Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в Mozilla Firefox / Thunderbird / Seamonkey
Опубликовано:8 апреля 2015 г.
Источник:
SecurityVulns ID:14355
Тип:клиент
Уровень опасности:
8/10
Описание:Обход проверки сертификата, выполнение кода, обход ограничений, повреждения памяти, перехват курсора.
Затронутые продукты:MOZILLA : Thunderbird 31.5
 MOZILLA : Firefox 36
 MOZILLA : Firefox ESR 31.5
CVE:CVE-2015-2706 (Race condition in the AsyncPaintWaitEvent::AsyncPaintWaitEvent function in Mozilla Firefox before 37.0.2 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted plugin that does not properly complete initialization.)
 CVE-2015-0816 (Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 do not properly restrict resource: URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy, as demonstrated by the resource: URL associated with PDF.js.)
 CVE-2015-0815 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2015-0814 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2015-0813 (Use-after-free vulnerability in the AppendElements function in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 on Linux, when the Fluendo MP3 plugin for GStreamer is used, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted MP3 file.)
 CVE-2015-0812 (Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.)
 CVE-2015-0811 (The QCMS implementation in Mozilla Firefox before 37.0 allows remote attackers to obtain sensitive information from process heap memory or cause a denial of service (out-of-bounds read) via an image that is improperly handled during transformation.)
 CVE-2015-0810 (Mozilla Firefox before 37.0 on OS X does not ensure that the cursor is visible, which allows remote attackers to conduct clickjacking attacks via a Flash object in conjunction with DIV elements associated with layered presentation, and crafted JavaScript code that interacts with an IMG element.)
 CVE-2015-0808 (The webrtc::VPMContentAnalysis::Release function in the WebRTC implementation in Mozilla Firefox before 37.0 uses incompatible approaches to the deallocation of memory for simple-type arrays, which might allow remote attackers to cause a denial of service (memory corruption) via unspecified vectors.)
 CVE-2015-0807 (The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.)
 CVE-2015-0806 (The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 attempts to use memset for a memory region of negative length during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors that trigger rendering of 2D graphics content.)
 CVE-2015-0804 (The HTMLSourceElement::BindToTree function in Mozilla Firefox before 37.0 does not properly constrain a data type after omitting namespace validation during certain tree-binding operations, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document containing a SOURCE element.)
 CVE-2015-0803 (The HTMLSourceElement::AfterSetAttr function in Mozilla Firefox before 37.0 does not properly constrain the original data type of a casted value during the setting of a SOURCE element's attributes, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document.)
 CVE-2015-0802 (Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods.)
 CVE-2015-0801 (Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.)
 CVE-2015-0800 (The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2012-2808.)
 CVE-2015-0799 (The HTTP Alternative Services feature in Mozilla Firefox before 37.0.1 allows man-in-the-middle attackers to bypass an intended X.509 certificate-verification step for an SSL server by specifying that server in the uri-host field of an Alt-Svc HTTP/2 response header.)
 CVE-2015-0798 (The Reader mode feature in Mozilla Firefox before 37.0.1 on Android, and Desktop Firefox pre-release, does not properly handle privileged URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy.)
 CVE-2012-2808 (The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2015-0800.)
Файлы: Mozilla Foundation Security Advisory 2015-30 Miscellaneous memory safety hazards (rv:37.0 / rv:31.6)
  Mozilla Foundation Security Advisory 2015-31 Use-after-free when using the Fluendo MP3 GStreamer plugin
  Mozilla Foundation Security Advisory 2015-32 Add-on lightweight theme installation approval bypassed through MITM attack
  Mozilla Foundation Security Advisory 2015-33 resource:// documents can load privileged pages
  Mozilla Foundation Security Advisory 2015-34 Out of bounds read in QCMS library
  Mozilla Foundation Security Advisory 2015-35 Cursor clickjacking with flash and images
  Mozilla Foundation Security Advisory 2015-36 Incorrect memory management for simple-type arrays in WebRTC
  Mozilla Foundation Security Advisory 2015-37 CORS requests should not follow 30x redirections after preflight
  Mozilla Foundation Security Advisory 2015-38 Memory corruption crashes in Off Main Thread Compositing
  Mozilla Foundation Security Advisory 2015-39 Use-after-free due to type confusion flaws
  Mozilla Foundation Security Advisory 2015-40 Same-origin bypass through anchor navigation
  Mozilla Foundation Security Advisory 2015-41 PRNG weakness allows for DNS poisoning on Android
  Mozilla Foundation Security Advisory 2015-42 Windows can retain access to privileged content on navigation to unprivileged pages
  Mozilla Foundation Security Advisory 2015-43 Loading privileged content through Reader mode
  Mozilla Foundation Security Advisory 2015-44 Certificate verification bypass through the HTTP/2 Alt-Svc header
  Mozilla Foundation Security Advisory 2015-45 Memory corruption during failed plugin initialization

DoS против tor
Опубликовано:8 апреля 2015 г.
Источник:
SecurityVulns ID:14361
Тип:удаленная
Уровень опасности:
5/10
Описание:Многочисленные DoS условия.
CVE:CVE-2015-2929
 CVE-2015-2928
Оригинальный текстdocumentDEBIAN, [SECURITY] [DSA 3216-1] tor security update (08.04.2015)
 documentDEBIAN, [SECURITY] [DSA 3203-1] tor security update (08.04.2015)

Слабые разрешение в zfs в FreeBSD
дополнено с 7 января 2010 г.
Опубликовано:8 апреля 2015 г.
Источник:
SecurityVulns ID:10502
Тип:локальная
Уровень опасности:
3/10
Описание:При повторении транзакции могут быть восстановлены некорректные разрешения файла.
Затронутые продукты:FREEBSD : FreeBSD 7.1
 FREEBSD : FreeBSD 7.2
 FREEBSD : FreeBSD 8.0
Оригинальный текстdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-10:03.zfs (07.01.2010)

DoS против IPv6 в FreeBSD
Опубликовано:8 апреля 2015 г.
Источник:
SecurityVulns ID:14359
Тип:удаленная
Уровень опасности:
6/10
Описание:Можно установить низкий current hope limit через Neighbor Discover Protocol
Затронутые продукты:FREEBSD : FreeBSD 10.1
 FREEBSD : FreeBSD 9.3
 FREEBSD : FreeBSD 8.4
CVE:CVE-2015-2923
Оригинальный текстdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-15:09.ipv6 (08.04.2015)

Обход ограничений в ntpd
Опубликовано:8 апреля 2015 г.
Источник:
SecurityVulns ID:14360
Тип:удаленная
Уровень опасности:
6/10
Описание:Некорректно реализован механизм аутентификации message authentication code.
Затронутые продукты:FREEBSD : FreeBSD 10.1
 FREEBSD : FreeBSD 9.3
 FREEBSD : FreeBSD 8.4
CVE:CVE-2015-1799 (The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.)
 CVE-2015-1798 (The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC.)
Оригинальный текстdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-15:07.ntp (08.04.2015)

Повреждение памяти в libtasn1
Опубликовано:8 апреля 2015 г.
Источник:
SecurityVulns ID:14357
Тип:библиотека
Уровень опасности:
7/10
Описание:Повреждение памяти при разборе ASN.1
Затронутые продукты:LIBTASN1 : libtasn1 4.0
CVE:CVE-2015-2806 (Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.)
Оригинальный текстdocumentUBUNTU, [USN-2559-1] Libtasn1 vulnerability (08.04.2015)

Слабые разрешения в FreeBSD
Опубликовано:8 апреля 2015 г.
Источник:
SecurityVulns ID:14358
Тип:локальная
Уровень опасности:
6/10
Описание:Слабые разрешения на файлы с ключами ZFS и GELI.
Затронутые продукты:FREEBSD : FreeBSD 10.1
CVE:CVE-2015-1415 (The bsdinstall installer in FreeBSD 10.x before 10.1 p9, when configuring full disk encrypted ZFS, uses world-readable permissions for the GELI keyfile (/boot/encryption.key), which allows local users to obtain sensitive key information by reading the file.)
Оригинальный текстdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-15:08.bsdinstall (08.04.2015)
 documentFREEBSD, FreeBSD 10.x ZFS encryption.key disclosure (CVE-2015-1415) (08.04.2015)

Многочисленные уязвимости безопасности в Apple Safari / WebKit
дополнено с 8 апреля 2015 г.
Опубликовано:19 апреля 2015 г.
Источник:
SecurityVulns ID:14356
Тип:библиотека
Уровень опасности:
8/10
Описание:Некорректная проверка SSL-сертификатов, утечка информации, повреждения памяти, межсайтовый доступ.
Затронутые продукты:APPLE : Safari 8.0
 APPLE : Safari 6.2
 APPLE : Safari 7.1
CVE:CVE-2015-1129 (Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 does not properly select X.509 client certificates, which makes it easier for remote attackers to track users via a crafted web site.)
 CVE-2015-1128 (The private-browsing implementation in Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 allows attackers to obtain sensitive browsing-history information via vectors involving push-notification requests.)
 CVE-2015-1127 (The private-browsing implementation in WebKit in Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 places browsing history into an index, which might allow local users to obtain sensitive information by reading index entries.)
 CVE-2015-1126 (WebKit, as used in Apple iOS before 8.3 and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, does not properly handle the userinfo field in FTP URLs, which allows remote attackers to trigger incorrect resource access via unspecified vectors.)
 CVE-2015-1124 (WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.)
 CVE-2015-1122 (WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.)
 CVE-2015-1121 (WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.)
 CVE-2015-1120 (WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.)
 CVE-2015-1119 (WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.)
 CVE-2015-1112 (Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, as used on iOS before 8.3 and other platforms, does not properly delete browsing-history data from the history.plist file, which allows attackers to obtain sensitive information by reading this file.)
Оригинальный текстdocumentJouko Pynnonen, Safari iOS/OS X/Windows cookie access vulnerability (19.04.2015)
 documentAPPLE, APPLE-SA-2015-04-08-1 Safari 8.0.5, Safari 7.1.5, and Safari 6.2.5 (08.04.2015)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород