Информационная безопасность
[RU] switch to English


Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)
Опубликовано:10 августа 2011 г.
Источник:
SecurityVulns ID:11838
Тип:удаленная
Уровень опасности:
5/10
Описание:Инъекции PHP, инъекции SQL, обратный путь в каталогах, межсайтовый скриптинг, модификация файлов, утечка информации и т.д.
Затронутые продукты:WORDPRESS : Register Plus Redux 3.7
 SOCIALSLIDER : Social Slider 5.6
 WORDPRESS : eShop for Wordpress 6.2
Оригинальный текстdocumentHigh-Tech Bridge Security Research, Multiple XSS in eShop for Wordpress (10.08.2011)
 documentHigh-Tech Bridge Security Research, SQL injection in Social Slider (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, XWeavers (page.asp?id) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, Synchrony Infotech (product_details.php?id) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, Kimia Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, XWeavers (sysMsg.php?errMsg) Cross Site Scripting Vulnerabilities (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, Arte Dude (collections.php?id) (property.php?id) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, Web Design Sydney (news-item.php?id) (news-item.php?newsid) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, Avant-Garde Technologies (display-section.php?id) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, Liberating IT (picture.php?gid) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, Amigot Corp (story.php?id) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, 6House Design (product_details.php?id) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, Webdesigns-studio (sysMsg.php?errMsg) Cross Site Scripting Vulnerabilities (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, THE STUDIO (prod.php?id) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, SEO New York (prod.php?id) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, Chezola Systems (display-section.php?id) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, EasyContent CMS (participant.php?id) Remote SQL injection Vulnerability (10.08.2011)
 documentMustLive, Многичесленные уязвимости в Register Plus Redux для WordPress (10.08.2011)

Многочисленные уязвимости безопасности в Microsoft Internet Explorer
Опубликовано:10 августа 2011 г.
Источник:
SecurityVulns ID:11839
Тип:клиент
Уровень опасности:
9/10
Описание:Многочисленные повреждения памяти, межсайтовый доступ к данным, выполнение кода.
Затронутые продукты:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
CVE:CVE-2011-2383 (Microsoft Internet Explorer 9 and earlier does not properly restrict cross-zone drag-and-drop actions, which allows user-assisted remote attackers to read cookie files via vectors involving an IFRAME element with a SRC attribute containing an http: URL that redirects to a file: URL, as demonstrated by a Facebook game, related to a "cookiejacking" issue, aka "Drag and Drop Information Disclosure Vulnerability." NOTE: this vulnerability exists because of an incomplete fix in the Internet Explorer 9 release.)
 CVE-2011-1964 (Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Style Object Memory Corruption Vulnerability.")
 CVE-2011-1963 (Microsoft Internet Explorer 7 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "XSLT Memory Corruption Vulnerability.")
 CVE-2011-1962 (Microsoft Internet Explorer 6 through 9 does not properly handle unspecified character sequences, which allows remote attackers to read content from a different (1) domain or (2) zone via a crafted web site that triggers "inactive filtering," aka "Shift JIS Character Encoding Vulnerability.")
 CVE-2011-1961 (The telnet URI handler in Microsoft Internet Explorer 6 through 9 does not properly launch the handler application, which allows remote attackers to execute arbitrary programs via a crafted web site, aka "Telnet Handler Remote Code Execution Vulnerability.")
 CVE-2011-1960 (Microsoft Internet Explorer 6 through 9 does not properly implement JavaScript event handlers, which allows remote attackers to access content from a different (1) domain or (2) zone via unspecified script code, aka "Event Handlers Information Disclosure Vulnerability.")
 CVE-2011-1257 (Race condition in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors involving access to an object, aka "Window Open Race Condition Vulnerability.")
Оригинальный текстdocumentLostmon lords, Fwd: {Lostmonґs Group} Internet Explorer 6, 7 and 8 Window.open race condition Vulnerability (10.08.2011)
 documentZDI, ZDI-11-247: Microsoft Internet Explorer XSLT SetViewSlave Remote Code Execution Vulnerability (10.08.2011)
 documentZDI, ZDI-11-249: (Pwn2Own) Microsoft Internet Explorer Protected Mode Bypass Vulnerability (10.08.2011)
 documentZDI, ZDI-11-248: Microsoft Internet Explorer 9 STYLE Object Parsing Remote Code Execution Vulnerability (10.08.2011)
Файлы:Microsoft Security Bulletin MS11-057 - Critical Cumulative Security Update for Internet Explorer (2559049)

Уязвимости безопасности в сервере DNS Microsoft Windows
Опубликовано:10 августа 2011 г.
Источник:
SecurityVulns ID:11840
Тип:удаленная
Уровень опасности:
7/10
Описание:Повреждение памяти при обработке записей NAPRT, обращение к неинициализированной памяти при обработке запроса к несуществующему домену.
Затронутые продукты:MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows 2008 Server
CVE:CVE-2011-1970 (The DNS server in Microsoft Windows Server 2003 SP2 and Windows Server 2008 SP2, R2, and R2 SP1 does not properly initialize memory, which allows remote attackers to cause a denial of service (service outage) via a query for a nonexistent domain, aka "DNS Uninitialized Memory Corruption Vulnerability.")
 CVE-2011-1966 (The DNS server in Microsoft Windows Server 2008 SP2, R2, and R2 SP1 does not properly handle NAPTR queries that trigger recursive processing, which allows remote attackers to execute arbitrary code via a crafted query, aka "DNS NAPTR Query Vulnerability.")
Файлы:Microsoft Security Bulletin MS11-058 - Critical Vulnerabilities in DNS Server Could Allow Remote Code Execution (2562485)

Уязвимости безопасности в Microsoft Office Visio
Опубликовано:10 августа 2011 г.
Источник:
SecurityVulns ID:11841
Тип:клиент
Уровень опасности:
6/10
Описание:Повреждения памяти при разборе файлов Visio.
Затронутые продукты:MICROSOFT : Visio 2003
 MICROSOFT : Visio 2007
 MICROSOFT : Visio 2010
CVE:CVE-2011-1979 (Microsoft Visio 2003 SP3 and 2007 SP2 does not properly validate objects in memory during Visio file parsing, which allows remote attackers to execute arbitrary code via a crafted file, aka "Move Around the Block RCE Vulnerability.")
 CVE-2011-1972 (Microsoft Visio 2003 SP3, 2007 SP2, and 2010 Gold and SP1 does not properly validate objects in memory during Visio file parsing, which allows remote attackers to execute arbitrary code via a crafted file, aka "pStream Release RCE Vulnerability.")
Файлы:Microsoft Security Bulletin MS11-060 - Important Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (2560978)

Межсайтовый скриптинг в Remote Desktop Web Access в Microsoft Windows
Опубликовано:10 августа 2011 г.
Источник:
SecurityVulns ID:11842
Тип:удаленная
Уровень опасности:
5/10
Описание:Межсайтовый скриптинг на странице входа в систему.
CVE:CVE-2011-1263 (Cross-site scripting (XSS) vulnerability in the logon page in Remote Desktop Web Access (RD Web Access) in Microsoft Windows Server 2008 R2 and R2 SP1 allows remote attackers to inject arbitrary web script or HTML via the URI, aka "Remote Desktop Web Access Vulnerability.")
Файлы:Microsoft Security Bulletin MS11-061 - Important Vulnerability in Remote Desktop Web Access Could Allow Elevation of Privilege (2546250)

Многочисленные уязвимости безопасности в Microsoft Windows
Опубликовано:10 августа 2011 г.
Источник:
SecurityVulns ID:11843
Тип:удаленная
Уровень опасности:
8/10
Описание:Повышения привилегий через службу NDISTAPI и CSRSS, DoS против ядра, DoS против TCP/IP, DoS против RDP, утечка информации в .Net
Затронутые продукты:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
CVE:CVE-2011-1978 (Microsoft .NET Framework 2.0 SP2, 3.5.1, and 4 does not properly validate the System.Net.Sockets trust level, which allows remote attackers to obtain sensitive information or trigger arbitrary outbound network traffic via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Socket Restriction Bypass Vulnerability.")
 CVE-2011-1977 (The ASP.NET Chart controls in Microsoft .NET Framework 4, and Chart Control for Microsoft .NET Framework 3.5 SP1, do not properly verify functions in URIs, which allows remote attackers to read arbitrary files via special characters in a URI in an HTTP request, aka "Chart Control Information Disclosure Vulnerability.")
 CVE-2011-1974 (NDISTAPI.sys in the NDISTAPI driver in Remote Access Service (RAS) in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP2 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "NDISTAPI Elevation of Privilege Vulnerability.")
 CVE-2011-1971 (The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly parse file metadata, which allows local users to cause a denial of service (reboot) via a crafted file, aka "Windows Kernel Metadata Parsing DOS Vulnerability.")
 CVE-2011-1968 (The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP2 does not properly process packets in memory, which allows remote attackers to cause a denial of service (reboot) by sending crafted RDP packets triggering access to an object that (1) was not properly initialized or (2) is deleted, as exploited in the wild in 2011, aka "Remote Desktop Protocol Vulnerability.")
 CVE-2011-1967 (Winsrv.dll in the Client/Server Run-time Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly check permissions for sending inter-process device-event messages from low-integrity processes to high-integrity processes, which allows local users to gain privileges via a crafted application, aka "CSRSS Vulnerability.")
 CVE-2011-1965 (Tcpip.sys in the TCP/IP stack in Microsoft Windows 7 Gold and SP1 and Windows Server 2008 R2 and R2 SP1 does not properly implement URL-based QoS, which allows remote attackers to cause a denial of service (reboot) via a crafted URL to a web server, aka "TCP/IP QOS Denial of Service Vulnerability.")
 CVE-2011-1871 (Tcpip.sys in the TCP/IP stack in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to cause a denial of service (reboot) via a series of crafted ICMP messages, aka "ICMP Denial of Service Vulnerability.")
Файлы:Microsoft Security Bulletin MS11-062 - Important Vulnerability in Remote Access Service NDISTAPI Driver Could Allow Elevation of Privilege (2566454)
 Microsoft Security Bulletin MS11-063 - Important Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2567680)
 Microsoft Security Bulletin MS11-064 - Important Vulnerabilities in TCP/IP Stack Could Allow Denial of Service (2563894)
 Microsoft Security Bulletin MS11-065 - Important Vulnerability in Remote Desktop Protocol Could Allow Denial of Service (2570222)
 Microsoft Security Bulletin MS11-066 - Important Vulnerability in Microsoft Chart Control Could Allow Information Disclosure (2567943)
 Microsoft Security Bulletin MS11-068 - Moderate Vulnerability in Windows Kernel Could Allow Denial of Service (2556532)
 Microsoft Security Bulletin MS11-069 - Moderate Vulnerability in .NET Framework Could Allow Information Disclosure (2567951)

Выполнение кода через ActiveX McAfee Security-as-a-Service
Опубликовано:10 августа 2011 г.
Источник:
SecurityVulns ID:11845
Тип:клиент
Уровень опасности:
5/10
Описание:Небезопасные методы в MyAsUtil5.2.0.603.dll, myCIOScn.dll
Оригинальный текстdocumentZDI, TPTI-11-13: McAfee SaaS myCIOScn.dll Scan Method Script Injection Remote Code Execution Vulnerability (10.08.2011)
 documentZDI, TPTI-11-12: McAfee SaaS MyAsUtil5.2.0.603.dll SecureObjectFactory Instantiation Design Flaw Remote Code Execution Vulnerability (10.08.2011)

Уязвимости безопасности в HP OpenView Performance Insight
Опубликовано:10 августа 2011 г.
Источник:
SecurityVulns ID:11846
Тип:удаленная
Уровень опасности:
5/10
Описание:Межсайтовый скриптинг, несанкционированный доступ.
Затронутые продукты:HP : OpenView Performance Insight 5.41
CVE:CVE-2011-2410 (Cross-site scripting (XSS) vulnerability in HP OpenView Performance Insight 5.3, 5.31, 5.4, 5.41, 5.41.001, and 5.41.002 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.)
 CVE-2011-2407 (Unspecified vulnerability in HP OpenView Performance Insight 5.3, 5.31, 5.4, 5.41, 5.41.001, and 5.41.002 allows remote attackers to obtain access via unknown vectors.)
 CVE-2011-2406 (Cross-site scripting (XSS) vulnerability in HP OpenView Performance Insight 5.3, 5.31, 5.4, 5.41, 5.41.001, and 5.41.002 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.)
Оригинальный текстdocumentHP, [security bulletin] HPSBMU02695 SSRT100480 rev.1 - HP OpenView Performance Insight, Remote HTML Injection, Unauthorized Access (10.08.2011)

Подмена приложений в Android
Опубликовано:10 августа 2011 г.
Источник:
SecurityVulns ID:11847
Тип:локальная
Уровень опасности:
3/10
Описание:Приложение может эмулировать окно ввода пароля в другого прилолжения.
Затронутые продукты:GOOGLE : Android 2.3
Оригинальный текстdocumentTrustwave Advisories, TWSL2011-008: Focus Stealing Vulnerability in Android (10.08.2011)

Межсайтовый скриптинг в Microsoft Report Viewer
дополнено с 10 августа 2011 г.
Опубликовано:30 августа 2011 г.
Источник:
SecurityVulns ID:11844
Тип:клиент
Уровень опасности:
5/10
Описание:Межсайтовый скриптинг через ActiveX.
Затронутые продукты:MICROSOFT : Visual Studio 2005
 MICROSOFT : Report Viewer 2005
CVE:CVE-2011-1976 (Cross-site scripting (XSS) vulnerability in the Report Viewer Control in Microsoft Visual Studio 2005 SP1 and Report Viewer 2005 SP1 allows remote attackers to inject arbitrary web script or HTML via a parameter in a data source, aka "Report Viewer Controls XSS Vulnerability.")
Оригинальный текстdocumentinfo_(at)_gdssecurity.com, Cross-Site Scripting (XSS) in Microsoft ReportViewer Controls (30.08.2011)
Файлы:Microsoft Security Bulletin MS11-067 - Important Vulnerability in Microsoft Report Viewer Could Allow Information Disclosure (2578230)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород