Информационная безопасность
[RU] switch to English


Переполнение буфера в Novell iPrint
Опубликовано:13 февраля 2012 г.
Источник:
SecurityVulns ID:12178
Тип:удаленная
Уровень опасности:
5/10
Описание:Переполнение буфера при разборе запрос TCP/631.
Затронутые продукты:NOVELL : Novell Open Enterprise Server 2
CVE:CVE-2011-4194 (Buffer overflow in Novell iPrint Server in Novell Open Enterprise Server 2 (OES2) through SP3 on Linux allows remote attackers to execute arbitrary code via a crafted attributes-natural-language field.)
Оригинальный текстdocumentZDI, ZDI-12-031 : Novell iPrint Server attributes-natural-language Remote Code Execution Vulnerability (13.02.2012)

Многочисленные уязвимости безопасности в ActiveX IBM
Опубликовано:13 февраля 2012 г.
Источник:
SecurityVulns ID:12179
Тип:клиент
Уровень опасности:
5/10
Описание:Многочисленные уязвимости в AcitveX SPSS и Rational Rhapsody.
CVE:CVE-2012-0190 (Unspecified vulnerability in the Render method in the ExportHTML.ocx ActiveX control in ExportHTML.dll in IBM SPSS Dimensions 5.5 and SPSS Data Collection 5.6, 6.0, and 6.0.1 allows remote attackers to execute arbitrary code via a crafted HTML document.)
 CVE-2012-0189 (Multiple unspecified vulnerabilities in the (1) PrintFile and (2) SaveDoc methods in the VsVIEW6 ActiveX control in VsVIEW6.ocx in IBM SPSS SamplePower 3.0 allow remote attackers to execute arbitrary code via a crafted HTML document.)
 CVE-2012-0188 (Unspecified vulnerability in the SetLicenseInfoEx method in an ActiveX control in mraboutb.dll in IBM SPSS Dimensions 5.5 and SPSS Data Collection 5.6, 6.0, and 6.0.1 allows remote attackers to execute arbitrary code via a crafted HTML document.)
 CVE-2012-0188 (Unspecified vulnerability in the SetLicenseInfoEx method in an ActiveX control in mraboutb.dll in IBM SPSS Dimensions 5.5 and SPSS Data Collection 5.6, 6.0, and 6.0.1 allows remote attackers to execute arbitrary code via a crafted HTML document.)
 CVE-2011-1392 (The Blueberry FlashBack ActiveX control in BB FlashBack Recorder.dll in Blueberry BB FlashBack, as used in IBM Rational Rhapsody before 7.6.1 and other products, does not properly implement the (1) Start, (2) PauseAndSave, (3) InsertMarker, and (4) InsertSoundToFBRAtMarker methods, which allows remote attackers to execute arbitrary code via unspecified vectors.)
 CVE-2011-1391 (The Blueberry FlashBack ActiveX control in BB FlashBack Recorder.dll in Blueberry BB FlashBack, as used in IBM Rational Rhapsody before 7.6.1 and other products, does not properly implement the InsertMarker method, which allows remote attackers to execute arbitrary code via unspecified vectors.)
 CVE-2011-1388 (The Blueberry FlashBack ActiveX control in BB FlashBack Recorder.dll in Blueberry BB FlashBack, as used in IBM Rational Rhapsody before 7.6.1 and other products, does not properly implement the TestCompatibilityRecordMode method, which allows remote attackers to execute arbitrary code via unspecified vectors.)
Оригинальный текстdocumentZDI, ZDI-12-019 : IBM SPSS mraboutb.dll ActiveX Control SetLicenseInfoEx Method Remote Code Execution Vulnerability (13.02.2012)
 documentZDI, ZDI-12-030 : IBM Rational Rhapsody BBFlashBack.Recorder.1 TestCompatibilityRecordMode Remote Code Execution Vulnerability (13.02.2012)
 documentZDI, ZDI-12-029 : IBM Rational Rhapsody BBFlashBack.Recorder.1 InsertMarker Remote Code Execution Vulnerability (13.02.2012)
 documentZDI, ZDI-12-028 : IBM Rational Rhapsody BBFlashBack.FBRecorder.1 Control Multiple Remote Code Execution Vulnerabilities (13.02.2012)
 documentZDI, ZDI-12-027 : IBM SPSS VsVIEW6.ocx ActiveX Control SaveDoc Method Remote Code Execution Vulnerability (13.02.2012)
 documentZDI, ZDI-12-026 : IBM SPSS ExportHTML.dll ActiveX Control Render Method Remote Code Execution Vulnerability (13.02.2012)

Переполнение буфера в EMC Networker
Опубликовано:13 февраля 2012 г.
Источник:
SecurityVulns ID:12180
Тип:удаленная
Уровень опасности:
6/10
Описание:Переполнение буфера при разборе RPC-запроса в indexd.exe
Затронутые продукты:EMC : NetWorker 7.6
 EMC : NetWorker 7.5
CVE:CVE-2012-0395 (Buffer overflow in the server in EMC NetWorker 7.5.x and 7.6.x before 7.6.3 SP1 Cumulative Release build 851 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.)
Оригинальный текстdocumentEMC, ESA-2012-005: EMC NetWorker buffer overflow vulnerability (13.02.2012)
 documentZDI, ZDI-12-025 : EMC Networker indexd.exe Opcode 0x01 Parsing Remote Code Execution (13.02.2012)

Многочисленные уязвимости в CA Total Defense
Опубликовано:13 февраля 2012 г.
Источник:
SecurityVulns ID:12181
Тип:удаленная
Уровень опасности:
6/10
Описание:Утечка информации, инъекция SQL.
Оригинальный текстdocumentZDI, ZDI-12-024 : Total Defense Suite UNC Management Web Service uncsp_ViewReportsHomepage SQL Injection Vulnerability (13.02.2012)
 documentZDI, ZDI-12-023 : Total Defense Suite UNC Management Web Service Database Credentials Disclosure Vulnerability (13.02.2012)
 documentZDI, ZDI-12-022 : Total Defense Suite UNC Management Console ExportReport SQL Injection Vulnerability (13.02.2012)

Многочисленные уязвимости безопасности в Adobe Acrobat / Reader
дополнено с 21 января 2012 г.
Опубликовано:13 февраля 2012 г.
Источник:
SecurityVulns ID:12154
Тип:клиент
Уровень опасности:
8/10
Описание:Выполнение кода, многочисленные повреждения памяти.
Затронутые продукты:ADOBE : Reader 10.1
 ADOBE : Acrobat 10.1
CVE:CVE-2011-4373 (Adobe Reader and Acrobat before 9.5, and 10.x before 10.1.2, on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-4370 and CVE-2011-4372.)
 CVE-2011-4372 (Adobe Reader and Acrobat before 9.5, and 10.x before 10.1.2, on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-4370 and CVE-2011-4373.)
 CVE-2011-4371 (Adobe Reader and Acrobat before 9.5, and 10.x before 10.1.2, on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.)
 CVE-2011-4370 (Adobe Reader and Acrobat before 9.5, and 10.x before 10.1.2, on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-4372 and CVE-2011-4373.)
 CVE-2011-4369 (Unspecified vulnerability in the PRC component in Adobe Reader and Acrobat 9.x before 9.4.7 on Windows, Adobe Reader and Acrobat 9.x through 9.4.6 on Mac OS X, Adobe Reader and Acrobat 10.x through 10.1.1 on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.)
 CVE-2011-2462 (Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.)
Оригинальный текстdocumentZDI, ZDI-12-021 : Adobe Reader BMP Resource Signedness Remote Code Execution Vulnerability (13.02.2012)
 documentVUPEN Security Research, VUPEN Security Research - Adobe Acrobat and Reader Image Processing Integer Overflow (APSB12-01) (21.01.2012)
 documentADOBE, Security updates available for Adobe Reader and Acrobat (21.01.2012)

Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)
Опубликовано:13 февраля 2012 г.
Источник:
SecurityVulns ID:12182
Тип:удаленная
Уровень опасности:
5/10
Описание:Инъекции PHP, инъекции SQL, обратный путь в каталогах, межсайтовый скриптинг, модификация файлов, утечка информации и т.д.
Затронутые продукты:BUGZILLA : Bugzilla 3.5
 BUGZILLA : Bugzilla 3.6
 BUGZILLA : Bugzilla 3.7
 ZENPHOTO : ZenPhoto 1.4
 PHPLDAPADMIN : phpLDAPadmin 1.2
 BUGZILLA : Bugzilla 4.1
 CYBEROAM : Cyberoam Central Console 2.00
 EFRONTLEARNING : eFronts Community++ 3.6
 BATAVI : Batavi 1.1
 APACHE : CXF 2.4
 APACHE : CXF 2.5
 SIMPLEGROUPWARE : SimpleGroupware 0.742
 BUGZILLA : Bugzilla 4.2
 BUGZILLA : Bugzilla 4.0
 MIBEW : mibew messenger 1.6
 POSTFIXADMIN : postfixadmin 2.3
 OSCLASS : OSClass 2.3
 DLCASSIFIEDS : DClassifieds 0.1
 WORDPRESS : WordPress 3.3
 WORDPRESS : Kish Guest Posting Plugin 1.0
 BIGWARE : Bigware shop 2.14
 SOLARWINDS : SolarWinds Storage Manager Server 5.1
 WORDPRESS : AllWebMenus 1.1
CVE:CVE-2012-0995 (Multiple cross-site scripting (XSS) vulnerabilities in ZENphoto 1.4.2 allow remote attackers to inject arbitrary web script or HTML via the (1) msg parameter in an external action to zp-core/admin.php, (2) PATH_INTO to an unspecified URL, as demonstrated using /1/, (3) PATH_INFO to zp-core/admin.php, or (4) album parameter to zp-core/admin-edit.php.)
 CVE-2012-0994 (SQL injection vulnerability in the Manage Albums feature in zp-core/admin-albumsort.php in ZENphoto 1.4.2 allows remote authenticated users to execute arbitrary SQL commands via the sortableList parameter.)
 CVE-2012-0993 (Eval injection vulnerability in zp-core/zp-extensions/viewer_size_image.php in ZENphoto 1.4.2, when the viewer_size_image plugin is enabled, allows remote attackers to execute arbitrary PHP code via the viewer_size_image_saved cookie.)
 CVE-2012-0803
 CVE-2012-0448 (Bugzilla 2.x and 3.x before 3.4.14, 3.5.x and 3.6.x before 3.6.8, 3.7.x and 4.0.x before 4.0.4, and 4.1.x and 4.2.x before 4.2rc2 does not reject non-ASCII characters in e-mail addresses of new user accounts, which makes it easier for remote authenticated users to spoof other user accounts by choosing a similar e-mail address.)
Оригинальный текстdocumentpavel_(at)_6scan.com, AllWebMenus < 1.1.9 WordPress Menu Plugin Arbitrary file upload (13.02.2012)
 documentddivulnalert_(at)_ddifrontline.com, DDIVRT-2011-39 SolarWinds Storage Manager Server SQL Injection Authentication Bypass (13.02.2012)
 documentVulnerability Lab, Bart`s CMS - SQL Injection Vulnerability (13.02.2012)
 documentrwenzel_(at)_dw-itsecurity.de, SQL injection in Bigware shop software (13.02.2012)
 documentn0b0d13s_(at)_gmail.com, Wordpress Kish Guest Posting Plugin 1.0 (uploadify.php) Unrestricted File Upload Vulnerability (13.02.2012)
 documentTrustwave Advisories, TWSL2012-002: Multiple Vulnerabilities in WordPress (13.02.2012)
 documentHigh-Tech Bridge Security Research, CSRF (Cross-Site Request Forgery) in DClassifieds (13.02.2012)
 documentHigh-Tech Bridge Security Research, Multiple vulnerabilities in OSclass (13.02.2012)
 documentFilippo Cavallarin, Mibew messenger multiple XSS (13.02.2012)
 documentFilippo Cavallarin, Multiple vulnerabilities in postfixadmin (13.02.2012)
 documentFilippo Cavallarin, Multiple vulnerabilities in OSClass (13.02.2012)
 documentLpSolit_(at)_gmail.com, Security advisory for Bugzilla 4.2rc2, 4.0.4, 3.6.8 and 3.4.14 (13.02.2012)
 documentHigh-Tech Bridge Security Research, Multiple vulnerabilities in OpenEMR (13.02.2012)
 documentandsarmiento_(at)_gmail.com, XSS phpLDAPadmin: 1.2.0.5 (Debian package) and 1.2.2 (sourceforge) (13.02.2012)
 documentsecurity_(at)_infoserve.de, SimpleGroupware 0.742 Cross-Site-Scripting vulnerability (13.02.2012)
 documentAPACHE, CVE-2012-0803: Apache CXF does not validate UsernameToken policies correctly (13.02.2012)
 documentNetsparker Advisories, SQL Injection Vulnerability in Batavi 1.1.2 (13.02.2012)
 documentVulnerability Lab, eFronts Community++ v3.6.10 - Cross Site Vulnerability (13.02.2012)
 documentVulnerability Lab, Cyberoam Central Console v2.00.2 - File Include Vulnerability (13.02.2012)
 documentHigh-Tech Bridge Security Research, Multiple vulnerabilities in ZENphoto (13.02.2012)

Уязвимости безопасности в продуктах D-Link ShareCenter
Опубликовано:13 февраля 2012 г.
Источник:
SecurityVulns ID:12183
Тип:удаленная
Уровень опасности:
5/10
Описание:Обход аутентификации, утечка информации.
Затронутые продукты:DLINK : D-Link DNS-320
 DLINK : D-Link DNS-325
Оригинальный текстdocumentroberto.paleari_(at)_emaze.net, Unauthenticated remote code execution on D-Link ShareCenter products (13.02.2012)

Целочисленное переполнение в HP Data Protector Media Operations
Опубликовано:13 февраля 2012 г.
Источник:
SecurityVulns ID:12184
Тип:удаленная
Уровень опасности:
5/10
Описание:Целочисленное переполнение в DBServer.exe.
Затронутые продукты:HP : HP Data Protector Media Operations 6.11
CVE:CVE-2011-4791 (DBServer.exe in HP Data Protector Media Operations 6.11 and earlier allows remote attackers to execute arbitrary code via a crafted request containing a large value in a length field.)
Оригинальный текстdocumentHP, [security bulletin] HPSBMU02739 SSRT100280 rev.1 - HP Data Protector Media Operations, Remote Execution of Arbitrary Code (13.02.2012)

Повышение привилегий в EMC Documentum Content Server
Опубликовано:13 февраля 2012 г.
Источник:
SecurityVulns ID:12185
Тип:локальная
Уровень опасности:
4/10
Описание:Системный администратор может стать супер-пользователем.
Затронутые продукты:EMC : Documentum Content Server 6.5
 EMC : Documentum Content Server 6.6
Оригинальный текстdocumentEMC, ESA-2012-009: EMC Documentum Content Server privilege elevation vulnerability (13.02.2012)

Ошибка форматной строки в sudo
Опубликовано:13 февраля 2012 г.
Источник:
SecurityVulns ID:12186
Тип:локальная
Уровень опасности:
6/10
Описание:Ошибка форматной строки при логгировании.
Затронутые продукты:SUDO : sudo 1.8
Оригинальный текстdocumentjoernchen of Phenoelit, Advisory: sudo 1.8 Format String Vulnerability (13.02.2012)

Уязвимости безопасности в bip
Опубликовано:13 февраля 2012 г.
Источник:
SecurityVulns ID:12187
Тип:удаленная
Уровень опасности:
5/10
Описание:DoS, переполнение буфера.
Затронутые продукты:BIP : bip 0.8
CVE:CVE-2012-0806 (Buffer overflow in Bip 0.8.8 and earlier might allow remote authenticated users to execute arbitrary code via vectors involving a series of TCP connections that triggers use of many open file descriptors.)
 CVE-2010-3071 (bip before 0.8.6 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an empty USER command.)
Оригинальный текстdocumentGENTOO, [ GLSA 201201-18 ] bip: Multiple vulnerabilities (13.02.2012)

Многочисленные уязвимости безопасности в Wireshark
Опубликовано:13 февраля 2012 г.
Источник:
SecurityVulns ID:12188
Тип:удаленная
Уровень опасности:
5/10
Описание:Переполнение буфера в LANalyzer, DoS.
Затронутые продукты:WIRESHARK : Wireshark 1.6
CVE:CVE-2012-0068 (The lanalyzer_read function in wiretap/lanalyzer.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a Novell catpure file containing a record that is too small.)
 CVE-2012-0067 (wiretap/iptrace.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in an AIX iptrace file.)
 CVE-2012-0066 (Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in a (1) Accellent 5Views (aka .5vw) file, (2) I4B trace file, or (3) NETMON 2 capture file.)
 CVE-2012-0042 (Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 does not properly perform certain string conversions, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet, related to epan/to_str.c.)
 CVE-2012-0041 (The dissect_packet function in epan/packet.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in a capture file, as demonstrated by an airopeek file.)
 CVE-2011-3483 (Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a "buffer exception handling vulnerability.")
Оригинальный текстdocumentDEBIAN, [SECURITY] [DSA 2395-1] wireshark security update (13.02.2012)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород