Chercher :
Newsletter :  


Revues :
- Presse
- Presse FR
- Vidéos
- Twitter
- Secuobs





Sommaires :
- Tendances
- Failles
- Virus
- Concours
- Reportages
- Acteurs
- Outils
- Breves
- Infrastructures
- Livres
- Tutoriels
- Interviews
- Podcasts
- Communiques
- USBsploit
- Commentaires


Revue Presse:
- Tous
- Francophone
- Par mot clé
- Par site
- Le tagwall


Top bi-hebdo:
- Ensemble
- Articles
- Revue
- Videos
- Twitter
- Auteurs


Articles :
- Par mot clé
- Par auteur
- Par organisme
- Le tagwall


Videos :
- Toutes
- Par mot clé
- Par site
- Le tagwall


Twitter :
- Tous
- Par mot clé
- Par compte
- Le tagwall


Commentaires :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS/XML :
- Articles
- Commentaires
- Revue
- Revue FR
- Videos
- Twitter


RSS SecuObs :
- sécurité
- exploit
- windows
- attaque
- outil
- réseau


RSS Revue :
- security
- microsoft
- windows
- hacker
- attack
- network


RSS Videos :
- curit
- security
- biomet
- metasploit
- biometric
- cking


RSS Twitter :
- security
- linux
- botnet
- attack
- metasploit
- cisco


RSS Comments :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS OPML :
- Français
- International











Revue de presse francophone :
- La société Oppida devient QSA
- McAfee renforce son offre réseau
- Qualys lance un nouveau tableau de bord SSL
- Vigilance - Cisco NX-OS exécution de commande via TACACS , analysé le 22 01 2014
- Kaspersky Lab dévoile sa stratégie de développement sur le segment Entreprise
- Siemens initie une formation à la cybersécurité des systèmes industriels
- Kaspersky Lab dévoile ses nouveaux services de cybersecurity intelligence
- Emerson Network Power lance un groupe de production d'eau glacée Freecooling adiabatique
- Vigilance - Cisco Unity Connection traversée de répertoire, analysé le 07 04 2014
- Vigilance - Websense Web Filter Security obtention du mot de passe, analysé le 07 04 2014
- L'utilisation de logiciels non-conformes a coûté plus de 1,3 million d'euros aux entreprises françaises en 2013
- INSIDE Secure équipe la Carte Vitale 2
- Prix de la Reine pour les entreprises 2014 SecurEnvoy gagne un prix de commerce international
- ControlCircle survey of 250 IT leaders shows CIOs struggle to prioritise strategic projects and deliver consistent quality of service
- Le Drian lance le chantier du système d information des armées , près de Rennes

Dernier articles de SecuObs :
- Le ministère de l'intérieur censure une conférence au Canada
- Saut d'air gap, audit de firmware et (in)sécurité mobile au programme de Cansecwest 2014
- GCHQ: Le JTRIG torpille Anonymous qui torpille le JTRIG (ou pas)
- #FIC2014: Entrée en territoire inconnu
- Le Sénat investit dans les monnaies virtuelles
- #LPM2013: Un nouvel espoir ?
- L'ANSSI durcit le ton
- Assises 2013: Nouvel élan de jeunesse
- OWASP Framework Security Project, répertorier et fixer les contrôles de sécurité manquants
- Le bracelet Nimy, une solution d'authentification à 3 facteurs utilisant un capteur d'ECG

Revue de presse internationale :
- Notacon 11 - Big Data Technology The Real World Minority Report
- Notacon 11 - Naisho DeNusumu Stealing Secretly Exfiltration Tool Framework Adam Crompton
- Notacon 11 - Wireless Mesh Protocols
- Notacon 11 - MDM is gone, MAM is come. New Challenges on mobile security
- Notacon 11 - Moving the Industry Forward The Purple Team
- Notacon 11 - Pwning the POS
- Notacon 11 - Nindroid Pentesting Apps for your Android device
- While Heartbleed distracts, hackers hit US universities
- Servers Hacked Isu Information Vulnerable
- Bionics pioneer Hugh Herr s prosthetic ankle mimics the power and control of its biological counterpart WearableWednesday
- Operations Manager Desktop Performance Monitoring
- The Microsoft Approach to Compliance in the Cloud
- Insider Threat Kill Chain Detecting Human Indicators of Compromise
- Techniques for Identifying Vulnerabilities in Target Applications
- Defensive Cyberspace Operations and Intelligence

Annuaire des videos
- FUZZING ON LINE PART THREE
- Official Maltego tutorial 5 Writing your own transforms
- Official Maltego tutorial 6 Integrating with SQL DBs
- Official Maltego tutorial 3 Importing CSVs spreadsheets
- install zeus botnet
- Eloy Magalhaes
- Official Maltego tutorial 1 Google s websites
- Official Maltego tutorial 4 Social Networks
- Blind String SQL Injection
- backdoor linux root from r57 php shell VPS khg crew redc00de
- How To Attaque Pc With Back Track 5 In Arabique
- RSA Todd Schomburg talks about Roundup Ready lines available in 2013
- Nessus Diagnostics Troubleshooting
- Panda Security Vidcast Panda GateDefender Performa Parte 2 de 2
- MultiPyInjector Shellcode Injection

Revue Twitter
- RT @fpalumbo: Cisco consistently leading the way ? buys vCider to boost its distributed cloud vision #CiscoONE
- @mckeay Looks odd... not much to go on (prob some slideshow/vid app under Linux)
- [SuggestedReading] Using the HTML5 Fullscreen API for Phishing Attacks
- RT @BrianHonan: Our problems are not technical but cultural. OWASP top 10 has not changed over the years @joshcorman #RSAC
- RT @mikko: Wow. Apple kernels actually have a function called PE_i_can_has_debugger:
- [Blog Spam] Metasploit and PowerShell payloads
- PinkiePie Strikes Again, Compromises Google Chrome in Pwnium Contest at Hack in the Box: For the second time thi...
- @mikko @fslabs y'all wldn't happen to have lat/long data sets for other botnets, wld you? Doing some research (free/open info rls when done)
- RT @nickhacks: Want to crash a remote host running Snow Leopard? Just use: nmap -P0 -6 --script=targets-ipv6-multicast-mld #wishiwaskidding
- An inexpensive proxy service called is actually a front for #malware distribution -

Mini-Tagwall
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone

+ de mots clés pour la revue de presse

Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit

+ de mots clés pour les videos

Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall

+ de mots clés pour la revue Twitter

Top bi-hebdo des articles de SecuObs
- [IDS Snort Windows – Partie 2] Installation et configuration
- #FIC2014: Entrée en territoire inconnu
- [Ettercap – Partie 2] Ettercap par l'exemple - Man In the Middle et SSL sniffing
- [IDS Snort Windows – Partie 4] Conclusion et webographie
- [IDS Snort Windows – Partie 3] Exemple de fichier de configuration
- [Trames et paquets de données avec Scapy – Partie 5] Traceroute et visualisation 2D/3D
- Powerpreter, un nouveau module Powershell de post-exploitation pour Nishang 0.3
- Le ministère de l'intérieur censure une conférence au Canada
- GCHQ: Le JTRIG torpille Anonymous qui torpille le JTRIG (ou pas)
- USBDumper 2 nouvelle version nouvelles fonctions !

Top bi-hebdo de la revue de presse
- Using masscan to scan for heartbleed vulnerability
- Introducing the rsyslog config builder tool
- 1,103 Megaupload Servers Gather Dust at Virginia Warehouse
- INSIDE Secure acquiert Metaforic
- RS485 Arduino Network showandtell adafruit6secs
- Windows Zero-Day Vulnerability Researched by Microsoft
- Move Active Directory users to a group with PowerShell
- cartographie en France et au Luxembourg des Data Center - édition 2014
- Implementing SCADA Protocols Simulating IEC104
- toolsmith EMET 4.0 These Aren t the Exploits You re Looking For

Top bi-hebdo de l'annuaire des videos
- Tutorial 14 Pfsense OpenVpn RoadWarrior VPN
- Backtrack 5r3 Armitage Metasploit
- Tutorial 15 pfSense Squid Squidguard Content filtering
- Comment Pirater Un Ordinateur Avec Ubuntu Metasploit
- Hak5 1408 1 Reviewing Kali Linux and USB Rubber Ducky Payload Generator
- Tutoriel Supprimer Cacaoweb Botnet
- Comment creer un server botnet!!!!(Réseau de pc zombies)
- Metasploit msrpc exploit
- Bbkeyswin WPA d une Bbox en 2 min sous Windows
- crypt server njrat darkcomet bifrost xtremrat spynet zeus botnet

Top bi-hebdo de la revue Twitter
- Zombies are attacking America – researchers: Banking sector DDoSers 'used botnets', say security boffins. Hackers re…
- [SuggestedReading] Using the HTML5 Fullscreen API for Phishing Attacks
- PinkiePie Strikes Again, Compromises Google Chrome in Pwnium Contest at Hack in the Box: For the second time thi...
- @mikko @fslabs y'all wldn't happen to have lat/long data sets for other botnets, wld you? Doing some research (free/open info rls when done)
- #networksecurity #cloud Expert QA: Cloud computing, HIE will be the 'new normal' - Ken Ong: The National Institute ...
- [Blog Spam] Metasploit and PowerShell payloads
- Zombies are attacking America – researchers - Banking sector DDoSers 'used botnets', say security boffins Hackers re...
- An inexpensive proxy service called is actually a front for #malware distribution -
- RT @mikko: Wow. Apple kernels actually have a function called PE_i_can_has_debugger:
- RT @BrianHonan: Our problems are not technical but cultural. OWASP top 10 has not changed over the years @joshcorman #RSAC

Top des articles les plus commentés
- [Metasploit 2.x – Partie 1] Introduction et présentation
- Microsoft !Exploitable un nouvel outil gratuit pour aider les développeurs à évaluer automatiquement les risques
- Webshag, un outil d'audit de serveur web
- Les navigateurs internet, des mini-systèmes d’exploitation hors de contrôle ?
- Yellowsn0w un utilitaire de déblocage SIM pour le firmware 2.2 des Iphone 3G
- CAINE un Live[CD|USB] pour faciliter la recherche légale de preuves numériques de compromission
- Nessus 4.0 placé sous le signe de la performance, de l'unification et de la personnalisation
- [Renforcement des fonctions de sécurité du noyau Linux – Partie 1] Présentation
- [IDS Snort Windows – Partie 1] Introduction aux IDS et à SNORT
- Origami pour forger, analyser et manipuler des fichiers PDF malicieux



[Message Precedent sur la mailing][Message Suivant sur la mailing][Precedent dans le fil][Prochain dans le fil][Index par Date][Index par fil] [SA22084] Debian update for gnutls11 / gnutls13



Want to work within IT-Security?

Secunia is expanding its team of highly skilled security experts.

We will help with relocation and obtaining a work permit.

Currently the following type of positions are available: link://[click] link://[click] link://[click]

TITLE: Debian update for gnutls11 / gnutls13

SECUNIA ADVISORY ID: SA22084

VERIFY ADVISORY: link://[click]

CRITICAL: Less critical

IMPACT: Security Bypass

WHERE: From remote

OPERATING SYSTEM: Debian GNU/Linux 3.1 link://[click] Debian GNU/Linux unstable alias sid link://[click]

DESCRIPTION: Debian has issued updates for gnutls11 and gnutls13. These fix a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

For more information: SA21937 SOLUTION: Apply updated packages.

-- Debian GNU/Linux 3.1 alias sarge -- Source archives: link://[click] Size/MD5 checksum: 820 72116e13ca8af0d4c0420a6a5fba01fb link://[click] Size/MD5 checksum: 346146 46c4495ad9c32f53a362669432b548d0 link://[click] Size/MD5 checksum: 1504638 7b410fa3c563c7988e434a8c8671b3cd Alpha architecture: link://[click] Size/MD5 checksum: 229836 759bb1fb11af8022228651e5ee996c2a link://[click] Size/MD5 checksum: 335034 e25273a2f6a338e0a864759723f7927f link://[click] Size/MD5 checksum: 589736 7318e2d5e9e5c1706e4e3baeadbe5e95 link://[click] Size/MD5 checksum: 512202 25396b24bd00c6c2d0c52f744072b972 AMD64 architecture: link://[click] Size/MD5 checksum: 217586 8c925e3b730e6b72d776e7b132c15a04 link://[click] Size/MD5 checksum: 327012 14301cbecc28ec34e998decbabf3ce58 link://[click] Size/MD5 checksum: 575502 bb6e0f0d2312a49ea9466a0261c667a0 link://[click] Size/MD5 checksum: 392470 01728ddd9d1a2493f95f7b88fd77063d ARM architecture: link://[click] Size/MD5 checksum: 204892 4979873690a1bdd10b87de313f50e823 link://[click] Size/MD5 checksum: 294784 a1f084e60a11242ea2d0d8aa6b9e0a92 link://[click] Size/MD5 checksum: 585114 e7a6b7471fc1696936c7b1a2d842dd0a link://[click] Size/MD5 checksum: 400060 b385b5cbca545e9c3956c0c43d0946e0 HP Precision architecture: link://[click] Size/MD5 checksum: 217594 5597e912c19fb5f3cea5350fc4867948 link://[click] Size/MD5 checksum: 329544 fb715f8fb54a6fb9e430edb1774ada8e link://[click] Size/MD5 checksum: 584956 6c488c7997328cecda7afd7497d85ff5 link://[click] Size/MD5 checksum: 434780 7560c9da720dad66554a0459af06d0f8 Intel IA-32 architecture: link://[click] Size/MD5 checksum: 206826 3a6b6996db3db6bd92947fb552b61599 link://[click] Size/MD5 checksum: 301988 7af47286dd7a1fca42f80b1dfd87bb7d link://[click] Size/MD5 checksum: 558658 c5e07873a863d46892921effa3423038 link://[click] Size/MD5 checksum: 370390 e649a2f476791e825c923003b152484c Intel IA-64 architecture: link://[click] Size/MD5 checksum: 259060 252fafaf93df717cc09bfe1c33b2d382 link://[click] Size/MD5 checksum: 384930 9b16fbd9b504907db1d1c4f08669989e link://[click] Size/MD5 checksum: 585920 64245f68bb5c1c795b4143462bbb25f5 link://[click] Size/MD5 checksum: 521916 d8eb2fec68f52dbd52c351402ab99b6f Motorola 680x0 architecture: link://[click] Size/MD5 checksum: 198834 a12fd077c07b171dc6e99feb78375b08 link://[click] Size/MD5 checksum: 282984 577f5774ba0f2c274b8c62071f7202cf link://[click] Size/MD5 checksum: 561098 a08a318581f5db996d9c382bd495c709 link://[click] Size/MD5 checksum: 341710 4bc318fbbfc2046fe4dd47d12ba88425 Big endian MIPS architecture: link://[click] Size/MD5 checksum: 211728 c3c1695268e1201ac2e9081b94c17366 link://[click] Size/MD5 checksum: 291666 f8fbf909070719d38243643d5dc7bf1d link://[click] Size/MD5 checksum: 595774 f9ee1f7ceb3db2d93f9fcc758ccecab5 link://[click] Size/MD5 checksum: 408540 c1c1dcad15359180555a6256818c0686 Little endian MIPS architecture: link://[click] Size/MD5 checksum: 211476 f28cc4f345ae11897ae12ec1ac324719 link://[click] Size/MD5 checksum: 290328 fd27ef5dd5e20763912f5384b920360d link://[click] Size/MD5 checksum: 591336 9c704e57721d0cf7a12bf844731a9fd7 link://[click] Size/MD5 checksum: 404628 b1201dea3f671b1e651f86e45803d7c7 PowerPC architecture: link://[click] Size/MD5 checksum: 218500 e6b92e1d34fa41b18c9aac4765e52191 link://[click] Size/MD5 checksum: 299502 9377a3aa261f852a8666934bb0825f04 link://[click] Size/MD5 checksum: 1415916 e27b0176c54741aff5b45d0466438ee1 link://[click] Size/MD5 checksum: 388910 1a2997848bc55fc28730370891797297 IBM S/390 architecture: link://[click] Size/MD5 checksum: 215448 9b20f31f10b2b91524453c7a768402a0 link://[click] Size/MD5 checksum: 318674 6ace59100c9131a1cea01c7d635d633a link://[click] Size/MD5 checksum: 632292 60c0acb0ba3046ed4462627ed74db531 link://[click] Size/MD5 checksum: 376622 c11864c64293723e02f07bbeb59c36a7 Sun Sparc architecture: link://[click] Size/MD5 checksum: 204564 a826236438bfe0fbbffe6841fc0380be link://[click] Size/MD5 checksum: 295780 b68bb873076fad0a20082e8f1601a43d link://[click] Size/MD5 checksum: 577540 4bdfb6604d142bf8665846ef235724a0 link://[click] Size/MD5 checksum: 399936 10103cd5f9f40c434b9c6412cad4edb2 -- Debian GNU/Linux unstable alias sid -- Debian GNU/Linux unstable alias sid does no longer contain gnutls11.

The problem has been fixed in version 1.4.4-1 of gnutls13.



ORIGINAL ADVISORY: link://[click] OTHER REFERENCES: SA21937: link://[click]

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: link://[click]

Definitions: (Criticality, Where etc.) link://[click]

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link.

Secunia NEVER sends attached files with advisories.

Secunia does not advise people to install third party patches, only use those supplied by the vendor.




Archives de la liste de diffusion Secunia
Archives de la liste de diffusion Full Disclosure





SecuToolBox :

Mini-Tagwall des articles publiés sur SecuObs :

Mini-Tagwall de l'annuaire video :

Mini-Tagwall des articles de la revue de presse :

Mini-Tagwall des Tweets de la revue Twitter :