Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в Microsoft Internet Explorer
Опубликовано:13 декабря 2012 г.
Источник:
SecurityVulns ID:12779
Тип:клиент
Уровень опасности:
7/10
Описание:Несколько уязвимостей использования памяти после освобождения.
Затронутые продукты:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
CVE:CVE-2012-4787 (Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability.")
 CVE-2012-4782 (Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "CMarkup Use After Free Vulnerability.")
 CVE-2012-4781 (Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "InjectHTMLStream Use After Free Vulnerability.")
Файлы:Microsoft Security Bulletin MS12-077 - Critical Cumulative Security Update for Internet Explorer (2761465)

Многочисленные уязвимости безопасности в Microsoft Windows
Опубликовано:13 декабря 2012 г.
Источник:
SecurityVulns ID:12780
Тип:библиотека
Уровень опасности:
9/10
Описание:Повреждения памяти при разборе шрифтов OpenType и TrueType, повреждение памяти при обработке имен файлов, переполнение буфера в DirectPlay, недостаточная проверка сертификатов в компоненте DirectAccess IP-HTTPS.
Затронутые продукты:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
CVE:CVE-2012-4786 (The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka "TrueType Font Parsing Vulnerability.")
 CVE-2012-4774 (Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allow remote attackers to execute arbitrary code via a crafted (1) file name or (2) subfolder name that triggers use of unallocated memory as the destination of a copy operation, aka "Windows Filename Parsing Vulnerability.")
 CVE-2012-2556 (The OpenType Font (OTF) driver in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to execute arbitrary code via a crafted OpenType font file, aka "OpenType Font Parsing Vulnerability.")
 CVE-2012-2549 (The IP-HTTPS server in Windows Server 2008 R2 and R2 SP1 and Server 2012 does not properly validate certificates, which allows remote attackers to bypass intended access restrictions via a revoked certificate, aka "Revoked Certificate Bypass Vulnerability.")
 CVE-2012-1537 (Heap-based buffer overflow in DirectPlay in DirectX 9.0 through 11.1 in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 allows remote attackers to execute arbitrary code via a crafted Office document, aka "DirectPlay Heap Overflow Vulnerability.")
Файлы:Microsoft Security Bulletin MS12-078 - Critical Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2783534)
 Microsoft Security Bulletin MS12-081 - Critical Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2758857)
 Microsoft Security Bulletin MS12-082 - Important Vulnerability in DirectPlay Could Allow Remote Code Execution (2770660)
 Microsoft Security Bulletin MS12-083 - Important Vulnerability in IP-HTTPS Component Could Allow Security Feature Bypass (2765809)

Повреждение памяти в Microsoft Word
Опубликовано:13 декабря 2012 г.
Источник:
SecurityVulns ID:12781
Тип:клиент
Уровень опасности:
6/10
Описание:Повреждение памяти при разборе RTF
Затронутые продукты:MICROSOFT : Office 2003
 MICROSOFT : Office 2007
 MICROSOFT : Office 2010
CVE:CVE-2012-2539 (Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer; Office Compatibility Pack SP2 and SP3; and Office Web Apps 2010 SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, aka "Word RTF 'listoverridecount' Remote Code Execution Vulnerability.")
Файлы:Microsoft Security Bulletin MS12-079 - Critical Vulnerability in Microsoft Word Could Allow Remote Code Execution (2780642)

DoS против Microsoft Exchange
Опубликовано:13 декабря 2012 г.
Источник:
SecurityVulns ID:12782
Тип:клиент
Уровень опасности:
5/10
Описание:Некорректна обработке RSS-подписок.
Затронутые продукты:MICROSOFT : Exchange 2007
 MICROSOFT : Exchange 2010
CVE:CVE-2012-4791 (Microsoft Exchange Server 2007 SP3 and 2010 SP1 and SP2 allows remote authenticated users to cause a denial of service (Information Store service hang) by subscribing to a crafted RSS feed, aka "RSS Feed May Cause Exchange DoS Vulnerability.")
Файлы:Microsoft Security Bulletin MS12-080 - Critical Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2784126)

Утечка информации в apt
Опубликовано:13 декабря 2012 г.
Источник:
SecurityVulns ID:12783
Тип:локальная
Уровень опасности:
4/10
Описание:Слабые разрешения на файл term.log
CVE:CVE-2012-0961 (Apt 0.8.16~exp5ubuntu13.x before 0.8.16~exp5ubuntu13.6, 0.8.16~exp12ubuntu10.x before 0.8.16~exp12ubuntu10.7, and 0.9.7.5ubuntu5.x before 0.9.7.5ubuntu5.2, as used in Ubuntu, uses world-readable permissions for /var/log/apt/term.log, which allows local users to obtain sensitive shell information by reading the log file.)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород