Skip to content

abazhaniuk/Publications

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

PUBLICATIONS

CVEs:

  • CVE-2017-9633 – An attacker with a physical connection to the TCU may exploit a buffer overflow condition that exists in the processing of AT commands. This may allow arbitrary code execution on the baseband radio processor of the TCU: Advisory (ICSA-17-208-01) Continental AG Infineon S-Gold 2 (PMB 8876)
  • CVE-2017-9647 – A vulnerability in the temporary mobile subscriber identity (TMSI) may allow an attacker to access and control memory. This may allow remote code execution on the baseband radio processor of the TCU: Advisory (ICSA-17-208-01) Continental AG Infineon S-Gold 2 (PMB 8876)
    AFFECTED PRODUCTS
    All telematics control modules (TCUs) built by Continental AG that contain the S-Gold 2 (PMB 8876) cellular baseband chipset are affected. The S-Gold 2 (PMB 8876) is found in the following vehicles:
    – BMW several models produced between 2009-2010
    – Ford - program to update 2G modems has been active since 2016 and impact is restricted to the limited number of P-HEV vehicles equipped with this older technology that remain in service
    – Infiniti 2013 JX35, Infiniti 2014-2016 QX60, Infiniti 2014-2016 QX60 Hybrid, Infiniti 2014-2015 QX50, Infiniti 2014-2015 QX50 Hybrid, Infiniti 2013 M37/M56, Infiniti 2014-2016 Q70, Infiniti 2014-2016 Q70L, Infiniti 2015-2016 Q70 Hybrid, Infiniti 2013 QX56, Infiniti 2014-2016 QX 80
    – Nissan 2011-2015 Leaf
  • CVE-2016-4002 – Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes
  • CVE-2016-4001 – Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet
  • CVE-2015-0427 – Integer overflow causes memory corruption in VMSVGAFIFOGETCMDBUFFER in Oracle VirtualBox prior to 4.3.20
  • CVE-2015-0418 – VirtualBox guest crashes when execute INVEPT/INVVPID instructions in user mode application
  • CVE-2015-4856 (2 vulnerability) - Read un-initialization memory at in Oracle VirtualBox prior to 4.0.30, 4.1.38, 4.2.30, 4.3.26, 5.0.0 by overlapping MMIO BARs with each other
  • CVE-2014-6588 – Memory corruption in VMSVGAGMRTRANSFER in Oracle VirtualBox
  • CVE-2014-6589 – Memory corruptions in VMSVGAFIFOLOOP in Oracle VirtualBox
  • CVE-2014-6590 – Memory corruptions in VMSVGAFIFOLOOP in Oracle VirtualBox
  • CVE-2014-3689 (3 vulnerability) – The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling
  • CVE-2014-3645 – QEMU guest crashes when execute INVEPT instructions in user mode application
  • CVE-2014-3646 – QEMU guest crashes when execute INVVPID instructions in user mode application
  • CVE-2014-8274Vulnerability Note VU#976132: UEFI implementations do not properly secure the EFI S3 Resume Boot Path boot script
  • CVE-2014-1568Vulnerability Note VU#772676: Mozilla Network Security Services (NSS) fails to properly verify RSA signatures
  • CVE-2011-0222 – Remotely exploitable memory corruption vulnerability in WebKit, as included with multiple vendors' browsers, could allow an attacker to execute arbitrary code with the privileges of the current user: About the security content of Safari 5.1 and Safari 5.0.6 , Advisory: CVE-2011-0222

VULNIRABILITIES (without CVE):

About

Slides, Papers, Links to CVEs and advisories

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published