search for: coresecur

Displaying 4 results from an estimated 4 matches for "coresecur".

2018 Feb 21
2
how to build wmic
Andrew, Thanks very much. After sending my question, I discovered that the DCOM area was disabled in the build as of 8 years ago, so it became clear that this is not currently supported in any way. Steve Koehler On Wed, Feb 21, 2018 at 11:49 AM, Andrew Bartlett <abartlet at samba.org> wrote: > On Wed, 2018-02-21 at 11:16 -0600, Stephen Koehler via samba wrote: > > I see that
2018 Feb 21
1
how to build wmic
...I discovered that the DCOM > area was disabled in the build as of 8 years ago, so it became clear that > this is not currently supported in any way. > > This looks very interesting: > > https://github.com/dlundgren/py-wmi-client > > It in turn is based on https://github.com/CoreSecurity/impacket which > is a raw client library in python. > > Andrew Bartlett > -- > Andrew Bartlett > https://samba.org/~abartlet/ > Authentication Developer, Samba Team https://samba.org > Samba Development and Support, Catalyst IT > https://catalyst.net.nz/service...
2006 Jun 05
1
Asterisk 1.2.9 and 1.0.11 Released -- Security Fix
The Asterisk Development Team today released Asterisk 1.2.9 and Asterisk 1.0.11 to address a security vulnerability in the IAX2 channel driver (chan_iax2). The vulnerability affects all users with IAX2 clients that might be compromised or used by a malicious user, and can lead to denial of service attacks and random Asterisk server crashes via a relatively trivial exploit. All users are urged to
2003 Apr 17
1
[Fwd: CERT Advisory CA-2003-13 Multiple Vulnerabilities in Snort Preprocessors]
...umbers. This causes the module to > bypass a check for buffer overflow attempts and allows the attacker to > insert arbitrary code into the heap. > > For additional information, please read the Core Security Technologies > Advisory located at > > http://www.coresecurity.com/common/showdoc.php?idx=313&idxseccion=10 > > This vulnerability affects Snort versions 1.8.x, 1.9.x, and 2.0 prior > to RC1. Snort has published an advisory regarding this vulnerability; > it is available at > > http://www.snort.org/advisories/snort-20...