Информационная безопасность
[RU] switch to English


Проблемы проверки SSL-сертификата в mutt
Опубликовано:1 октября 2011 г.
Источник:
SecurityVulns ID:11935
Тип:m-i-t-m
Уровень опасности:
4/10
Описание:Некорректно проверяется имя хоста в SSL-сертификатах POP3 и SMTP.
CVE:CVE-2011-1429 (Mutt does not verify that the smtps server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL SMTP server via an arbitrary certificate, a different vulnerability than CVE-2009-3766.)
Оригинальный текстdocumentUBUNTU, [USN-1221-1] Mutt vulnerability (01.10.2011)

Многочисленные уязвимости безопасности в Mozilla Firefox / Thunderbird / Seamonkey
Опубликовано:1 октября 2011 г.
Источник:
SecurityVulns ID:11929
Тип:удаленная
Уровень опасности:
9/10
Описание:Многочисленные повреждения памяти, межсайтовый скриптинг, выполнение кода и т.д.
Затронутые продукты:MOZILLA : Firefox 3.6
 MOZILLA : Thunderbird 6.0
 MOZILLA : Firefox 6.0
 MOZILLA : SeaMonkey 2.3
CVE:CVE-2011-3232 (YARR, as used in Mozilla Firefox before 7.0, Thunderbird before 7.0, and SeaMonkey before 2.4, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript.)
 CVE-2011-3005 (Use-after-free vulnerability in Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OGG headers in a .ogg file.)
 CVE-2011-3004 (The JSSubScriptLoader in Mozilla Firefox 4.x through 6 and SeaMonkey before 2.4 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior.)
 CVE-2011-3003 (Mozilla Firefox before 7.0 and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unspecified WebGL test case that triggers a memory-allocation error and a resulting out-of-bounds write operation.)
 CVE-2011-3002 (Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 7.0 and SeaMonkey before 2.4, does not validate the return value of a GrowAtomTable function call, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a memory-allocation error and a resulting buffer overflow.)
 CVE-2011-3001 (Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent manual add-on installation in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that triggers an unspecified internal error.)
 CVE-2011-3000 (Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not properly handle HTTP responses that contain multiple Location, Content-Length, or Content-Disposition headers, which makes it easier for remote attackers to conduct HTTP response splitting attacks via crafted header values.)
 CVE-2011-2999 (Mozilla Firefox before 3.6.23 and 4.x through 5, Thunderbird before 6.0, and SeaMonkey before 2.3 do not properly handle "location" as the name of a frame, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, a different vulnerability than CVE-2010-0170.)
 CVE-2011-2998 (Integer underflow in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via JavaScript code containing a large RegExp expression.)
 CVE-2011-2997 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2011-2996 (Unspecified vulnerability in the plugin API in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2011-2995 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2011-2372 (Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent the starting of a download in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site.)
Оригинальный текстdocumentMOZILLA, Mozilla Foundation Security Advisory 2011-45 (01.10.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-44 (01.10.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-43 (01.10.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-42 (01.10.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-41 (01.10.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-40 (01.10.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-39 (01.10.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-38 (01.10.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-37 (01.10.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-36 (01.10.2011)

Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)
Опубликовано:1 октября 2011 г.
Источник:
SecurityVulns ID:11930
Тип:удаленная
Уровень опасности:
5/10
Описание:Инъекции PHP, инъекции SQL, обратный путь в каталогах, межсайтовый скриптинг, модификация файлов, утечка информации и т.д.
Затронутые продукты:ADOBE : ColdFusion 9.0
 IMPRESSPAGES : ImpressPages CMS 1.0
 OPENENGINE : openEngine 2.0
 JOOMLA : Joomla 1.7
 TRAQ : Traq 2.2
 ESS : European Security Services GPS 1.0
 BITWEAVER : Bitweaver 2.8
Оригинальный текстdocument[email protected], NGS00109 Patch Notification: ImpressPages CMS Remote code execution (01.10.2011)
 documentsschurtz_(at)_t-online.de, openEngine 2.0 'id' Blind SQL Injection vulnerability (01.10.2011)
 documentsschurtz_(at)_t-online.de, Bitweaver 2.8.1 Multiple Cross-site Scripting Vulnerabilities (01.10.2011)
 documentesearch_(at)_vulnerability-lab.com, European Security Services GPS v1.0 - Multiple Vulnerabilities (01.10.2011)
 documentYGN Ethical Hacker Group, Multiple vulnerabilities in Traq (01.10.2011)
 documentYGN Ethical Hacker Group, Joomla! 1.7.0 | Multiple Cross Site Scripting (XSS) Vulnerabilities (01.10.2011)
 documentMustLive, XSS и FPD уязвимости в Adobe ColdFusion (01.10.2011)

Многочисленные уязвимости безопасности в Barracuda Backup
Опубликовано:1 октября 2011 г.
Источник:
SecurityVulns ID:11931
Тип:удаленная
Уровень опасности:
5/10
Описание:Обход аутентификации, межсайтовый скриптинг.
Затронутые продукты:BARRACUDANETWORK : Barracuda Backup 2.0
Оригинальный текстdocumentVulnerability Lab, Barracuda Backup v2.0 - Multiple Web Vulnerabilities (01.10.2011)

Многочисленные уязвимости безопасности в Wireshark
Опубликовано:1 октября 2011 г.
Источник:
SecurityVulns ID:11932
Тип:удаленная
Уровень опасности:
5/10
Описание:Отказ в обслуживании при разборе различных протоколов, поиск динамических библиотек в по недоверенному пути.
Затронутые продукты:WIRESHARK : Wireshark 1.6
CVE:CVE-2011-3484 (The unxorFrame function in epan/dissectors/packet-opensafety.c in the OpenSafety dissector in Wireshark 1.6.x before 1.6.2 does not properly validate a certain frame size, which allows remote attackers to cause a denial of service (loop and application crash) via a malformed packet.)
 CVE-2011-3483 (Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a "buffer exception handling vulnerability.")
 CVE-2011-3482 (The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.2 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.)
 CVE-2011-3360 (Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory.)
Оригинальный текстdocumentMANDRIVA, [ MDVSA-2011:138 ] wireshark (01.10.2011)

Повреждение памяти в NCSS
Опубликовано:1 октября 2011 г.
Источник:
SecurityVulns ID:11933
Тип:локальная
Уровень опасности:
3/10
Описание:Повреждение памяти при разборе файлов S0
Затронутые продукты:NCSS : NCSS 07.1
Оригинальный текстdocumentLuigi Auriemma, Arbitrary memory corruption in NCSS 07.1.21 (01.10.2011)

Многочисленные уязвимости безопасности в Puppet
дополнено с 1 октября 2011 г.
Опубликовано:27 ноября 2011 г.
Источник:
SecurityVulns ID:11934
Тип:локальная
Уровень опасности:
5/10
Описание:Многочисленные возможности перезаписи файлов, подмена сертификатов.
Затронутые продукты:PUPPET : Puppet 2.6
CVE:CVE-2011-3872 (Puppet 2.6.x before 2.6.12 and 2.7.x before 2.7.6, and Puppet Enterprise (PE) Users 1.0, 1.1, and 1.2 before 1.2.4, when signing an agent certificate, adds the Puppet master's certdnsnames values to the X.509 Subject Alternative Name field of the certificate, which allows remote attackers to spoof a Puppet master via a man-in-the-middle (MITM) attack against an agent that uses an alternate DNS name for the master, aka "AltNames Vulnerability.")
 CVE-2011-3871 (Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.)
 CVE-2011-3870 (Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to modify the permissions of arbitrary files via a symlink attack on the SSH authorized_keys file.)
 CVE-2011-3869 (Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to overwrite arbitrary files via a symlink attack on the .k5login file.)
Оригинальный текстdocumentDEBIAN, [SECURITY] [DSA 2352-1] puppet security update (27.11.2011)
 documentUBUNTU, [USN-1223-1] Puppet vulnerabilities (01.10.2011)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород