Displaying 4 results from an estimated 4 matches for "coresecur".
2018 Feb 21
2
how to build wmic
Andrew,
Thanks very much. After sending my question, I discovered that the DCOM
area was disabled in the build as of 8 years ago, so it became clear that
this is not currently supported in any way.
Steve Koehler
On Wed, Feb 21, 2018 at 11:49 AM, Andrew Bartlett <abartlet at samba.org>
wrote:
> On Wed, 2018-02-21 at 11:16 -0600, Stephen Koehler via samba wrote:
> > I see that
2018 Feb 21
1
how to build wmic
...I discovered that the DCOM
> area was disabled in the build as of 8 years ago, so it became clear that
> this is not currently supported in any way.
>
> This looks very interesting:
>
> https://github.com/dlundgren/py-wmi-client
>
> It in turn is based on https://github.com/CoreSecurity/impacket which
> is a raw client library in python.
>
> Andrew Bartlett
> --
> Andrew Bartlett
> https://samba.org/~abartlet/
> Authentication Developer, Samba Team https://samba.org
> Samba Development and Support, Catalyst IT
> https://catalyst.net.nz/service...
2006 Jun 05
1
Asterisk 1.2.9 and 1.0.11 Released -- Security Fix
The Asterisk Development Team today released Asterisk 1.2.9 and Asterisk
1.0.11 to address a security vulnerability in the IAX2 channel driver
(chan_iax2). The vulnerability affects all users with IAX2 clients that
might be compromised or used by a malicious user, and can lead to denial
of service attacks and random Asterisk server crashes via a relatively
trivial exploit.
All users are urged to
2003 Apr 17
1
[Fwd: CERT Advisory CA-2003-13 Multiple Vulnerabilities in Snort Preprocessors]
...umbers. This causes the module to
> bypass a check for buffer overflow attempts and allows the attacker to
> insert arbitrary code into the heap.
>
> For additional information, please read the Core Security Technologies
> Advisory located at
>
> http://www.coresecurity.com/common/showdoc.php?idx=313&idxseccion=10
>
> This vulnerability affects Snort versions 1.8.x, 1.9.x, and 2.0 prior
> to RC1. Snort has published an advisory regarding this vulnerability;
> it is available at
>
> http://www.snort.org/advisories/snort-20...