Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в Mozilla Firefox / Thunderbird / Seamonkey
Опубликовано:1 мая 2014 г.
Источник:
SecurityVulns ID:13687
Тип:клиент
Уровень опасности:
8/10
Описание:Обход защиты, повреждения памяти, подмена сертификата, повышение привилегий, межсайтовый скриптинг.
Затронутые продукты:MOZILLA : Firefox 28.0
 MOZILLA : Seamonkey 2.25
 MOZILLA : Thunderbird 24.4
 MOZILLA : Firefox ESR 24.4
CVE:CVE-2014-1532 (Use-after-free vulnerability in the nsHostResolver::ConditionallyRefreshRecord function in libxul.so in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to host resolution.)
 CVE-2014-1531 (Use-after-free vulnerability in the nsGenericHTMLElement::GetWidthHeightForImage function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving an imgLoader object that is not properly handled during an image-resize operation.)
 CVE-2014-1530 (The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.)
 CVE-2014-1529 (The Web Notification API in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to bypass intended source-component restrictions and execute arbitrary JavaScript code in a privileged context via a crafted web page for which Notification.permission is granted.)
 CVE-2014-1528 (The sse2_composite_src_x888_8888 function in Pixman, as used in Cairo in Mozilla Firefox 28.0 and SeaMonkey 2.25 on Windows, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by painting on a CANVAS element.)
 CVE-2014-1527 (Mozilla Firefox before 29.0 on Android allows remote attackers to spoof the address bar via crafted JavaScript code that uses DOM events to prevent the reemergence of the actual address bar after scrolling has taken it off of the screen.)
 CVE-2014-1526 (The XrayWrapper implementation in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that is visited in the debugger, leading to unwrapping operations and calls to DOM methods on the unwrapped objects.)
 CVE-2014-1525 (The mozilla::dom::TextTrack::AddCue function in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 does not properly perform garbage collection for Text Track Manager variables, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) via a crafted VIDEO element in an HTML document.)
 CVE-2014-1524 (The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object.)
 CVE-2014-1523 (Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image.)
 CVE-2014-1522 (The mozilla::dom::OscillatorNodeEngine::ComputeCustom function in the Web Audio subsystem in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read, memory corruption, and application crash) via crafted content.)
 CVE-2014-1519 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2014-1518 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2014-1515 (Mozilla Firefox before 28.0.1 on Android processes a file: URL by copying a local file onto the SD card, which allows attackers to obtain sensitive information from the Firefox profile directory via a crafted application.)
 CVE-2014-1492 (The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.)
Файлы:Mozilla Foundation Security Advisory 2014-33
 Mozilla Foundation Security Advisory 2014-34
 Mozilla Foundation Security Advisory 2014-35
 Mozilla Foundation Security Advisory 2014-36
 Mozilla Foundation Security Advisory 2014-37
 Mozilla Foundation Security Advisory 2014-38
 Mozilla Foundation Security Advisory 2014-39
 Mozilla Foundation Security Advisory 2014-40
 Mozilla Foundation Security Advisory 2014-41
 Mozilla Foundation Security Advisory 2014-42
 Mozilla Foundation Security Advisory 2014-43
 Mozilla Foundation Security Advisory 2014-44
 Mozilla Foundation Security Advisory 2014-45
 Mozilla Foundation Security Advisory 2014-46
 Mozilla Foundation Security Advisory 2014-47

Обратный путь в каталогах Debian dpkg
Опубликовано:1 мая 2014 г.
Источник:
SecurityVulns ID:13688
Тип:локальная
Уровень опасности:
4/10
Описание:Обратный путь в каталогах на некоторых системах через имена файлов кодированные в C-стиле.
Затронутые продукты:DEBIAN : dpkg 1.17
CVE:CVE-2014-0471 (Directory traversal vulnerability in the unpacking functionality in dpkg before 1.15.9, 1.16.x before 1.16.13, and 1.17.x before 1.17.8 allows remote attackers to write arbitrary files via a crafted source package, related to "C-style filename quoting.")
Оригинальный текстdocumentDEBIAN, [SECURITY] [DSA 2915-2] dpkg security update (01.05.2014)

Обход защиты в Ubuntu Unity
Опубликовано:1 мая 2014 г.
Источник:
SecurityVulns ID:13689
Тип:локальная
Уровень опасности:
5/10
Описание:Обход блокировки экрана.
Затронутые продукты:UNITY : Unity 7.2
Оригинальный текстdocumentUBUNTU, [USN-2184-2] Unity vulnerabilities (01.05.2014)
 documentUBUNTU, [USN-2184-1] Unity vulnerabilities (01.05.2014)

Повреждение памяти через TCP-фрагменты в FreeBSD
Опубликовано:1 мая 2014 г.
Источник:
SecurityVulns ID:13691
Тип:удаленная
Уровень опасности:
8/10
Описание:Повреждение памяти при работе с TCP-фрагментами.
Затронутые продукты:FREEBSD : FreeBSD 8.4
 FREEBSD : FreeBSD 9.2
 FREEBSD : FreeBSD 10.0
CVE:CVE-2014-3000 (The TCP reassembly function in the inet module in FreeBSD 8.3 before p16, 8.4 before p9, 9.1 before p12, 9.2 before p5, and 10.0 before p2 allows remote attackers to cause a denial of service (undefined memory access and system crash) or possibly read system memory via multiple crafted packets, related to moving a reassemble queue entry to the segment list when the queue is full.)
Оригинальный текстdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-14:08.tcp (01.05.2014)

Обход ограничений через devfs в FreeBSD
Опубликовано:1 мая 2014 г.
Источник:
SecurityVulns ID:13692
Тип:локальная
Уровень опасности:
5/10
Описание:Jail-процессы имеют доступ к devfs.
Затронутые продукты:FREEBSD : FreeBSD 10.0
CVE:CVE-2014-3001 (The device file system (aka devfs) in FreeBSD 10.0 before p2 does not load default rulesets when booting, which allows context-dependent attackers to bypass intended restrictions by leveraging a jailed device node process.)
Оригинальный текстdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-14:07.devfs (01.05.2014)

Повреждение памяти в libdw из elfutils
Опубликовано:1 мая 2014 г.
Источник:
SecurityVulns ID:13693
Тип:библиотека
Уровень опасности:
5/10
Описание:Повреждение памяти при разборе ELF.
Затронутые продукты:ELFUTILS : elfutils 0.158
CVE:CVE-2014-0172 (Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.)
Оригинальный текстdocumentUBUNTU, [USN-2188-1] elfutils vulnerability (01.05.2014)

Утечка информации в RSA Access Manager
Опубликовано:1 мая 2014 г.
Источник:
SecurityVulns ID:13694
Тип:локальная
Уровень опасности:
6/10
Описание:Пароли сохраняются в журналах в открытом виде.
Затронутые продукты:EMC : RSA Access Manager Server 6.2
CVE:CVE-2014-0646 (The runtime WS component in the server in EMC RSA Access Manager 6.1.3 before 6.1.3.39, 6.1.4 before 6.1.4.22, 6.2.0 before 6.2.0.11, and 6.2.1 before 6.2.1.03, when INFO logging is enabled, allows local users to discover cleartext passwords by reading log files.)
Оригинальный текстdocumentEMC, ESA-2014-029: RSA® Access Manager Sensitive Information Disclosure Vulnerability (01.05.2014)

Кратковременные условия в OpenSSL
дополнено с 1 мая 2014 г.
Опубликовано:5 мая 2014 г.
Источник:
SecurityVulns ID:13690
Тип:библиотека
Уровень опасности:
7/10
Описание:Кратковременные условия приводят к DoS или возможности инъекции данных.
Затронутые продукты:OPENSSL : OpenSSL 1.0
CVE:CVE-2014-0198 (The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.)
 CVE-2010-5298 (Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.)
Оригинальный текстdocumentUBUNTU, [USN-2192-1] OpenSSL vulnerabilities (05.05.2014)
 documentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-14:09.openssl [REVISED] (01.05.2014)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород