Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в Mozilla Firefox / Thunderbird / Seamonkey
Опубликовано:10 февраля 2014 г.
Источник:
SecurityVulns ID:13556
Тип:клиент
Уровень опасности:
9/10
Описание:Многочисленные повреждения памяти, межсайтовый скриптинг, DoS, утечка информации.
Затронутые продукты:MOZILLA : Firefox 26.0
 MOZILLA : Firefox ESR 24.2
 MOZILLA : Thunderbird 24.2
 MOZILLA : Seamonkey 2.23
CVE:CVE-2014-1491 (Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.)
 CVE-2014-1490 (Race condition in libssl in Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors involving a resumption handshake that triggers incorrect replacement of a session ticket.)
 CVE-2014-1489 (Mozilla Firefox before 27.0 does not properly restrict access to about:home buttons by script on other pages, which allows user-assisted remote attackers to cause a denial of service (session restore) via a crafted web site.)
 CVE-2014-1488 (The Web workers implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving termination of a worker process that has performed a cross-thread object-passing operation in conjunction with use of asm.js.)
 CVE-2014-1487 (The Web workers implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to bypass the Same Origin Policy and obtain sensitive authentication information via vectors involving error messages.)
 CVE-2014-1486 (Use-after-free vulnerability in the imgRequestProxy function in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving unspecified Content-Type values for image data.)
 CVE-2014-1485 (The Content Security Policy (CSP) implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 operates on XSLT stylesheets according to style-src directives instead of script-src directives, which might allow remote attackers to execute arbitrary XSLT code by leveraging insufficient style-src restrictions.)
 CVE-2014-1484 (Mozilla Firefox before 27.0 on Android 4.2 and earlier creates system-log entries containing profile paths, which allows attackers to obtain sensitive information via a crafted application.)
 CVE-2014-1483 (Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allow remote attackers to bypass the Same Origin Policy and obtain sensitive information by using an IFRAME element in conjunction with certain timing measurements involving the document.caretPositionFromPoint and document.elementFromPoint functions.)
 CVE-2014-1482 (RasterImage.cpp in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent access to discarded data, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect write operations) via crafted image data, as demonstrated by Goo Create.)
 CVE-2014-1481 (Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to bypass intended restrictions on window objects by leveraging inconsistency in native getter methods across different JavaScript engines.)
 CVE-2014-1480 (The file-download implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 does not properly restrict the timing of button selections, which allows remote attackers to conduct clickjacking attacks, and trigger unintended launching of a downloaded file, via a crafted web site.)
 CVE-2014-1479 (The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent certain cloning operations, which allows remote attackers to bypass intended restrictions on XUL content via vectors involving XBL content scopes.)
 CVE-2014-1478 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the MPostWriteBarrier class in js/src/jit/MIR.h and stack alignment in js/src/jit/AsmJS.cpp in OdinMonkey, and unknown other vectors.)
 CVE-2014-1477 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2013-6674 (Cross-site scripting (XSS) vulnerability in Mozilla Thunderbird 17.x through 17.0.8, Thunderbird ESR 17.x through 17.0.10, and SeaMonkey before 2.20 allows user-assisted remote attackers to inject arbitrary web script or HTML via an e-mail message containing a data: URL in an IFRAME element, a related issue to CVE-2014-2018.)
Файлы:Mozilla Foundation Security Advisory 2014-01
 Mozilla Foundation Security Advisory 2014-02
 Mozilla Foundation Security Advisory 2014-04
 Mozilla Foundation Security Advisory 2014-05
 Mozilla Foundation Security Advisory 2014-06
 Mozilla Foundation Security Advisory 2014-07
 Mozilla Foundation Security Advisory 2014-08
 Mozilla Foundation Security Advisory 2014-09
 Mozilla Foundation Security Advisory 2014-10
 Mozilla Foundation Security Advisory 2014-11
 Mozilla Foundation Security Advisory 2014-12
 Mozilla Foundation Security Advisory 2014-13
 Mozilla Foundation Security Advisory 2014-14

Обход аутентификации в маршрутизаторах Asus
Опубликовано:10 февраля 2014 г.
Источник:
SecurityVulns ID:13557
Тип:удаленная
Уровень опасности:
6/10
Описание:Обход аутентификации в сервисе AiCloud
Затронутые продукты:ASUS : Asus RT-N66U
 ASUS : Asus RT-AC66R
 ASUS : Asus RT-AC66U
 ASUS : Asus RT-N66R
 ASUS : Asus RT-N56R
 ASUS : Asus RT-N56U
 ASUS : Asus RT-N14U
 ASUS : Asus RT-N16
 ASUS : Asus RT-N16R
 ASUS : Asus RT-AC68U
 ASUS : Asus RT-AC56U
 ASUS : Asus RT-N14UH
Оригинальный текстdocumentkyle Lovett, ASUS AiCloud Enabled Routers 12 Models - Authentication bypass and Sensitive file/path disclosure (10.02.2014)

Многочисленные уязвимости безопасности в libgadu / libpurple / Pidgin
Опубликовано:10 февраля 2014 г.
Источник:
SecurityVulns ID:13558
Тип:библиотека
Уровень опасности:
7/10
Описание:Переполнение буфера при разборе протокола Gadu-Gadu. DoS при разборе протоколов Yahoo!, XMPP, MSN, HTTP, STUN, IRC, обработке URL, повреждение памяти при обработке HTTP, эмотиконов MXit, SIMPLE.
Затронутые продукты:PIDGIN : Pidgin 2.10
 LIBGADU : libgadu 1.11
CVE:CVE-2014-0020 (The IRC protocol plugin in libpurple in Pidgin before 2.10.8 does not validate argument counts, which allows remote IRC servers to cause a denial of service (application crash) via a crafted message.)
 CVE-2013-6490 (The SIMPLE protocol functionality in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a negative Content-Length header, which triggers a buffer overflow.)
 CVE-2013-6489 (Integer signedness error in the MXit functionality in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (segmentation fault) via a crafted emoticon value, which triggers an integer overflow and a buffer overflow.)
 CVE-2013-6487 (Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.)
 CVE-2013-6485 (Buffer overflow in util.c in libpurple in Pidgin before 2.10.8 allows remote HTTP servers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid chunk-size field in chunked transfer-coding data.)
 CVE-2013-6484 (The STUN protocol implementation in libpurple in Pidgin before 2.10.8 allows remote STUN servers to cause a denial of service (out-of-bounds write operation and application crash) by triggering a socket read error.)
 CVE-2013-6483 (The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.)
 CVE-2013-6482 (Pidgin before 2.10.8 allows remote MSN servers to cause a denial of service (NULL pointer dereference and crash) via a crafted (1) SOAP response, (2) OIM XML response, or (3) Content-Length header.)
 CVE-2013-6481 (libpurple/protocols/yahoo/libymsg.c in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (crash) via a Yahoo! P2P message with a crafted length field, which triggers a buffer over-read.)
 CVE-2013-6479 (util.c in libpurple in Pidgin before 2.10.8 does not properly allocate memory for HTTP responses that are inconsistent with the Content-Length header, which allows remote HTTP servers to cause a denial of service (application crash) via a crafted response.)
 CVE-2013-6478 (gtkimhtml.c in Pidgin before 2.10.8 does not properly interact with underlying library support for wide Pango layouts, which allows user-assisted remote attackers to cause a denial of service (application crash) via a long URL that is examined with a tooltip.)
 CVE-2013-6477 (Multiple integer signedness errors in libpurple in Pidgin before 2.10.8 allow remote attackers to cause a denial of service (application crash) via a crafted timestamp value in an XMPP message.)
 CVE-2012-6152 (The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service (application crash) via crafted byte sequences.)
Оригинальный текстdocumentUBUNTU, [USN-2101-1] libgadu vulnerability (10.02.2014)

Выполнение кода через шаблоны в perl
Опубликовано:10 февраля 2014 г.
Источник:
SecurityVulns ID:13559
Тип:библиотека
Уровень опасности:
6/10
Описание:Можно вызвать внешние функции при компиляции шаблонов.
Затронутые продукты:PERL : perl 5.17
CVE:CVE-2012-6329 (The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.)
Оригинальный текстdocumentUBUNTU, [USN-2099-1] Perl vulnerability (10.02.2014)

Многочисленные уязвимости безопасности в libav / ffmpeg
Опубликовано:10 февраля 2014 г.
Источник:
SecurityVulns ID:13560
Тип:библиотека
Уровень опасности:
7/10
Описание:Уязвимости при разборе различных форматов.
CVE:CVE-2013-7015 (The flashsv_decode_frame function in libavcodec/flashsv.c in FFmpeg before 2.1 does not properly validate a certain height value, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Flash Screen Video data.)
 CVE-2013-7014 (Integer signedness error in the add_bytes_l2_c function in libavcodec/pngdsp.c in FFmpeg before 2.1 allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted PNG data.)
 CVE-2013-7010 (Multiple integer signedness errors in libavcodec/dsputil.c in FFmpeg before 2.1 allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted data.)
 CVE-2013-0865 (The vqa_decode_chunk function in libavcodec/vqavideo.c in FFmpeg before 1.0.4 and 1.1.x before 1.1.2 allows remote attackers to have an unspecified impact via a large (1) cbp0 or (2) cbpz chunk in Westwood Studios VQA Video file, which triggers an out-of-bounds write.)
 CVE-2013-0849 (The roq_decode_init function in libavcodec/roqvideodec.c in FFmpeg before 1.1 allows remote attackers to have an unspecified impact via a crafted (1) width or (2) height dimension that is not a multiple of sixteen in id RoQ video data.)
 CVE-2013-0846 (Array index error in the qdm2_decode_super_block function in libavcodec/qdm2.c in FFmpeg before 1.1 allows remote attackers to have an unspecified impact via crafted QDM2 data, which triggers an out-of-bounds array access.)
 CVE-2013-0845 (libavcodec/alsdec.c in FFmpeg before 1.0.4 allows remote attackers to have an unspecified impact via a crafted block length, which triggers an out-of-bounds write.)
 CVE-2011-3944 (The smacker_decode_header_tree function in libavcodec/smacker.c in FFmpeg before 0.10 allows remote attackers to have an unspecified impact via crafted Smacker data.)
Оригинальный текстdocumentDEBIAN, [SECURITY] [DSA 2855-1] libav security update (10.02.2014)

Выполнение кода в маршрутизаторах Inteno DG301
Опубликовано:10 февраля 2014 г.
Источник:
SecurityVulns ID:13561
Тип:удаленная
Уровень опасности:
5/10
Описание:Выполнение кода через веб-интерфейс.
Затронутые продукты:INTENO : Inteno DG301
Оригинальный текстdocumentInteno DG301 Command Injection, Inteno DG301 Command Injection (10.02.2014)

Закладка в маршрутизаторах Netgear D6300B
Опубликовано:10 февраля 2014 г.
Источник:
SecurityVulns ID:13562
Тип:удаленная
Уровень опасности:
6/10
Описание:Определенный пакет активизирует телнет доступ с правами суперпользователя.
Затронутые продукты:NETGEAR : Netgear D6300B
Оригинальный текстdocumentmarcel.mangold_(at)_syss.de, Security Advisory: NETGEAR Router D6300B Firmware: V1.0.0.14_1.0.14 (10.02.2014)

Слабые разрешения в антивирусе Sophos
Опубликовано:10 февраля 2014 г.
Источник:
SecurityVulns ID:13564
Тип:локальная
Уровень опасности:
5/10
Описание:Слабые разрешения на системные объекты.
Затронутые продукты:SOPHOS : Sophos Antivirus 10.0
CVE:CVE-2014-1213 (Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof "ready for update" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects.)
Оригинальный текстdocumentadvisories_(at)_portcullis-security.com, CVE-2014-1213 - Denial of Service in Sophos Anti Virus (10.02.2014)

Переполнение буфера в libYAML
дополнено с 10 февраля 2014 г.
Опубликовано:31 марта 2014 г.
Источник:
SecurityVulns ID:13563
Тип:библиотека
Уровень опасности:
6/10
Описание:Переполнение буфера на большом теге
Затронутые продукты:YAML : LibYAML 0.1
CVE:CVE-2014-2525 (Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.)
 CVE-2013-6393 (The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.)
Оригинальный текстdocumentAndrea Barisani, [oCERT-2014-003] LibYAML input sanitization errors (31.03.2014)
 documentDEBIAN, [SECURITY] [DSA 2885-1] libyaml-libyaml-perl security update (27.03.2014)
 documentDEBIAN, [SECURITY] [DSA 2884-1] libyaml security update (27.03.2014)
 documentUBUNTU, [USN-2098-1] LibYAML vulnerability (10.02.2014)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород