Информационная безопасность
[RU] switch to English


Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)
Опубликовано:12 января 2010 г.
Источник:
SecurityVulns ID:10512
Тип:удаленная
Уровень опасности:
5/10
Описание:Инъекции PHP, инъекции SQL, обратный путь в каталогах, межсайтовый скриптинг, модификация файлов, утечка информации и т.д.
Затронутые продукты:JOOMLA : JVClouds3D 1.0
 MICRONETWORK : Active Calendar 1.2
Оригинальный текстdocumentMustLive, Cross-Site Scripting vulnerability in Blogumus (12.01.2010)
 documentMarty Barbella, XSS Vulnerability in Active Calendar 1.2.0 (12.01.2010)
 documentMustLive, Cross-Site Scripting vulnerability in JVClouds3D for Joomla (12.01.2010)

Переполнение буфера в продуктах ACDSee
Опубликовано:12 января 2010 г.
Источник:
SecurityVulns ID:10509
Тип:клиент
Уровень опасности:
5/10
Описание:Переполнение буфера при просмотре файлов XBM.
Затронутые продукты:ACDSYSTEMS : ACDSee Photo Editor 2008
 ACDSYSTEMS : ACDSee Photo Manager 9.0
Оригинальный текстdocumentnoreply_(at)_telus.com, TELUS Security Labs VR - ACDSee Systems ACDSee Products XBM File Handling Buffer Overflow (12.01.2010)

Переполнение буфера в медиа-плеере Audiotran
Опубликовано:12 января 2010 г.
Источник:
SecurityVulns ID:10510
Тип:клиент
Уровень опасности:
5/10
Описание:Переполнение буфера при разборе плейлистов.
Затронутые продукты:ESOFT : Audiotran 1.4
Оригинальный текстdocumentSecurity, [CORELAN-10-001] Audiotran 1.4.1 buffer overflow (12.01.2010)

Внедрение управляющих символов в лог-файлы в различных продуктах
Опубликовано:12 января 2010 г.
Источник:
SecurityVulns ID:10511
Тип:удаленная
Уровень опасности:
3/10
Описание:Не осуществляется фильтрация ESC-последовательностей.
Затронутые продукты:THTTPD : thttpd 2.25
 NGINX : nginx 0.7
 REDPILLLINPRO : Varnish 2.0
 CHEROKEE : Cherokee 0.99
 MINIHTTPD : mini_httpd 1.19
 WEBRICK : WEBrick 1.3
 ORION : Orion 2.0
 AOLSERVER : AOLserver 4.5
 YAWS : Yaws 1.85
 BOA : Boa 0.94
CVE:CVE-2009-4496 (Boa 0.94.14rc21 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.)
 CVE-2009-4495 (Yaws 1.85 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.)
 CVE-2009-4494 (AOLserver 4.5.1 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.)
 CVE-2009-4493 (Orion Application Server 2.0.7 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.)
 CVE-2009-4492 (WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.)
 CVE-2009-4491 (thttpd 2.25b0 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.)
 CVE-2009-4490 (mini_httpd 1.19 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.)
 CVE-2009-4489 (header.c in Cherokee before 0.99.32 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.)
 CVE-2009-4488 (** DISPUTED ** Varnish 2.0.6 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator. NOTE: the vendor disputes the significance of this report, stating that "This is not a security problem in Varnish or any other piece of software which writes a logfile. The real problem is the mistaken belief that you can cat(1) a random logfile to your terminal safely.")
 CVE-2009-4487 (nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.)
Оригинальный текстdocumentascii, Nginx, Varnish, Cherokee, thttpd, mini-httpd, WEBrick, Orion, AOLserver, Yaws and Boa log escape sequence injection (12.01.2010)

Слабые разрешения в Panda Global Protection / Panda Internet Security
дополнено с 2 ноября 2009 г.
Опубликовано:12 января 2010 г.
Источник:
SecurityVulns ID:10368
Тип:локальная
Уровень опасности:
5/10
Описание:Слабые разрешения на исполняемые файлы приложения.
Затронутые продукты:PANDA : Panda Global Protection 2010
 PANDA : Panda Internet Security 2010
 PANDA : Panda Antivirus 2010
 PANDA : Panda Security for Business 4.04
 PANDA : Panda Security for Enterprise 4.04
 PANDA : Panda Security for Desktops 4.05
 PANDA : Panda Security for File Servers 8.04
Оригинальный текстdocumentNSO Research, NSOADV-2010-001: Panda Security Local Privilege Escalation (12.01.2010)
 documentShineShadow, Panda Security Software Local Privilege Escalation (12.11.2009)
 documentProtek Research Lab, {PRL} Multiple Panda Security Products Local Privilege Escalation Vulnerability (02.11.2009)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород