Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Nouveaux articles (fr): 1pwnthhW21zdnQ5WucjmnF3pk9puT5fDF
Amélioration du site: 1hckU85orcGCm8A9hk67391LCy4ECGJca

Contribute to SecuObs by sending bitcoins or dogecoins.

Chercher :
Newsletter :  


Revues :
- Presse
- Presse FR
- Vidéos
- Twitter
- Secuobs





Sommaires :
- Tendances
- Failles
- Virus
- Concours
- Reportages
- Acteurs
- Outils
- Breves
- Infrastructures
- Livres
- Tutoriels
- Interviews
- Podcasts
- Communiques
- USBsploit
- Commentaires


Revue Presse:
- Tous
- Francophone
- Par mot clé
- Par site
- Le tagwall


Top bi-hebdo:
- Ensemble
- Articles
- Revue
- Videos
- Twitter
- Auteurs


Articles :
- Par mot clé
- Par auteur
- Par organisme
- Le tagwall


Videos :
- Toutes
- Par mot clé
- Par site
- Le tagwall


Twitter :
- Tous
- Par mot clé
- Par compte
- Le tagwall


Commentaires :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS/XML :
- Articles
- Commentaires
- Revue
- Revue FR
- Videos
- Twitter


RSS SecuObs :
- sécurité
- exploit
- windows
- attaque
- outil
- microsoft


RSS Revue :
- security
- microsoft
- windows
- hacker
- attack
- network


RSS Videos :
- curit
- security
- biomet
- metasploit
- biometric
- cking


RSS Twitter :
- security
- linux
- botnet
- attack
- metasploit
- cisco


RSS Comments :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS OPML :
- Français
- International











Revue de presse francophone :
- Appaloosa AppDome nouent un partenariat pour accompagner les entreprises dans le déploiement et la protection des applications mobiles
- D-Link offre une avec un routeur VPN sans fil AC
- 19 mai Paris Petit-Déjeuner Coreye Développer son business à l'abri des cyberattaques
- POYNTING PRESENTE LA NOUVELLE ANTENNE OMNI-291, SPECIALE MILIEU MARITIME, CÔTIER ET MILIEU HUMIDE
- Flexera Software Les utilisateurs français de PC progressent dans l'application de correctifs logiciels, mais des défis de tailles subsistent
- Riverbed lance SD-WAN basé sur le cloud
- Fujitsu multi-récompensé VMware lui décerne plusieurs Partner Innovation Awards à l'occasion du Partner Leadership Summit
- Zscaler Private Access sécuriser l'accès à distance en supprimant les risques inhérents aux réseaux privés virtuels
- QNAP annonce la sortie de QTS 4.2.1
- Une enquête réalisée par la société de cyber sécurité F-Secure a décelé des milliers de vulnérabilités graves, potentiellement utilisables par des cyber criminels pour infiltrer l'infrastru
- Trouver le juste équilibre entre une infrastructure dédiée et cloud le dilemme de la distribution numérique
- 3 juin - Fleurance - Cybersécurité Territoires
- Cyber-assurances Seules 40 pourcents des entreprises françaises sont couvertes contre les violations de sécurité et les pertes de données
- Des étudiants de l'ESIEA inventent CheckMyHTTPS un logiciel qui vérifie que vos connexions WEB sécurisées ne sont pas interceptées
- Les produits OmniSwitch d'Alcatel-Lucent Enterprise ALE gagnent en sécurité pour lutter contre les cyber-attaques modernes

Dernier articles de SecuObs :
- DIP, solution de partage d'informations automatisée
- Sqreen, protection applicative intelligente de nouvelle génération
- Renaud Bidou (Deny All): "L'innovation dans le domaine des WAFs s'oriente vers plus de bon sens et d'intelligence, plus de flexibilité et plus d'ergonomie"
- Mises à jour en perspective pour le système Vigik
- Les russes ont-ils pwn le système AEGIS ?
- Le ministère de l'intérieur censure une conférence au Canada
- Saut d'air gap, audit de firmware et (in)sécurité mobile au programme de Cansecwest 2014
- GCHQ: Le JTRIG torpille Anonymous qui torpille le JTRIG (ou pas)
- #FIC2014: Entrée en territoire inconnu
- Le Sénat investit dans les monnaies virtuelles

Revue de presse internationale :
- VEHICLE CYBERSECURITY DOT and Industry Have Efforts Under Way, but DOT Needs to Define Its Role in Responding to a Real-world Attack
- Demand letter served on poll body over disastrous Comeleak breach
- The Minimin Aims To Be The Simplest Theremin
- Hacking group PLATINUM used Windows own patching system against it
- Hacker With Victims in 100 Nations Gets 7 Years in Prison
- HPR2018 How to make Komboucha Tea
- Circuit Bender Artist bends Fresnel Lens for Art
- FBI Director Suggests iPhone Hacking Method May Remain Secret
- 2016 Hack Miami Conference May 13-15, 2016
- 8-bit Video Wall Made From 160 Gaming Keyboards
- In An Era Of Decline, News Sites Can t Afford Poor Web Performance
- BeautifulPeople.com experiences data breach 1m affected
- Swedish Air Space Infringed, Aircraft Not Required
- Why cybercriminals attack healthcare more than any other industry
- Setting the Benchmark in the Network Security Forensics Industry

Annuaire des videos
- FUZZING ON LINE PART THREE
- Official Maltego tutorial 5 Writing your own transforms
- Official Maltego tutorial 6 Integrating with SQL DBs
- Official Maltego tutorial 3 Importing CSVs spreadsheets
- install zeus botnet
- Eloy Magalhaes
- Official Maltego tutorial 1 Google s websites
- Official Maltego tutorial 4 Social Networks
- Blind String SQL Injection
- backdoor linux root from r57 php shell VPS khg crew redc00de
- How To Attaque Pc With Back Track 5 In Arabique
- RSA Todd Schomburg talks about Roundup Ready lines available in 2013
- Nessus Diagnostics Troubleshooting
- Panda Security Vidcast Panda GateDefender Performa Parte 2 de 2
- MultiPyInjector Shellcode Injection

Revue Twitter
- RT @fpalumbo: Cisco consistently leading the way ? buys vCider to boost its distributed cloud vision #CiscoONE
- @mckeay Looks odd... not much to go on (prob some slideshow/vid app under Linux)
- [SuggestedReading] Using the HTML5 Fullscreen API for Phishing Attacks
- RT @BrianHonan: Our problems are not technical but cultural. OWASP top 10 has not changed over the years @joshcorman #RSAC
- RT @mikko: Wow. Apple kernels actually have a function called PE_i_can_has_debugger:
- [Blog Spam] Metasploit and PowerShell payloads
- PinkiePie Strikes Again, Compromises Google Chrome in Pwnium Contest at Hack in the Box: For the second time thi...
- @mikko @fslabs y'all wldn't happen to have lat/long data sets for other botnets, wld you? Doing some research (free/open info rls when done)
- RT @nickhacks: Want to crash a remote host running Snow Leopard? Just use: nmap -P0 -6 --script=targets-ipv6-multicast-mld #wishiwaskidding
- An inexpensive proxy service called is actually a front for #malware distribution -

Mini-Tagwall
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone

+ de mots clés pour la revue de presse

Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit

+ de mots clés pour les videos

Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall

+ de mots clés pour la revue Twitter

Top bi-hebdo des articles de SecuObs
- [Ettercap – Partie 2] Ettercap par l'exemple - Man In the Middle et SSL sniffing
- [Infratech - release] version 0.6 de Bluetooth Stack Smasher
- [IDS Snort Windows – Partie 2] Installation et configuration
- [Infratech - vulnérabilité] Nouvelle version 0.8 de Bluetooth Stack Smasher
- Mises à jour en perspective pour le système Vigik
- USBDumper 2 nouvelle version nouvelles fonctions !
- EFIPW récupère automatiquement le mot de passe BIOS EFI des Macbook Pro avec processeurs Intel
- La sécurité des clés USB mise à mal par USBDUMPER
- Une faille critique de Firefox expose les utilisateurs de Tor Browser Bundle
- Installation sécurisée d'Apache Openssl, Php4, Mysql, Mod_ssl, Mod_rewrite, Mod_perl , Mod_security

Top bi-hebdo de la revue de presse
- StackScrambler and the Tale of a Packet Parsing Bug

Top bi-hebdo de l'annuaire des videos
- DC++ Botnet. How To DDos A Hub With Fake IPs.
- Comment creer un server botnet!!!!(Réseau de pc zombies)
- Defcon 14 Hard Drive Recovery Part 3

Top bi-hebdo de la revue Twitter
- RT @secureideas: I believe that all the XSS flaws announced are fixed in CVS. Will test again tomorrow if so, release 1.4.3. #BASESnort
- Currently, we do not support 100% of the advanced PDF features found in Adobe Reader... At least that's a good idea.
- VPN (google): German Foreign Office Selects Orange Business for Terrestrial Wide: Full
- @DisK0nn3cT Not really, mostly permission issues/info leak...they've had a couple of XSS vulns but nothing direct.
- Swatting phreaker swatted and heading to jail: A 19-year-old American has been sentenced to eleven years in pris..
- RT @fjserna You are not a true hacker if the calc.exe payload is not the scientific one... infosuck.org/0x0035.png

Top des articles les plus commentés
- [Metasploit 2.x – Partie 1] Introduction et présentation
- Microsoft !Exploitable un nouvel outil gratuit pour aider les développeurs à évaluer automatiquement les risques
- Webshag, un outil d'audit de serveur web
- Les navigateurs internet, des mini-systèmes d’exploitation hors de contrôle ?
- Yellowsn0w un utilitaire de déblocage SIM pour le firmware 2.2 des Iphone 3G
- CAINE un Live[CD|USB] pour faciliter la recherche légale de preuves numériques de compromission
- Nessus 4.0 placé sous le signe de la performance, de l'unification et de la personnalisation
- [Renforcement des fonctions de sécurité du noyau Linux – Partie 1] Présentation
- [IDS Snort Windows – Partie 1] Introduction aux IDS et à SNORT
- Origami pour forger, analyser et manipuler des fichiers PDF malicieux



[Message Precedent sur la mailing][Message Suivant sur la mailing][Precedent dans le fil][Prochain dans le fil][Index par Date][Index par fil] [SA31698] Ubuntu update for tiff


Want a new job?

link://[click]
link://[click]





TITLE: Ubuntu update for tiff

SECUNIA ADVISORY ID: SA31698

VERIFY ADVISORY: link://[click]

CRITICAL: Moderately critical

IMPACT: DoS, System access

WHERE: From remote

OPERATING SYSTEM: Ubuntu Linux 6.06 link://[click] Ubuntu Linux 7.04 link://[click] Ubuntu Linux 7.10 link://[click] Ubuntu Linux 8.04 link://[click]

DESCRIPTION: Ubuntu has issued an update for tiff. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a user's system.

For more information: SA31610 SOLUTION: Apply updated packages.

-- Ubuntu 6.06 LTS -- Source archives: link://[click] Size/MD5: 19356 56610d9fbd62d610f7004b3d30099c8e link://[click] Size/MD5: 802 426326dc802835cf100d63d6842b9939 link://[click] Size/MD5: 1280113 02cf5c3820bda83b35bb35b45ae27005 amd64 architecture (Athlon64, Opteron, EM64T Xeon): link://[click] Size/MD5: 220614 ff6387e7888bdf3b1d3515d0eede40c1 link://[click] Size/MD5: 282146 75b17acb52792737598afba03b1cb835 link://[click] Size/MD5: 475444 624f548a9b16339c5214b87a8587e0af link://[click] Size/MD5: 44520 1522729abef4145d8ae4fb125892e03b link://[click] Size/MD5: 49702 32735e413d785c456f8e340dbb3e974f i386 architecture (x86 compatible Intel/AMD): link://[click] Size/MD5: 205772 330fd846b4c42cfea4a86db7cd578032 link://[click] Size/MD5: 258868 4248ca40bb9516d3f15af5ea0b7d82e3 link://[click] Size/MD5: 461668 8e64e0f252f0cf1805a95503763a7ee7 link://[click] Size/MD5: 44496 38356372e09eacc21c85147a64730863 link://[click] Size/MD5: 49028 0f209680ec3fe2d63b8f2ee1eb82d671 powerpc architecture (Apple Macintosh G3/G4/G5): link://[click] Size/MD5: 239612 85752da1b75412f455964b6e330d9b9c link://[click] Size/MD5: 287816 7dbabece275f8672edb8a23d55a7a473 link://[click] Size/MD5: 475776 4aa903c0a0ff484a56c5fe1704a4e727 link://[click] Size/MD5: 46734 bb81db39da467e2625c0d042d3a8cd28 link://[click] Size/MD5: 51374 a98d703c16b08432c5faba227b49a11c sparc architecture (Sun SPARC/UltraSPARC): link://[click] Size/MD5: 208422 3403ad880d5a4928093e37077325b249 link://[click] Size/MD5: 269832 9e31723f565218781859094e02157832 link://[click] Size/MD5: 466524 60370fd4a11ed2ab9405d1d34ec89613 link://[click] Size/MD5: 44444 d55f667802302d260a0e9fa818a84062 link://[click] Size/MD5: 49580 8e9cf307f440d06e4fac7f8a0e72b575 -- Ubuntu 7.04 -- Source archives: link://[click] Size/MD5: 17421 c27407897402d8784aaa78872df66084 link://[click] Size/MD5: 894 7f473766d9506c9cf8c9dc9fc301899a link://[click] Size/MD5: 1333780 e6ec4ab957ef49d5aabc38b7a376910b amd64 architecture (Athlon64, Opteron, EM64T Xeon): link://[click] Size/MD5: 185580 b0e5244445e5b5842e15ede52b62a464 link://[click] Size/MD5: 248558 f870334e57d6cf450c113b434ec7dc1f link://[click] Size/MD5: 491096 f082f77dec69c785f86c7da6a34e30bf link://[click] Size/MD5: 4948 2af2beb4111fec29a89f4fc5b345dd4d link://[click] Size/MD5: 10380 2ae539b37bfc0a4fdf0b4d1f79d71c01 i386 architecture (x86 compatible Intel/AMD): link://[click] Size/MD5: 174706 06ddc26a9eb1f25e51a537f4d13d0cd7 link://[click] Size/MD5: 230880 1e263f73724556b229ce53da89f1bb6c link://[click] Size/MD5: 483176 c204eee64ba32343630090710e886ce5 link://[click] Size/MD5: 4948 0583b395261bfc9e8971845183aa1370 link://[click] Size/MD5: 9870 afb43b9979860ab71d5b18f667a94234 powerpc architecture (Apple Macintosh G3/G4/G5): link://[click] Size/MD5: 221280 67928c23965f4aad6dc9bd0904a5de3c link://[click] Size/MD5: 255168 1ee1410c16e8878c1363714c7def2039 link://[click] Size/MD5: 496328 0efa9338a0a0a74593785ad710bff29c link://[click] Size/MD5: 7444 5b6cf616b9371fb54ba7cd4d74671539 link://[click] Size/MD5: 13110 c3192321c2d2a212b4acb12a95958338 sparc architecture (Sun SPARC/UltraSPARC): link://[click] Size/MD5: 178680 5b6c97cd81cd4a6df4d4228ee48bb81e link://[click] Size/MD5: 236610 7e3286d3b39739a92c131d841fc6fa53 link://[click] Size/MD5: 482248 8cf86b28cc0b967efaa635f28408e70e link://[click] Size/MD5: 4690 0d8ef4cc1149bc175e1b4cef56a533ac link://[click] Size/MD5: 10630 4fab06812752f458f00bbe408c4a5e51 -- Ubuntu 7.10 -- Source archives: link://[click] Size/MD5: 17693 d8bfc71ab431317d9d7776e8904d41cb link://[click] Size/MD5: 898 0e2bd83921a76666aaad9f0db1d2143f link://[click] Size/MD5: 1333780 e6ec4ab957ef49d5aabc38b7a376910b amd64 architecture (Athlon64, Opteron, EM64T Xeon): link://[click] Size/MD5: 186046 5eca7cf38e7a627ac9ff35e05341c6a3 link://[click] Size/MD5: 572732 6d8a9c1762acb37ac98637f5838677bd link://[click] Size/MD5: 167514 7c316c12186064ce36fa302eeb1a9d35 link://[click] Size/MD5: 5030 36e2e41d1c74cba5f6226adcdb9635d4 link://[click] Size/MD5: 10482 398ee14c1a54bf682843ab5b4d5a1ef2 i386 architecture (x86 compatible Intel/AMD): link://[click] Size/MD5: 175032 35f9d040cf7bb70a3e0cdcaed891e8ea link://[click] Size/MD5: 555062 b95d128052ee5deddde5512404116d93 link://[click] Size/MD5: 159682 6fecbcf423292c8afb087b717bc39733 link://[click] Size/MD5: 5036 58dea786bf7ab7b9f124864076f98bc7 link://[click] Size/MD5: 9950 4530d1926d2776a808b92451d241b40a lpia architecture (Low Power Intel Architecture): link://[click] Size/MD5: 176688 c34dd42b7fb2c866a337cf0a831500dd link://[click] Size/MD5: 554916 5c89af650f71fa329f9b27c964e159b5 link://[click] Size/MD5: 159016 0e4f184a9264ecd2669df232f031f5bc link://[click] Size/MD5: 4886 c365fc0610f673b5b514190f52c9b2cd link://[click] Size/MD5: 9950 eedb7a284fd8ccfde7373719c5aa8e09 powerpc architecture (Apple Macintosh G3/G4/G5): link://[click] Size/MD5: 221632 d54b58c8832e981a496517aee739e96d link://[click] Size/MD5: 579494 ab32f5a3bdb94d98cfd5cec17fdbdb8b link://[click] Size/MD5: 172920 6221864857865170ebc103e8e9ca2f1d link://[click] Size/MD5: 7524 cce4cd11ab76e2a20fb23231128013d3 link://[click] Size/MD5: 13184 4417c793e3b787fb4925052e5628a487 sparc architecture (Sun SPARC/UltraSPARC): link://[click] Size/MD5: 179138 e056aaaf8281aeeec8e93bb4c646b11e link://[click] Size/MD5: 560334 28115f9f96039c2ea6a861be5418d2e4 link://[click] Size/MD5: 159258 951e1ad2ff233ccf9a2357d6fd7c9d5a link://[click] Size/MD5: 4794 4da0d6d8b2c59f8d834f26893d056a77 link://[click] Size/MD5: 10734 2430febfadfa3afef94890422229333a -- Ubuntu 8.04 LTS -- Source archives: link://[click] Size/MD5: 17739 3df53cb9be4eac8018114eca54eeddd0 link://[click] Size/MD5: 898 63c01af90b1a28f341cda765cb388af5 link://[click] Size/MD5: 1333780 e6ec4ab957ef49d5aabc38b7a376910b amd64 architecture (Athlon64, Opteron, EM64T Xeon): link://[click] Size/MD5: 186212 cb1aa7ea448c64d8a071db1e7103abde link://[click] Size/MD5: 570784 d42a106beb13b5fada52bb49b23348e0 link://[click] Size/MD5: 130572 d92ef8e00a2c11a92ef2258c9ee34509 link://[click] Size/MD5: 5076 505cb2e12de00a198f6043cfa5826f99 link://[click] Size/MD5: 10500 3f4885e033e8b49ac0ace8a25033bd70 i386 architecture (x86 compatible Intel/AMD): link://[click] Size/MD5: 175046 e1968da8535ff6051d1fd16fa515e77f link://[click] Size/MD5: 552288 b22a3ffa9d2bd620aa7dcb5897ecb65d link://[click] Size/MD5: 122264 c7e7c7b3d1f51471a67495a82c8c318c link://[click] Size/MD5: 5038 c15e0e405b52dac9ae0ba43bf0bf2929 link://[click] Size/MD5: 9936 d295285a90e2f40f4c6be563f4feecf8 lpia architecture (Low Power Intel Architecture): link://[click] Size/MD5: 177130 feec0c26db46f966db003e73e04e42ca link://[click] Size/MD5: 554830 6833fbea686cd3780bd8e814aea90693 link://[click] Size/MD5: 123436 ba48f119c3690bafac6dc0914b080076 link://[click] Size/MD5: 4920 74d243746774e0ad29fc9a5c888f88fa link://[click] Size/MD5: 9976 79dd38d3c74419e2f3af36599c3c0ed0 powerpc architecture (Apple Macintosh G3/G4/G5): link://[click] Size/MD5: 223256 dc107cbd87d9106985537d6c275a0544 link://[click] Size/MD5: 576802 7b70d820ee684cdccda2abb2f0803578 link://[click] Size/MD5: 133868 bdfb766eeab2dfc1ee4e30c64464a581 link://[click] Size/MD5: 7508 47e95d771f3e56e8d0edb098a227699d link://[click] Size/MD5: 13288 df5e73b79db7688fbb097123a8893886 sparc architecture (Sun SPARC/UltraSPARC): link://[click] Size/MD5: 178648 76db5473a395f84e57f74882d4276032 link://[click] Size/MD5: 558200 2fa5edc2be0a83f0d8b5a872ad2852cc link://[click] Size/MD5: 122054 d54617bcf0f9ee0eb0593dc57f6cacaa link://[click] Size/MD5: 4802 bdc15c3e7f4658e9747e6092e7c118a5 link://[click] Size/MD5: 10696 0cbe55aa53a298214936bcd103370ad6

ORIGINAL ADVISORY: link://[click] OTHER REFERENCES: SA31610: link://[click]

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: link://[click]

Definitions: (Criticality, Where etc.) link://[click]

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link.

Secunia NEVER sends attached files with advisories.

Secunia does not advise people to install third party patches, only use those supplied by the vendor.




Archives de la liste de diffusion Secunia
Archives de la liste de diffusion Full Disclosure





SecuToolBox :

Mini-Tagwall des articles publiés sur SecuObs :

Mini-Tagwall de l'annuaire video :

Mini-Tagwall des articles de la revue de presse :

Mini-Tagwall des Tweets de la revue Twitter :