2p group collaboration. Realized it was hard and switched to WebDAV. Google Wave ...
- RT @mikko: Wow. Apple kernels actually have a function called PE_i_can_has_debugger:

Top des articles les plus commentés
- [Metasploit 2.x – Partie 1] Introduction et présentation
- Microsoft !Exploitable un nouvel outil gratuit pour aider les développeurs à évaluer automatiquement les risques
- Webshag, un outil d'audit de serveur web
- Les navigateurs internet, des mini-systèmes d’exploitation hors de contrôle ?
- Yellowsn0w un utilitaire de déblocage SIM pour le firmware 2.2 des Iphone 3G
- CAINE un Live[CD|USB] pour faciliter la recherche légale de preuves numériques de compromission
- Nessus 4.0 placé sous le signe de la performance, de l'unification et de la personnalisation
- [Renforcement des fonctions de sécurité du noyau Linux – Partie 1] Présentation
- [IDS Snort Windows – Partie 1] Introduction aux IDS et à SNORT
- Origami pour forger, analyser et manipuler des fichiers PDF malicieux



[Message Precedent sur la mailing][Message Suivant sur la mailing][Precedent dans le fil][Prochain dans le fil][Index par Date][Index par fil] [SA22084] Debian update for gnutls11 / gnutls13



Want to work within IT-Security?

Secunia is expanding its team of highly skilled security experts.

We will help with relocation and obtaining a work permit.

Currently the following type of positions are available: link://[click] link://[click] link://[click]

TITLE: Debian update for gnutls11 / gnutls13

SECUNIA ADVISORY ID: SA22084

VERIFY ADVISORY: link://[click]

CRITICAL: Less critical

IMPACT: Security Bypass

WHERE: From remote

OPERATING SYSTEM: Debian GNU/Linux 3.1 link://[click] Debian GNU/Linux unstable alias sid link://[click]

DESCRIPTION: Debian has issued updates for gnutls11 and gnutls13. These fix a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

For more information: SA21937 SOLUTION: Apply updated packages.

-- Debian GNU/Linux 3.1 alias sarge -- Source archives: link://[click] Size/MD5 checksum: 820 72116e13ca8af0d4c0420a6a5fba01fb link://[click] Size/MD5 checksum: 346146 46c4495ad9c32f53a362669432b548d0 link://[click] Size/MD5 checksum: 1504638 7b410fa3c563c7988e434a8c8671b3cd Alpha architecture: link://[click] Size/MD5 checksum: 229836 759bb1fb11af8022228651e5ee996c2a link://[click] Size/MD5 checksum: 335034 e25273a2f6a338e0a864759723f7927f link://[click] Size/MD5 checksum: 589736 7318e2d5e9e5c1706e4e3baeadbe5e95 link://[click] Size/MD5 checksum: 512202 25396b24bd00c6c2d0c52f744072b972 AMD64 architecture: link://[click] Size/MD5 checksum: 217586 8c925e3b730e6b72d776e7b132c15a04 link://[click] Size/MD5 checksum: 327012 14301cbecc28ec34e998decbabf3ce58 link://[click] Size/MD5 checksum: 575502 bb6e0f0d2312a49ea9466a0261c667a0 link://[click] Size/MD5 checksum: 392470 01728ddd9d1a2493f95f7b88fd77063d ARM architecture: link://[click] Size/MD5 checksum: 204892 4979873690a1bdd10b87de313f50e823 link://[click] Size/MD5 checksum: 294784 a1f084e60a11242ea2d0d8aa6b9e0a92 link://[click] Size/MD5 checksum: 585114 e7a6b7471fc1696936c7b1a2d842dd0a link://[click] Size/MD5 checksum: 400060 b385b5cbca545e9c3956c0c43d0946e0 HP Precision architecture: link://[click] Size/MD5 checksum: 217594 5597e912c19fb5f3cea5350fc4867948 link://[click] Size/MD5 checksum: 329544 fb715f8fb54a6fb9e430edb1774ada8e link://[click] Size/MD5 checksum: 584956 6c488c7997328cecda7afd7497d85ff5 link://[click] Size/MD5 checksum: 434780 7560c9da720dad66554a0459af06d0f8 Intel IA-32 architecture: link://[click] Size/MD5 checksum: 206826 3a6b6996db3db6bd92947fb552b61599 link://[click] Size/MD5 checksum: 301988 7af47286dd7a1fca42f80b1dfd87bb7d link://[click] Size/MD5 checksum: 558658 c5e07873a863d46892921effa3423038 link://[click] Size/MD5 checksum: 370390 e649a2f476791e825c923003b152484c Intel IA-64 architecture: link://[click] Size/MD5 checksum: 259060 252fafaf93df717cc09bfe1c33b2d382 link://[click] Size/MD5 checksum: 384930 9b16fbd9b504907db1d1c4f08669989e link://[click] Size/MD5 checksum: 585920 64245f68bb5c1c795b4143462bbb25f5 link://[click] Size/MD5 checksum: 521916 d8eb2fec68f52dbd52c351402ab99b6f Motorola 680x0 architecture: link://[click] Size/MD5 checksum: 198834 a12fd077c07b171dc6e99feb78375b08 link://[click] Size/MD5 checksum: 282984 577f5774ba0f2c274b8c62071f7202cf link://[click] Size/MD5 checksum: 561098 a08a318581f5db996d9c382bd495c709 link://[click] Size/MD5 checksum: 341710 4bc318fbbfc2046fe4dd47d12ba88425 Big endian MIPS architecture: link://[click] Size/MD5 checksum: 211728 c3c1695268e1201ac2e9081b94c17366 link://[click] Size/MD5 checksum: 291666 f8fbf909070719d38243643d5dc7bf1d link://[click] Size/MD5 checksum: 595774 f9ee1f7ceb3db2d93f9fcc758ccecab5 link://[click] Size/MD5 checksum: 408540 c1c1dcad15359180555a6256818c0686 Little endian MIPS architecture: link://[click] Size/MD5 checksum: 211476 f28cc4f345ae11897ae12ec1ac324719 link://[click] Size/MD5 checksum: 290328 fd27ef5dd5e20763912f5384b920360d link://[click] Size/MD5 checksum: 591336 9c704e57721d0cf7a12bf844731a9fd7 link://[click] Size/MD5 checksum: 404628 b1201dea3f671b1e651f86e45803d7c7 PowerPC architecture: link://[click] Size/MD5 checksum: 218500 e6b92e1d34fa41b18c9aac4765e52191 link://[click] Size/MD5 checksum: 299502 9377a3aa261f852a8666934bb0825f04 link://[click] Size/MD5 checksum: 1415916 e27b0176c54741aff5b45d0466438ee1 link://[click] Size/MD5 checksum: 388910 1a2997848bc55fc28730370891797297 IBM S/390 architecture: link://[click] Size/MD5 checksum: 215448 9b20f31f10b2b91524453c7a768402a0 link://[click] Size/MD5 checksum: 318674 6ace59100c9131a1cea01c7d635d633a link://[click] Size/MD5 checksum: 632292 60c0acb0ba3046ed4462627ed74db531 link://[click] Size/MD5 checksum: 376622 c11864c64293723e02f07bbeb59c36a7 Sun Sparc architecture: link://[click] Size/MD5 checksum: 204564 a826236438bfe0fbbffe6841fc0380be link://[click] Size/MD5 checksum: 295780 b68bb873076fad0a20082e8f1601a43d link://[click] Size/MD5 checksum: 577540 4bdfb6604d142bf8665846ef235724a0 link://[click] Size/MD5 checksum: 399936 10103cd5f9f40c434b9c6412cad4edb2 -- Debian GNU/Linux unstable alias sid -- Debian GNU/Linux unstable alias sid does no longer contain gnutls11.

The problem has been fixed in version 1.4.4-1 of gnutls13.



ORIGINAL ADVISORY: link://[click] OTHER REFERENCES: SA21937: link://[click]

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: link://[click]

Definitions: (Criticality, Where etc.) link://[click]

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link.

Secunia NEVER sends attached files with advisories.

Secunia does not advise people to install third party patches, only use those supplied by the vendor.




Archives de la liste de diffusion Secunia
Archives de la liste de diffusion Full Disclosure





SecuToolBox :

Mini-Tagwall des articles publiés sur SecuObs :

Mini-Tagwall de l'annuaire video :

Mini-Tagwall des articles de la revue de presse :

Mini-Tagwall des Tweets de la revue Twitter :