Информационная безопасность
[RU] switch to English


Многочисленные уязвимости в Microsoft XML
Опубликовано:12 ноября 2008 г.
Источник:
SecurityVulns ID:9429
Тип:библиотека
Уровень опасности:
7/10
Описание:Повреждения памяти, межсайтовый скриптинг, утечка информации.
Затронутые продукты:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
CVE:CVE-2008-4033 (Cross-domain vulnerability in Microsoft XML Core Services 3.0 through 6.0, as used in Microsoft Expression Web, Office, Internet Explorer, and other products, allows remote attackers to obtain sensitive information from another domain and corrupt the session state via HTTP request header fields, as demonstrated by the Transfer-Encoding field, aka "MSXML Header Request Vulnerability.")
 CVE-2008-4029 (Cross-domain vulnerability in Microsoft XML Core Services 3.0 and 4.0, as used in Internet Explorer, allows remote attackers to obtain sensitive information from another domain via a crafted XML document, related to improper error checks for external DTDs, aka "MSXML DTD Cross-Domain Scripting Vulnerability.")
 CVE-2007-0099 (Race condition in the msxml3 module in Microsoft Internet Explorer 6 allows remote attackers to cause a denial of service (application crash) via many nested tags in an XML document in an IFRAME, when synchronous document rendering is frequently disrupted with asynchronous events, as demonstrated using a JavaScript timer, which can trigger null pointer dereferences or memory corruption.)
Оригинальный текстdocumentMICROSOFT, Microsoft Security Bulletin MS08-069 – Critical Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution (955218) (12.11.2008)
Файлы:Microsoft Security Bulletin MS08-069 – Critical Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution (955218)

Microsoft прикрыл атаки на релеинг NTLM в SMB
дополнено с 12 ноября 2008 г.
Опубликовано:26 апреля 2011 г.
Источник:
SecurityVulns ID:9428
Тип:m-i-t-m
Уровень опасности:
5/10
Описание:Microsoft устранил проблему, когда NTLM-реквизиты, использованные для одного сервиса могли быть проброшены на другой сервис. Атака известна на протяжении многих лет.
Затронутые продукты:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
CVE:CVE-2008-4037 (Microsoft Windows 2000 Gold through SP4, XP Gold through SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote SMB servers to execute arbitrary code on a client machine by replaying the NTLM credentials of a client user, as demonstrated by backrush, aka "SMB Credential Reflection Vulnerability." NOTE: some reliable sources report that this vulnerability exists because of an insufficient fix for CVE-2000-0834.)
Оригинальный текстdocumentПоляков Александр, Re: [DSECRG-11-018] Kaspersky administration Kit - Remote code execution via SMBRelay (26.04.2011)
 documentПоляков Александр, Re: [DSECRG-11-018] Kaspersky administration Kit - Remote code execution via SMBRelay (26.04.2011)
 documentMICROSOFT, Microsoft Security Bulletin MS08-068 – Important Vulnerability in SMB Could Allow Remote Code Execution (957097) (12.11.2008)
Файлы:Microsoft Security Bulletin MS08-068 – Important Vulnerability in SMB Could Allow Remote Code Execution (957097)
 NTLM и корморативные сети / NTLM in Corporate Networks - in Russian

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород