Информационная безопасность
[RU] switch to English


Переполнение буфера в ZoneAlarm Security Suite
Опубликовано:13 сентября 2008 г.
Источник:
SecurityVulns ID:9284
Тип:локальная
Уровень опасности:
5/10
Описание:Переполнение буфера на длиннмо пути сканируемого файла.
Оригинальный текстdocumentjplopezy_(at)_gmail.com, ZoneAlarm Security Suite buffer overflow (13.09.2008)

Многочисленные уязвимости безопасности в обозревателе Google Chrome
дополнено с 4 сентября 2008 г.
Опубликовано:13 сентября 2008 г.
Источник:
SecurityVulns ID:9260
Тип:клиент
Уровень опасности:
5/10
Описание:Автоматическая загрузка файлов, DoS, переполнения буфера.
Затронутые продукты:GOOGLE : Chrome 0.2
Оригинальный текстdocumentMustLive, New DoS vulnerability in Google Chrome (13.09.2008)
 documentMustLive, New Automatic File Download vulnerabilities in Google Chrome (12.09.2008)
 documentMustLive, Automatic File Download vulnerabilities in Google Chrome (10.09.2008)
 documentMustLive, New Automatic File Download vulnerability in Google Chrome (09.09.2008)
 documentHACKERS PAL, Google Chrome Auto download exploit .. (07.09.2008)
 documentMustLive, New DoS vulnerability in Google Chrome (DoS on MouseOver) (07.09.2008)
 documentMustLive, New Automatic File Download vulnerability in Google Chrome (07.09.2008)
 documentMustLive, New DoS vulnerability in Google Chrome (06.09.2008)
 documentMustLive, DoS vulnerability in Google Chrome (06.09.2008)
 documentjplopezy_(at)_gmail.com, other google chrome crash (06.09.2008)
 documentquakerdoomer_(at)_fmguy.com, Risky Chrome (The perfect cleartext password offering ) (06.09.2008)
 documentSecurity Vulnerability Research Team, Google Chrome 0.2.149.27 'SaveAs' Function Buffer Overflow Vulnerability (06.09.2008)
 documentMustLive, New Automatic File Download vulnerability in Google Chrome (04.09.2008)
 documentMustLive, Automatic File Download vulnerability in Google Chrome (04.09.2008)
 documentpsy.echo_(at)_gmail.com, Google Chrome Browser (ver.0.2.149.27) Vulnerability (04.09.2008)
 documentnerex_(at)_live.com, Google Chrome Automatic File Download (04.09.2008)

Многочисленные уязвимости безопасности в ядре Linux
дополнено с 13 сентября 2008 г.
Опубликовано:14 сентября 2008 г.
Источник:
SecurityVulns ID:9285
Тип:удаленная
Уровень опасности:
5/10
Описание:Многочисленные локальные DoS-условия, утечка информации через snd_seq_oss_synth_make_info(), целочисленное переполнение в DCCP и SCTP_AUTH_KEY.
Затронутые продукты:LINUX : kernel 2.6
CVE:CVE-2008-3915 (Buffer overflow in nfsd in the Linux kernel before 2.6.26.4, when NFSv4 is enabled, allows remote attackers to have an unknown impact via vectors related to decoding an NFSv4 acl.)
 CVE-2008-3792 (net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4 does not verify that the SCTP-AUTH extension is enabled before proceeding with SCTP-AUTH API functions, which allows attackers to cause a denial of service (NULL pointer dereference and panic) via vectors that result in calls to (1) sctp_setsockopt_auth_chunk, (2) sctp_setsockopt_hmac_ident, (3) sctp_setsockopt_auth_key, (4) sctp_setsockopt_active_key, (5) sctp_setsockopt_del_key, (6) sctp_getsockopt_maxburst, (7) sctp_getsockopt_active_key, (8) sctp_getsockopt_peer_auth_chunks, or (9) sctp_getsockopt_local_auth_chunks.)
 CVE-2008-3535 (Off-by-one error in the iov_iter_advance function in mm/filemap.c in the Linux kernel before 2.6.27-rc2 allows local users to cause a denial of service (system crash) via a certain sequence of file I/O operations with readv and writev, as demonstrated by testcases/kernel/fs/ftest/ftest03 from the Linux Test Project.)
 CVE-2008-3534 (The shmem_delete_inode function in mm/shmem.c in the tmpfs implementation in the Linux kernel before 2.6.26.1 allows local users to cause a denial of service (system crash) via a certain sequence of file create, remove, and overwrite operations, as demonstrated by the insserv program, related to allocation of "useless pages" and improper maintenance of the i_blocks count.)
 CVE-2008-3526 (Integer overflow in the sctp_setsockopt_auth_key function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel 2.6.24-rc1 through 2.6.26.3 allows remote attackers to cause a denial of service (panic) or possibly have unspecified other impact via a crafted sca_keylength field associated with the SCTP_AUTH_KEY option.)
 CVE-2008-3276 (Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field.)
 CVE-2008-3275 (The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation in the Linux kernel before 2.6.25.15 do not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allows local users to cause a denial of service ("overflow" of the UBIFS orphan area) via a series of attempted file creations within deleted directories.)
 CVE-2008-3272 (The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel before 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information.)
Оригинальный текстdocumentTobias Klein, [TKADV2008-007] Linux Kernel SCTP-AUTH API Information Disclosure Vulnerability and NULL Pointer Dereferences (14.09.2008)
 documentDEBIAN, [SECURITY] [DSA 1636-1] New Linux 2.6.24 packages fix several vulnerabilities (13.09.2008)

Ежедневная сводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)
дополнено с 13 сентября 2008 г.
Опубликовано:14 сентября 2008 г.
Источник:
SecurityVulns ID:9283
Тип:удаленная
Уровень опасности:
5/10
Описание:Инъекции PHP, инъекции SQL, обратный путь в каталогах, межсайтовый скриптинг, модификация файлов, утечка информации и т.д.
Затронутые продукты:JOOMLA : Joomla 1.5
 EZPHTOGALLERY : Ezphotogallery 2.1
 PHPWEBGALLERY : PhpWebGallery 1.3
 PHSBLOG : PhsBlog 0.2
 MINB : minb 0.1
 WORDPRESS : WordPress 2.6
Оригинальный текстdocumentMarc Ruef, [scip_Advisory 3809] Pro2col StingRay FTS login username cross site scripting (14.09.2008)
 documentStefan Esser, Advisory 05/2008: Wordpress user_login Column SQL Truncation Vulnerability (13.09.2008)
 documentStefan Esser, Advisory 04/2008: Joomla Weak Random Password Reset Token Vulnerability (13.09.2008)
 documentAdvisory 04/2008: Joomla Weak Random Password Reset Token Vulnerability, Advisory 04/2008: Joomla Weak Random Password Reset Token Vulnerability (13.09.2008)
 documentirancrash_(at)_gmail.com, Nooms 1.1 (13.09.2008)
 documentr3d.w0rm_(at)_yahoo.com, minb Remote Code Execution Exploit (13.09.2008)
 documentirancrash_(at)_gmail.com, PhsBlog v0.2 Bypass Sql injection Filtering Exploit (13.09.2008)
 documentirancrash_(at)_gmail.com, PhpWebGallery 1.3.4 Multiple Vulnerabilities (XSS/LFI) (13.09.2008)
Файлы:Exploits Ezphotogallery Multiple Vulnerabilities ( Xss/Login Bypass/Sql injection Exploit/File Disclosure)
 PhsBlog Bypass Sql injection Filtering Exploit
 minb Remote Code Execution Exploit

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород