Информационная безопасность
[RU] switch to English


Несанкционированный доступ к EMC Documentum Foundation Services
Опубликовано:11 февраля 2014 г.
Источник:
SecurityVulns ID:13565
Тип:удаленная
Уровень опасности:
6/10
Описание:Возможен доступ к файловой системе.
Затронутые продукты:EMC : Documentum Foundation Services 7.1
CVE:CVE-2014-0622 (The web service in EMC Documentum Foundation Services (DFS) 6.5 through 6.7 before 6.7 SP1 P22, 6.7 SP2 before P08, 7.0 before P12, and 7.1 before P01 does not properly implement content uploading, which allows remote authenticated users to bypass intended content access restrictions via unspecified vectors.)
Оригинальный текстdocumentEMC, ESA-2014-005: EMC Documentum Foundation Services (DFS) Content Access Vulnerability (11.02.2014)

Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)
Опубликовано:11 февраля 2014 г.
Источник:
SecurityVulns ID:13566
Тип:удаленная
Уровень опасности:
6/10
Описание:Инъекции PHP, инъекции SQL, обратный путь в каталогах, межсайтовый скриптинг, модификация файлов, утечка информации и т.д.
Затронутые продукты:MANTIS : MantisBT 1.2
 LEDGERSMB : LedgerSMB 1.3
 DOORGETS : doorGets 5.2
 AURACMS : AuraCMS 2.3
 HORDE : Horde 3.8
 WHCMS : Whmcs 5.12
 GPEASY : gpEasy 4.3
 ALIENVAULT : OSSIM 4.3
 PROJOOM : NovaSFH 3.0
 ATMAIL : Atmail 7.0
 PUBLISHIT : Publish-It 3.6
CVE:CVE-2014-1691 (The framework/Util/lib/Horde/Variables.php script in the Util library in Horde before 5.1.1 allows remote attackers to conduct object injection attacks and execute arbitrary PHP code via a crafted serialized object in the _formvars form.)
 CVE-2014-1609 (Multiple SQL injection vulnerabilities in MantisBT before 1.2.16 allow remote attackers to execute arbitrary SQL commands via unspecified parameters to the (1) mc_project_get_attachments function in api/soap/mc_project_api.php; the (2) news_get_limited_rows function in core/news_api.php; the (3) summary_print_by_enum, (4) summary_print_by_age, (5) summary_print_by_developer, (6) summary_print_by_reporter, or (7) summary_print_by_category function in core/summary_api.php; the (8) create_bug_enum_summary or (9) enum_bug_group function in plugins/MantisGraph/core/graph_api.php; (10) bug_graph_bycategory.php or (11) bug_graph_bystatus.php in plugins/MantisGraph/pages/; or (12) proj_doc_page.php, related to use of the db_query function, a different vulnerability than CVE-2014-1608.)
 CVE-2014-1608 (SQL injection vulnerability in the mci_file_get function in api/soap/mc_file_api.php in MantisBT before 1.2.16 allows remote attackers to execute arbitrary SQL commands via a crafted envelope tag in a mc_issue_attachment_get SOAP request.)
 CVE-2014-1459 (SQL injection vulnerability in dg-admin/index.php in doorGets CMS 5.2 and earlier allows remote authenticated administrators to execute arbitrary SQL commands via the _position_down_id parameter. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands.)
 CVE-2014-1401 (Multiple SQL injection vulnerabilities in AuraCMS 2.3 and earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) search parameter to mod/content/content.php or (2) CLIENT_IP, (3) X_FORWARDED_FOR, (4) X_FORWARDED, (5) FORWARDED_FOR, or (6) FORWARDED HTTP header to index.php.)
 CVE-2014-1214
 CVE-2014-0980 (Buffer overflow in Poster Software PUBLISH-iT 3.6d allows remote attackers to execute arbitrary code via a crafted PUI file.)
Оригинальный текстdocumentChris Travers, Security advisory, LedgerSMB 1.3.0-1.3.36 (11.02.2014)
 documentCORE SECURITY TECHNOLOGIES ADVISORIES, CORE-2014-0001 - Publish-It Buffer Overflow Vulnerability (11.02.2014)
 documentISecAuditors Security Advisories, [ISecAuditors Security Advisories] Multiple reflected XSS vulnerabilities in Atmail WebMail (11.02.2014)
 documentadvisories_(at)_portcullis-security.com, CVE-2014-1214 - Remote Code Execution in Projoom NovaSFH Plugin (11.02.2014)
 documentjakx.ppr_(at)_gmail.com, AlienVault OSSIM SQL Injection vulnerability (11.02.2014)
 documentVulnerability Lab, gpEasy v4.3.x CMS - Multiple Web Vulnerabilities (11.02.2014)
 documentiedb.team_(at)_gmail.com, WHMCS Denial of Service Vulnerability (11.02.2014)
 documentAndrea Barisani, [oCERT-2014-001] MantisBT input sanitization errors (11.02.2014)
 documentDEBIAN, [SECURITY] [DSA 2853-1] horde3 security update (11.02.2014)
 documentHigh-Tech Bridge Security Research, SQL Injection in doorGets CMS (11.02.2014)
 documentHigh-Tech Bridge Security Research, Multiple SQL Injection Vulnerabilities in AuraCMS (11.02.2014)

Многочисленные уязвимости безопасности в Microsoft Windows
Опубликовано:11 февраля 2014 г.
Источник:
SecurityVulns ID:13567
Тип:библиотека
Уровень опасности:
8/10
Описание:Утечка информации через XML, DoS через IPv6, повреждение памяти в Direct2D, повышение привилегий в .Net, выполнение кода в VBScript.
Затронутые продукты:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
 MICROSOFT : Windows 8
 MICROSOFT : Windows 2012 Server
 MICROSOFT : Windows 8.1
CVE:CVE-2014-0295 (VsaVb7rt.dll in Microsoft .NET Framework 2.0 SP2 and 3.5.1 does not implement the ASLR protection mechanism, which makes it easier for remote attackers to execute arbitrary code via a crafted web site, as exploited in the wild in February 2014, aka "VSAVB7RT ASLR Vulnerability.")
 CVE-2014-0271 (The VBScript engine in Microsoft Internet Explorer 6 through 11, and VBScript 5.6 through 5.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Memory Corruption Vulnerability.")
 CVE-2014-0266 (The XMLHTTP ActiveX controls in XML Core Services 3.0 in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to bypass the Same Origin Policy via a web page that is visited in Internet Explorer, aka "MSXML Information Disclosure Vulnerability.")
 CVE-2014-0263 (The Direct2D implementation in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a large 2D geometric figure that is encountered with Internet Explorer, aka "Microsoft Graphics Component Memory Corruption Vulnerability.")
 CVE-2014-0257 (Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine whether it is safe to execute a method, which allows remote attackers to execute arbitrary code via (1) a crafted web site or (2) a crafted .NET Framework application that exposes a COM server endpoint, aka "Type Traversal Vulnerability.")
 CVE-2014-0254 (The IPv6 implementation in Microsoft Windows 8, Windows Server 2012, and Windows RT does not properly validate packets, which allows remote attackers to cause a denial of service (system hang) via crafted ICMPv6 Router Advertisement packets, aka "TCP/IP Version 6 (IPv6) Denial of Service Vulnerability.")
 CVE-2014-0253 (Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine TCP connection states, which allows remote attackers to cause a denial of service (ASP.NET daemon hang) via crafted HTTP requests that trigger persistent resource consumption for a (1) stale or (2) closed connection, as exploited in the wild in February 2014, aka "POST Request DoS Vulnerability.")
Файлы:Microsoft Security Bulletin MS14-005 - Important Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure (2916036)
 Microsoft Security Bulletin MS14-006 - Important Vulnerability in IPv6 Could Allow Denial of Service (2904659)
 Microsoft Security Bulletin MS14-007 - Critical Vulnerability in Direct2D Could Allow Remote Code Execution (2912390)
 Microsoft Security Bulletin MS14-009 - Important Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (2916607)
 Microsoft Security Bulletin MS14-011 - Critical Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (2928390)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород