Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в MySQL
дополнено с 4 декабря 2012 г.
Опубликовано:7 декабря 2012 г.
Источник:
SecurityVulns ID:12741
Тип:удаленная
Уровень опасности:
8/10
Описание:Переполнения буфера, утечка информации, повышение привилегий, DoS.
Затронутые продукты:ORACLE : MySQL 5.5
CVE:CVE-2012-5615 (MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a, 5.3.11, 5.2.13, 5.1.66, and possibly other versions, generates different error messages with different time delays depending on whether a user name exists, which allows remote attackers to enumerate valid usernames.)
 CVE-2012-5614 (Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (mysqld crash) via a SELECT command with an UpdateXML command containing XML with a large number of unique, nested elements.)
 CVE-2012-5613 (** DISPUTED ** MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a and possibly other versions, when configured to assign the FILE privilege to users who should not have administrative privileges, allows remote authenticated users to gain privileges by leveraging the FILE privilege to create files as the MySQL administrator. NOTE: the vendor disputes this issue, stating that this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. NOTE: it could be argued that this should not be included in CVE because it is a configuration issue.)
 CVE-2012-5612 (Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions through 5.5.28, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code, as demonstrated using certain variations of the (1) USE, (2) SHOW TABLES, (3) DESCRIBE, (4) SHOW FIELDS FROM, (5) SHOW COLUMNS FROM, (6) SHOW INDEX FROM, (7) CREATE TABLE, (8) DROP TABLE, (9) ALTER TABLE, (10) DELETE FROM, (11) UPDATE, and (12) SET PASSWORD commands.)
 CVE-2012-5611 (Stack-based buffer overflow in the acl_get function in Oracle MySQL 5.5.19 and other versions through 5.5.28, and 5.1.53 and other versions through 5.1.66, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command.)
 CVE-2012-5579 (** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-5611. Reason: This candidate is a duplicate of CVE-2012-5611. Notes: All CVE users should reference CVE-2012-5611 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.)
Оригинальный текстdocumentHI-TECH ., MySQL Local/Remote FAST Account Password Cracking (07.12.2012)
Файлы:MySQL (Linux) Stack based buffer overrun PoC Zeroday
 MySQL (Linux) Heap Based Overrun PoC Zeroday
 MySQL (Linux) Database Privilege Elevation Zeroday Exploit
 MySQL Denial of Service Zeroday PoC
 MySQL Remote Preauth User Enumeration Zeroday
 MySQL Scanner & MySQL Server for Windows Remote SYSTEM Level Exploit

DoS против библиотеки libtiff
Опубликовано:7 декабря 2012 г.
Источник:
SecurityVulns ID:12745
Тип:библиотека
Уровень опасности:
5/10
Описание:Отказ при разборе тэга DOTRANGE.
Затронутые продукты:LIBTIFF : libtiff 3.9
CVE:CVE-2012-5581 (Stack-based buffer overflow in tif_dir.c in LibTIFF before 4.0.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DOTRANGE tag in a TIFF image.)
Оригинальный текстdocumentUBUNTU, [USN-1655-1] LibTIFF vulnerability (07.12.2012)

Повышение привилегий в cups
Опубликовано:7 декабря 2012 г.
Источник:
SecurityVulns ID:12746
Тип:локальная
Уровень опасности:
5/10
Описание:Слабые разрешения на файлы конфигурации.
Затронутые продукты:CUPS : CUPS 1.4
CVE:CVE-2012-5519 (CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging the web interface.)
Оригинальный текстdocumentUBUNTU, [USN-1654-1] CUPS vulnerability (07.12.2012)

Многочисленные уязвимости безопасности в Apache Tomcat
Опубликовано:7 декабря 2012 г.
Источник:
SecurityVulns ID:12747
Тип:удаленная
Уровень опасности:
5/10
Описание:Обход защиты, DoS.
Затронутые продукты:APACHE : Tomcat 6.0
 APACHE : Tomcat 7.0
CVE:CVE-2012-4534 (org/apache/tomcat/util/net/NioEndpoint.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28, when the NIO connector is used in conjunction with sendfile and HTTPS, allows remote attackers to cause a denial of service (infinite loop) by terminating the connection during the reading of a response.)
 CVE-2012-4431 (org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.32 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism via a request that lacks a session identifier.)
 CVE-2012-3546 (org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.30, when FORM authentication is used, allows remote attackers to bypass security-constraint checks by leveraging a previous setUserPrincipal call and then placing /j_security_check at the end of a URI.)
Оригинальный текстdocumentAPACHE, CVE-2012-4431 Apache Tomcat Bypass of CSRF prevention filter (07.12.2012)
 documentAPACHE, CVE-2012-3546 Apache Tomcat Bypass of security constraints (07.12.2012)
 documentAPACHE, CVE-2012-4534 Apache Tomcat denial of service (07.12.2012)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород