A buffer overflow vulnerability which affects both the KOffice and Calligra office suites has been disclosed by Charlie Miller of Accuvant Labs. The vulnerability, which allows an attacker to execute arbitrary code by exploiting an error in the read() function of the ODF renderer, was revealed as part of Miller’s presentation on NFC hacking at the recent Black Hat conference. Continue reading Buffer overflows in KOffice and Calligra reported
TOR, an implementation of second generation Onion Routing, vulnerable to multiple vulnerabilities . The critical one of which may allows a remote attacker to execute arbitrary code.
A remote attacker could possibly execute arbitrary code or cause a Denial of Service by exploiting the vulnerability. Furthermore, a remote relay the user is directly connected to may be able to disclose anonymous information about that user or enumerate bridges in the user’s connection. Continue reading Multiple Vulnerabilities found in Tor, allows a remote Hacking