Информационная безопасность
[RU] switch to English


DoS через WebDav против Apache apr-util
дополнено с 2 июня 2009 г.
Опубликовано:5 июня 2009 г.
Источник:
SecurityVulns ID:9954
Тип:удаленная
Уровень опасности:
5/10
Описание:Исчерпание памяти при большом количестве Entity.
Затронутые продукты:APACHE : Apr-util 1.2
CVE:CVE-2009-1956 (Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.)
 CVE-2009-1955 (The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.)
 CVE-2009-0023 (The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.)
Оригинальный текстdocumentDEBIAN, [SECURITY] [DSA 1812-1] New apr-util packages fix several vulnerabilities (05.06.2009)
 documentKingcope Kingcope, The father of all bombs - another webdav fiasco (02.06.2009)
Файлы:Apache mod_dav / svn Remote Denial of Service Exploit

Ежедневная сводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)
Опубликовано:5 июня 2009 г.
Источник:
SecurityVulns ID:9963
Тип:удаленная
Уровень опасности:
5/10
Описание:Инъекции PHP, инъекции SQL, обратный путь в каталогах, межсайтовый скриптинг, модификация файлов, утечка информации и т.д.
Затронутые продукты:GEEKLOG : Geeklog 1.5
 OCSINVENTORY : OCS Inventory NG 1.02
 LIGHTOPENCMS : LightOpenCMS 0.1
 JOOMLA : Joomla! 1.5
 FLATNUX : Flatnux 2009-03-27
 SITECORE : SiteCore.NET 6.0
 LIGHTNEASY : LightNEasy 2.2
 MOZILOCMS : moziloCMS 1.11
CVE:CVE-2009-0667 (Untrusted search path vulnerability in Agent/Backend.pm in Ocsinventory-Agent before 0.0.9.3, and 1.x before 1.0.1, in OCS Inventory allows local users to gain privileges via a Trojan horse Perl module in an arbitrary directory.)
Оригинальный текстdocumentsecurity_(at)_intern0t.net, [InterN0T] moziloCMS 1.11.1 - XSS Vulnerability (05.06.2009)
 documentsecurity_(at)_intern0t.net, [InterN0T] LightNEasy 2.2.2 - HTML Injection Vulnerability (05.06.2009)
 documentsecurity_(at)_intern0t.net, [InterN0T] SiteCore.NET 6.0.0 - XSS Vulnerability (05.06.2009)
 documentsecurity_(at)_intern0t.net, [InterN0T] Geeklog 1.5 - Pre-Installation Vulnerabilities (05.06.2009)
 documentsecurity_(at)_intern0t.net, [InterN0T] Flatnux 2009-03-27 - XSS Vulnerabilities + More (05.06.2009)
 documenty3nh4ck3r_(at)_gmail.com, SQL INJECTION VULNERABILITY--LightOpen CMS Devel 0.1--> (05.06.2009)
 documentISecAuditors Security Advisories, [ISecAuditors Security Advisories] Joomla! 1.5.10 JA_Purity Multiple Persistent XSS (05.06.2009)
 documentSalvatore "drosophila" Fresta, LightOpenCMS 0.1 pre-alpha Remote SQL Injection (05.06.2009)

Переполнение буфера в утилите file
Опубликовано:5 июня 2009 г.
Источник:
SecurityVulns ID:9964
Тип:локальная
Уровень опасности:
4/10
Описание:Переполнение буфера при анализе файлов .msi, .doc, .mpp.
Затронутые продукты:FILE : file 5.00
CVE:CVE-2009-1515 (Heap-based buffer overflow in the cdf_read_sat function in src/cdf.c in Christos Zoulas file 5.00 allows user-assisted remote attackers to execute arbitrary code via a crafted compound document file, as demonstrated by a .msi, .doc, or .mpp file. NOTE: some of these details are obtained from third party information.)
Оригинальный текстdocumentMANDRIVA, [ MDVSA-2009:129 ] file (05.06.2009)

DoS против XM Easy Personal FTP Server
Опубликовано:5 июня 2009 г.
Источник:
SecurityVulns ID:9966
Тип:удаленная
Уровень опасности:
5/10
Описание:Переполнение буфера на командах HELP и TYPE.
Затронутые продукты:DXMSOFT : XM Easy Personal FTP Server 5.7
Оригинальный текстdocumentneeraj.thakar_(at)_nevisnetworks.com, [Security] XM Easy Personal FTP Server Multiple DoS vulnerabilities (05.06.2009)
Файлы:XM Easy Personal FTP Server HELP and TYPE command Remote Denial of Service exploit

Многочисленные уязвимости безопасности в Apache Tomcat
дополнено с 5 июня 2009 г.
Опубликовано:14 июня 2009 г.
Источник:
SecurityVulns ID:9965
Тип:удаленная
Уровень опасности:
6/10
Описание:Утечка информации, проверка существования пользователя, DoS, обратный путь в каталогах.
Затронутые продукты:APACHE : Tomcat 4.1
 APACHE : Tomcat 5.5
 APACHE : Tomcat 6.0
CVE:CVE-2009-0783 (Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.)
 CVE-2009-0580 (Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.)
 CVE-2009-0033 (Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.)
 CVE-2008-5515 (Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.)
Оригинальный текстdocumentAPACHE, [SECURITY] UPDATED CVE-2008-5515 RequestDispatcher directory traversal vulnerability (14.06.2009)
 documentAPACHE, [SECURITY] CVE-2008-5515 RequestDispatcher directory traversal vulnerability (09.06.2009)
 documentAPACHE, [SECURITY] CVE-2009-0580 UPDATED Apache Tomcat User enumeration vulnerability with FORM authentication (05.06.2009)
 documentAPACHE, [SECURITY] CVE-2009-0783 Apache Tomcat Information disclosure (05.06.2009)
 documentAPACHE, [SECURITY] CVE-2009-0580 Apache Tomcat User enumeration vulnerability with FORM authentication (05.06.2009)
 documentAPACHE, [SECURITY] CVE-2009-0033 Apache Tomcat DoS when using Java AJP connector (05.06.2009)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород