Tuesday, 2 October 2018

Minecraft - download free full version game for PC

Free Download Complete Setup Zip or Torrent File of Minecraft  by just one click. Minecraft is a action, adventure and amazing game with multiple mode.

Minecraft Game Overview:

Minecraft is developed and published by Mojang. The game allows players to build with a variety of different blocks in a 3D procedurally generated world, requiring creativity from players. Other activities in the game include exploration, resource gathering, crafting, and combat.
Minecraft - download free full version game for PC

Do you like playing online with your friends or meet new people? In that case Minecraft Download for free today and install full version on your computer. Creating incredible world that was imagined by you. Also, play with other players from all over the world. We offer you full version of the game. Minecraft is a production of Mojang AB studio. We become a protagonist that acquire large blocks that are similar to bricks and then we create various constructions.
Minecraft Gameplay

This is look like one huge sandbox. It is not limited in any way, player moves freely anywhere. We are moved to a generated world made of three-dimensional blocks. Roaming around the globe we obtain materials from which we can make everything we want- tools, weapons or buildings. Minecraft is built of blocks that have different qualities and they will be for different purposes.
Minecraft Gameplay

Features of Minecraft Game:

  • Enter an unlimited world made by pixels
  • Create your own character at this enormous world
  • Make friends with the other users to have cooperation
  • Buy or craft new items to have new adventures

System Requirements for Minecraft:

  • CPU: Intel Pentium D or AMD Athlon 64 (K8) 2.6 GHz
  • RAM: 2GB
  • VGA: GeForce 6xxx or ATI Radeon 9xxx and up with OpenGL 2 Support – Excluding Integrated Chipsets
  • OS: Windows XP or better, Mac OS 10.5.8 or better, Linux
  • HDD: 150MB
Note: Java – Java SE 6 Update 32 or Java SE 7 Update 4 or newer is preferred

Minecraft - download free full version

Download Minecraft for PC:

Click on the below button to free download Minecraft for free:
Minecraft - download free full version



Click on the below button to free download Minecraft torrent for free:
Minecraft - download free full version

Note μTorrent is required to download .torrent file

If you really like the Game buy  Minecraft at minecraft.net and support the developer.

EDB-ID-45502: The vulnerabilities can Break the Microsoft Edge Sandbox


EDB-ID-45502 - The vulnerabilities can Break the Microsoft Edge Sandbox

EDB-ID: 45502
CVE: CVE-2018-8463, CVE-2018-8468, CVE-2018-8469
E-DB Verified: Yes
Author: Google Security Research
Type: Remote
Advisory/Source: bugs.chromium.org
Published: 2018-09-27 (2018-10 on GitHackTools)
Platform: Windows


Vulnerable: Microsoft Edge
 * Microsoft Windows 10 for 32-bit Systems
 * Microsoft Windows 10 for x64-based Systems
 * Microsoft Windows 10 version 1511 for 32-bit Systems
 * Microsoft Windows 10 version 1511 for x64-based Systems
 * Microsoft Windows 10 Version 1607 for 32-bit Systems
 * Microsoft Windows 10 Version 1607 for x64-based Systems
 * Microsoft Windows 10 version 1703 for 32-bit Systems
 * Microsoft Windows 10 version 1703 for x64-based Systems
 * Microsoft Windows 10 version 1709 for 32-bit Systems
 * Microsoft Windows 10 version 1709 for x64-based Systems
 * Microsoft Windows 10 Version 1803 for 32-bit Systems
 * Microsoft Windows 10 Version 1803 for x64-based Systems
 * Microsoft Windows Server 2016
 * Microsoft Windows Server 2016 for x64-based Systems
 * Microsoft Windows Server 2012 R2
 * Microsoft Windows Server 2012
 * Microsoft Windows Server 2008 R2 for x64-based Systems SP1
 * Microsoft Windows Server 2008 R2 for Itanium-based Systems SP1
 * Microsoft Windows Server 2008 for x64-based Systems SP2
 * Microsoft Windows Server 2008 for Itanium-based Systems SP2
 * Microsoft Windows Server 2008 for 32-bit Systems SP2

About CVE-2018-8463
   An elevation of privilege vulnerability exists in Microsoft Edge that could allow an attacker to escape from the AppContainer sandbox in the browser, aka "Microsoft Edge Elevation of Privilege Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8469.
   An elevation of privilege vulnerability exists in Microsoft Edge that could allow an attacker to escape from the AppContainer sandbox in the browser. An attacker who successfully exploited this vulnerability could gain elevated privileges and break out of the Edge AppContainer sandbox.
   The vulnerability by itself does not allow arbitrary code to run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (for example a remote code execution vulnerability and another elevation of privilege vulnerability) to take advantage of the elevated privileges when running.
   The security update addresses the vulnerability by modifying how Microsoft Edge handles sandboxing.

About CVE-2018-8468
   An elevation of privilege vulnerability exists when Windows, allowing a sandbox escape, aka "Windows Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
   An elevation of privilege vulnerability exists in Windows that allows a sandbox escape. An attacker who successfully exploited the vulnerability could use the sandbox escape to elevate privileges on an affected system.
   This vulnerability by itself does not allow arbitrary code execution. However, the vulnerability could allow arbitrary code to run if an attacker uses it in combination with another vulnerability, such as a remote code execution vulnerability or another elevation of privilege vulnerability, that can leverage the elevated privileges when code execution is attempted.
   The security update addresses the vulnerability by correcting how Windows parses files.

About CVE-2018-8469
   An elevation of privilege vulnerability exists in Microsoft Edge that could allow an attacker to escape from the AppContainer sandbox in the browser, aka "Microsoft Edge Elevation of Privilege Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8463.
   An elevation of privilege vulnerability exists in Microsoft Edge that could allow an attacker to escape from the AppContainer sandbox in the browser. An attacker who successfully exploited this vulnerability could gain elevated privileges and break out of the Edge AppContainer sandbox.
   The vulnerability by itself does not allow arbitrary code to run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (for example a remote code execution vulnerability and another elevation of privilege vulnerability) to take advantage of the elevated privileges when running.
   The security update addresses the vulnerability by modifying how Microsoft Edge handles sandboxing.


And have something to say about GitHackTools or EDB-ID-45502 (or CVE-2018-8463, CVE-2018-8468, CVE-2018-8469)? Comment below or share this post from GitHackTools FacebookGitHackTools Twitter and GitHackTools Google Plus.

From Exploit Database, CVE and Microsoft

[ZeroDay] ZDI-18-1078: Cisco WebEx Network Recording Player NMVC RtpConfig Stack-based Buffer Overflow Remote Code Execution Vulnerability

About ZDI-18-1078
   Cisco WebEx Network Recording Player NMVC RtpConfig Stack-based Buffer Overflow Remote Code Execution Vulnerability

   ZDI ID: ZDI-18-1078 or ZDI-CAN-6254
   CVE ID: CVE-2018-15421
   CVSS SCORE: 5.1, (AV:N/AC:H/Au:N/C:P/I:P/A:P)
   AFFECTED VENDORS: Cisco
   AFFECTED PRODUCTS: WebEx


   Additonal Details

      Cisco has issued an update to correct this vulnerability. More details can be found at: cisco-sa-20180919-webex

   Timeline:
    * 2018-05-24 - Vulnerability reported to vendor
    * 2018-09-21 - Coordinated public release of advisory
    * 2018-09-21 - Advisory Updated

   Credit: Ziad Badawi

   Vulnerability Details
      This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco WebEx Network Recording Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the
NMVC.DLL module. When parsing an ARF file, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process.

Over this past year, several different researchers submitted bug reports in the Cisco Webex suite of programs. However, in their more than 40 submissions, they missed this trivial stack-based buffer overflow. This blog details ZDI-18-1078, a vulnerability in Cisco Webex Network Recording Player version 31.23.2.58 (now reaching its EOL) that results in remote code execution.

The Vulnerability
   When reading an Advanced Recording (
.arf) file, the player attempts to access a file in the current directory named RtpConfig.ini. This action is not documented. The .ini file contains the configuration for what is likely a Real-Time Transport Protocol (RTP) service, but since there is no documentation of the file or the service, it may be something different.
Process Monitor showing nbrplay.exe looking for RtpConfig.ini

   The bug occurs in nmvc.dll inside a routine labeled sub_1001F479 that parses RtpConfig.ini and extracts its properties. The following snippet shows how the MinLostRate parameter is getting set up as well as other parameters going downwards.
Setting up different properties

   The culprit here is a sscanf call, a banned function by Microsoft, with no width field in the format string. The sscanf function parses the .ini file contents and reads property values in order to match them to a set of hardcoded parameters. The format used is: %[^ \t#]%*[ \t]%[^ \t#]%n

   Which writes to three arguments. The first and third specifiers (%[^ \t#]) do not use a width value in between the % and [. This means it will read every character until it reaches whitespace. This will write to the passed arguments Str1 and Source disregarding their sizes and could lead to an overflow if input is large enough.
No width in format string
   The .ini file is read in 0x3FF-byte chunks and, since both consecutive variables Source and Str1 are sized 0x100 and 0x106 bytes respectively, an overflow can occur leading to a corrupted stack.

Corrupted stack

Conclusion

   Cisco patched this and two other vulnerabilities with advisory cisco-sa-20180919-webex. It is good to know that these versions are reaching their EOL, as many similar bugs have been submitted to the program. Hopefully, the newer versions are more secure. Bug submissions in enterprise software are on the rise, putting this category just behind Desktop Application and SCADA submissions. Considering how many of these programs exist in enterprises, this trend will likely continue.

   You can find author on Twitter@ziadrb and follow the his team for the latest exploit techniques and security patches.

And have something to say about GitHackTools or ZDI-18-1078 (or CVE-2018-15421)? Comment below or share this post from GitHackTools FacebookGitHackTools Twitter and GitHackTools Google Plus.

Monday, 1 October 2018

WHITE FLAG - Sgt. Pepper 1987

A decent record is this litte compilation with songs from the 'Zero Hour' and 'Wild Kingdom' albums by White Flag from Los Angeles and I guess it was pounded up for the European or Asian fans, who knows? Fact is, all sixteen songs are damn cool and they don't lose their great sense of humor and writing good music. More stuff in form of an EP and another album waits under the hidden orange crime scene marker. It's fun to post again with the new monitor and I should have exchanged it earlier. Sometimes it's the small changes that brighten your mood.


PELLE MILJOONA - Nuoret Sankarit 1978-1982

Pelle Miljoona was a Finnish punkrock band which was founded in 1979 and disbanded in 1983. The band is (along with Pelle Miljoona & 1980) the most famous of Pelle Miljoona’s bands. They released a lot of singles and LP's and so this two CD collection gives a pretty view of the creative life of this extraordinary band by Petri Samuli Tiili (so the real name from Mr.Pelle). Disc one contains early recordings and the songs are short, punk and just plain cool, and even here already rocking numbers represented. I think the versatility which present the band their goodies is very nice and with a total running time of almost two hours makes listening to both CD's never boring. On the second disc are the songs on average much playing time with three minutes longer, topped with poppy keyboards and ska elements, so that is a pleasure to listen here too. All in all, the 36 songs slip comfortably into any bloodstream. So if you have the opportunity to buy this record, do this without hesitation.