In Dreamacro 1.1.0, an attacker could embed a malicious iframe in a website with a crafted URL that would launch the Clash Windows client and force it to open a remote SMB share. Windows will perform NTLM authentication when opening the SMB share and that request can be relayed (using a tool like responder) for code execution (or captured for hash cracking).
Category Archives: Advisories
xen-4.16.0-5.fc36
FEDORA-2022-cf87a9b146
Packages in this update:
xen-4.16.0-5.fc36
Update description:
fix build of xen.efi file and package it in /usr/lib/efi
Multiple speculative security issues [XSA-398]
rsh-0.17-94.el8
FEDORA-EPEL-2022-85bd5fc48f
Packages in this update:
rsh-0.17-94.el8
Update description:
Security fix for CVE-2019-7282
rsh-0.17-101.fc36
FEDORA-2022-dd808b5a2c
Packages in this update:
rsh-0.17-101.fc36
Update description:
Security fix for CVE-2019-7282
rsh-0.17-100.fc35
FEDORA-2022-82a6236ac7
Packages in this update:
rsh-0.17-100.fc35
Update description:
Security fix for CVE-2019-7282
rsh-0.17-98.fc34
FEDORA-2022-6748ae617b
Packages in this update:
rsh-0.17-98.fc34
Update description:
Security fix for CVE-2019-7282
[CFP-ESORICS 2022]: 27th European Symposium on Research in Computer Security (ESORICS) 2022
Posted by CFP – ESORICS 2022 on Mar 20
[Apologies for cross-posting]
————————————————————————–
C a l l F o r P a p e r s
27th European Symposium on Research in Computer Security (ESORICS) 2022
26-30 September 2022, Copenhagen, Denmark
URL: https://esorics2022.compute.dtu.dk/#
————————————————————————–
===================
CONFERENCE OUTLINE:
===================
We are looking…
Adversary3 v1.0 – Malware vulnerability intel tool for third-party attackers.
Posted by malvuln on Mar 20
Adversary3 v1.0 – Malware vulnerability intel tool for third-party
attackers.
BuilderRevengeRAT – (Revenge-RAT v0.3) / XML External Entity Injection
Posted by malvuln on Mar 20
Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/531d8b4ac8f7eb827d62424169321b2b.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: BuilderRevengeRAT – (Revenge-RAT v0.3)
Vulnerability: XML External Entity Injection
Description: The malware listens on TCP port 333. There is a Config.xml
file used by the RAT builder to specify port, notification, webcam etc. The
XML parser used…
BuilderTorCTPHPRAT.b / Remote Persistent XSS
Posted by malvuln on Mar 20
Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/838f67d7a4b6824ec59892057aab3bb7_C.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: BuilderTorCTPHPRAT.b
Vulnerability: Remote Persistent XSS
Family: TorCTPHPRAT
Type: WebUI
MD5: 838f67d7a4b6824ec59892057aab3bb7 (Webremote TorCT Client.exe)
MD5: dc40fa699cfce01802213dbbd0cbe37e (SlaveOnline.php)
Vuln ID: MVID-2022-0520…