Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в Mozilla Firefox / Thunderbird / Seamonkey
Опубликовано:8 декабря 2014 г.
Источник:
SecurityVulns ID:14138
Тип:клиент
Уровень опасности:
8/10
Описание:Повреждения памяти, переполнение буфера, утечка информации, DoS, повышение привилегий.
Затронутые продукты:MOZILLA : Firefox ESR 31.2
 MOZILLA : Firefox 33
 MOZILLA : Thunderbird 31.2
CVE:CVE-2014-8632 (The structured-clone implementation in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 does not properly interact with XrayWrapper property filtering, which allows remote attackers to bypass intended DOM object restrictions by leveraging property availability after XrayWrapper removal.)
 CVE-2014-8631 (The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 supports native-interface passing, which allows remote attackers to bypass intended DOM object restrictions via a call to an unspecified method.)
 CVE-2014-1595 (Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, and Thunderbird before 31.3 on Apple OS X 10.10 omit a CoreGraphics disable-logging action that is needed by jemalloc-based applications, which allows local users to obtain sensitive information by reading /tmp files, as demonstrated by credential information.)
 CVE-2014-1594 (Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 might allow remote attackers to execute arbitrary code by leveraging an incorrect cast from the BasicThebesLayer data type to the BasicContainerLayer data type.)
 CVE-2014-1593 (Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.)
 CVE-2014-1592 (Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing.)
 CVE-2014-1591 (Mozilla Firefox 33.0 and SeaMonkey before 2.31 include path strings in CSP violation reports, which allows remote attackers to obtain sensitive information via a web site that receives a report after a redirect.)
 CVE-2014-1590 (The XMLHttpRequest.prototype.send method in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to cause a denial of service (application crash) via a crafted JavaScript object.)
 CVE-2014-1589 (Mozilla Firefox before 34.0 and SeaMonkey before 2.31 provide stylesheets with an incorrect primary namespace, which allows remote attackers to bypass intended access restrictions via an XBL binding.)
 CVE-2014-1588 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2014-1587 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
Файлы: Mozilla Foundation Security Advisory 2014-83
  Mozilla Foundation Security Advisory 2014-84
  Mozilla Foundation Security Advisory 2014-85
  Mozilla Foundation Security Advisory 2014-86
  Mozilla Foundation Security Advisory 2014-87
  Mozilla Foundation Security Advisory 2014-88
  Mozilla Foundation Security Advisory 2014-89
  Mozilla Foundation Security Advisory 2014-90
  Mozilla Foundation Security Advisory 2014-91

Многочисленные уязвимости безопасности в qemu
дополнено с 13 октября 2014 г.
Опубликовано:8 декабря 2014 г.
Источник:
SecurityVulns ID:14003
Тип:локальная
Уровень опасности:
6/10
Описание:Многочисленные повреждения памяти в драйверах, DoS, утечка информации.
Затронутые продукты:QEMU : qemu 1.1
CVE:CVE-2014-8106 (Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.)
 CVE-2014-7815 (The set_pixel_format function in ui/vnc.c in QEMU allows remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value.)
 CVE-2014-3689 (The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.)
 CVE-2014-3640 (The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.)
 CVE-2014-3615 (The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.)
 CVE-2014-0223 (Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.)
 CVE-2014-0222 (Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.)
 CVE-2014-0147
 CVE-2014-0146
 CVE-2014-0145
 CVE-2014-0144
 CVE-2014-0143
 CVE-2014-0142
Оригинальный текстdocumentDEBIAN, [SECURITY] [DSA 3087-1] qemu security update (08.12.2014)
 documentDEBIAN, [SECURITY] [DSA 3066-1] qemu security update (10.11.2014)
 documentDEBIAN, [SECURITY] [DSA 3045-1] qemu security update (13.10.2014)

Многочисленные уязвимости безопасности в библиотеке jasper
дополнено с 8 декабря 2014 г.
Опубликовано:25 января 2015 г.
Источник:
SecurityVulns ID:14137
Тип:библиотека
Уровень опасности:
6/10
Описание:Переполнение буфера в функциях jpc_dec_cp_setfromcox() и jpc_dec_cp_setfromrgn(), двойное освобождение памяти, переполнение буфера динамической памяти.
Затронутые продукты:JASPER : JasPer 1.900
CVE:CVE-2014-9029 (Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.)
 CVE-2014-8158 (Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.)
 CVE-2014-8157 (Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.)
 CVE-2014-8138 (Heap-based buffer overflow in the jp2_decode function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 file.)
 CVE-2014-8137 (Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file.)
Оригинальный текстdocumentAndrea Barisani, [oCERT-2015-001] JasPer input sanitization errors (25.01.2015)
 documentAndrea Barisani, [oCERT-2014-012] JasPer input sanitization errors (22.12.2014)
 documentAndrea Barisani, [oCERT-2014-009] JasPer input sanitization errors (08.12.2014)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород