Posted by malvuln on Sep 05
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/6e81618678ddfee69342486f6b5ee780.txt
Contact: malvuln13 () gmail com
Media: x.com/malvuln
Threat: Backdoor.Win32.Symmi.qua
Vulnerability: Remote Stack Buffer Overflow (SEH)
Description: The malware listens on two random high TCP ports, when
connecting (ncat) one port will return a single character like “♣”
ord(a)…
More Stories
exiv2-0.28.5-1.fc43
FEDORA-2025-7575224d15 Packages in this update: exiv2-0.28.5-1.fc43 Update description: Automatic update for exiv2-0.28.5-1.fc43. Changelog * Thu Feb 27 2025 Miloš Komarčević...
USN-7340-1: OpenVPN vulnerabilities
It was discovered that OpenVPN did not perform proper input validation when generating a TLS key under certain configuration, which...
USN-7338-1: CRaC JDK 17 vulnerabilities
Andy Boothe discovered that the Networking component of CRaC JDK 17 did not properly handle access under certain circumstances. An...
USN-7339-1: CRaC JDK 21 vulnerabilities
Andy Boothe discovered that the Networking component of CRaC JDK 21 did not properly handle access under certain circumstances. An...
USN-7337-1: LibreOffice vulnerability
It was discovered that LibreOffice incorrectly handled Office URI Schemes. If a user or automated system were tricked into opening...
USN-7299-2: X.Org X Server vulnerabilities
USN-7299-1 fixed several vulnerabilities in X.Org. This update provides the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS....