Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в Microsoft Excel
дополнено с 10 июня 2009 г.
Опубликовано:14 июня 2009 г.
Источник:
SecurityVulns ID:9978
Тип:клиент
Уровень опасности:
6/10
Описание:Многочисленные переполнения буфера, повреждения памяти и указателей.
Затронутые продукты:MICROSOFT : Office 2000
 MICROSOFT : Office XP
 MICROSOFT : Office 2003
 MICROSOFT : Office 2004 for Mac
 MICROSOFT : Office 2007
 MICROSOFT : Office 2008 for Mac
CVE:CVE-2009-1134 (Excel in 2007 Microsoft Office System SP1 and SP2; Microsoft Office Excel Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allow remote attackers to execute arbitrary code via a BIFF file with a malformed Qsir (0x806) record object, aka "Record Pointer Corruption Vulnerability.")
 CVE-2009-0561 (Integer overflow in Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel Viewer 2003 SP3; Microsoft Office Excel Viewer; Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2; and Microsoft Office SharePoint Server 2007 SP1 and SP2 allows remote attackers to execute arbitrary code via an Excel file with a Shared String Table (SST) record with a numeric field that specifies an invalid number of unique strings, which triggers a heap-based buffer overflow, aka "Record Integer Overflow Vulnerability.")
 CVE-2009-0560 (Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel Viewer 2003 SP3; Microsoft Office Excel Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allow remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "Field Sanitization Memory Corruption Vulnerability.")
 CVE-2009-0559 (Stack-based buffer overflow in Excel in Microsoft Office 2000 SP3 and Office XP SP3 allows remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "String Copy Stack-Based Overrun Vulnerability.")
 CVE-2009-0558 (Array index error in Excel in Microsoft Office 2000 SP3 and Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac, allows remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "Array Indexing Memory Corruption Vulnerability.")
 CVE-2009-0557 (Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel Viewer 2003 SP3; Microsoft Office Excel Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allow remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "Object Record Corruption Vulnerability.")
 CVE-2009-0549 (Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; and Microsoft Office Excel Viewer 2003 SP3 allow remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "Record Pointer Corruption Vulnerability.")
Оригинальный текстdocumentIDEFENSE, iDefense Security Advisory 06.11.09: Microsoft Excel SST Record Integer Overflow Vulnerability (14.06.2009)
 documentZDI, ZDI-09-040: Microsoft Office Excel QSIR Record Pointer Corruption Vulnerability (11.06.2009)
 documentSECUNIA, Secunia Research: Microsoft Excel Record Parsing Array Indexing Vulnerability (10.06.2009)
 documentSECUNIA, Secunia Research: Microsoft Excel String Parsing Integer Overflow Vulnerability (10.06.2009)
 documentnoreply_(at)_telus.com, TELUS Security Labs VR - Microsoft Office Excel Malformed Records Stack Buffer Overflow (10.06.2009)
 documentMICROSOFT, Microsoft Security Bulletin MS09-021 - Critical Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (969462) (10.06.2009)
Файлы:Microsoft Security Bulletin MS09-021 - Critical Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (969462)

Многочисленные уязвимости в службе печати Windows
дополнено с 10 июня 2009 г.
Опубликовано:14 июня 2009 г.
Источник:
SecurityVulns ID:9979
Тип:удаленная
Уровень опасности:
8/10
Описание:Переполнение буфера, несанкционированный доступ к файлам, повышение привилегий через загрузку динамической библиотеки.
Затронутые продукты:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
CVE:CVE-2009-0230 (The Windows Print Spooler in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows remote authenticated users to gain privileges via a crafted RPC message that triggers loading of a DLL file from an arbitrary directory, aka "Print Spooler Load Library Vulnerability.")
 CVE-2009-0229 (The Windows Printing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows local users to read arbitrary files via a crafted separator page, aka "Print Spooler Read File Vulnerability.")
 CVE-2009-0228 (Stack-based buffer overflow in the EnumeratePrintShares function in Windows Print Spooler Service (win32spl.dll) in Microsoft Windows 2000 SP4 allows remote printer servers to execute arbitrary code via a a crafted ShareName in a response to an RPC request, related to "printing data structures," aka "Buffer Overflow in Print Spooler Vulnerability.")
Оригинальный текстdocumentIDEFENSE, iDefense Security Advisory 06.11.09: Microsoft Windows 2000 Print Spooler Remote Stack Buffer Overflow Vulnerability (14.06.2009)
 documentMICROSOFT, Microsoft Security Bulletin MS09-022 - Critical Vulnerabilities in Windows Print Spooler Could Allow Remote Code Execution (961501) (10.06.2009)
Файлы:Microsoft Security Bulletin MS09-022 - Critical Vulnerabilities in Windows Print Spooler Could Allow Remote Code Execution (961501)

Утечка информации в FreeBSD
Опубликовано:14 июня 2009 г.
Источник:
SecurityVulns ID:9987
Тип:локальная
Уровень опасности:
5/10
Описание:Целочисленное переполнение при реализации механизма pipe'ов позволяет доступ к памяти другого процесса.
Затронутые продукты:FREEBSD : FreeBSD 6.3
 FREEBSD : FreeBSD 7.1
 FREEBSD : FreeBSD 6.4
 FREEBSD : FreeBSD 7.2
Оригинальный текстdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-09:09.pipe (14.06.2009)

Ежедневная сводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)
дополнено с 14 июня 2009 г.
Опубликовано:14 июня 2009 г.
Источник:
SecurityVulns ID:9990
Тип:удаленная
Уровень опасности:
5/10
Описание:Инъекции PHP, инъекции SQL, обратный путь в каталогах, межсайтовый скриптинг, модификация файлов, утечка информации и т.д.
Затронутые продукты:SPLOG : Splog 1.2
 GEEKBILL : Open Biller 0.1
 SCMS : S-CMS 2.0
 XAMPP : XAMPP 1.7
 XAMPP : XAMPP 1.6
 SERENADIMENSIONS : Serena Dimensions CM 10.1
Оригинальный текстdocumentSmOk3, [DSF-02-2009] - Zoki Catalog SQL Injection (16.06.2009)
 documentMustLive, Cross-Site Scripting vulnerability in XAMPP (14.06.2009)
 documenty3nh4ck3r_(at)_gmail.com, MULTIPLE LOCAL FILE INCLUSION VULNERABILITIES --S-CMS <= v-2.0 Beta3--> (14.06.2009)
 documenty3nh4ck3r_(at)_gmail.com, MULTIPLE SQL INJECTION VULNERABILITIES --S-CMS <= v-2.0 Beta3--> (14.06.2009)
 documenty3nh4ck3r_(at)_gmail.com, (Post Form var 'username') BLIND SQLi exploit --S-CMS <= v-2.0 Beta3--> (14.06.2009)
 documenty3nh4ck3r_(at)_gmail.com, (Post Form login var 'username') BLIND SQLi exploit--Open Biller 0.1--> (14.06.2009)
 documenty3nh4ck3r_(at)_gmail.com, MULTIPLE SQL INJECTION VULNERABILITIES --Splog <= v-1.2 Beta--> (14.06.2009)
Файлы:BLIND SQLi exploit --S-CMS <= v-2.0 Beta3
 BLIND SQLi exploit--Open Biller 0.1

Многочисленные уязвимости безопасности в Apache Tomcat
дополнено с 5 июня 2009 г.
Опубликовано:14 июня 2009 г.
Источник:
SecurityVulns ID:9965
Тип:удаленная
Уровень опасности:
6/10
Описание:Утечка информации, проверка существования пользователя, DoS, обратный путь в каталогах.
Затронутые продукты:APACHE : Tomcat 4.1
 APACHE : Tomcat 5.5
 APACHE : Tomcat 6.0
CVE:CVE-2009-0783 (Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.)
 CVE-2009-0580 (Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.)
 CVE-2009-0033 (Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.)
 CVE-2008-5515 (Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.)
Оригинальный текстdocumentAPACHE, [SECURITY] UPDATED CVE-2008-5515 RequestDispatcher directory traversal vulnerability (14.06.2009)
 documentAPACHE, [SECURITY] CVE-2008-5515 RequestDispatcher directory traversal vulnerability (09.06.2009)
 documentAPACHE, [SECURITY] CVE-2009-0580 UPDATED Apache Tomcat User enumeration vulnerability with FORM authentication (05.06.2009)
 documentAPACHE, [SECURITY] CVE-2009-0783 Apache Tomcat Information disclosure (05.06.2009)
 documentAPACHE, [SECURITY] CVE-2009-0580 Apache Tomcat User enumeration vulnerability with FORM authentication (05.06.2009)
 documentAPACHE, [SECURITY] CVE-2009-0033 Apache Tomcat DoS when using Java AJP connector (05.06.2009)

Межсайтовый скриптинг в F5 FirePass 4100
дополнено с 14 ноября 2007 г.
Опубликовано:14 июня 2009 г.
Источник:
SecurityVulns ID:8340
Тип:удаленная
Уровень опасности:
5/10
Описание:Межсайтовый скритинг через параметр backurl в download_plugin.php3, my.logon.php3, my.activation.php3 SSL VPN.
Затронутые продукты:F5 : FirePass 4100
 F5 : FirePass 5.4
 F5 : FirePass 5.5
 F5 : FirePass 6.0
Оригинальный текстdocumentProCheckUp Research, PR07-15: Cross-site Scripting (XSS) / HTML injection on F5 FirePass 4100 SSL VPN 'my.logon.php3' server-side script (30.11.2007)
 documentProCheckUp Research, PR07-14: Cross-site Scripting (XSS) / HTML injection on F5 FirePass 4100 SSL VPN 'my.activation.php3' server-side script (30.11.2007)
 documentProCheckUp Research, PR07-13: Cross-site Scripting / HTML injection on F5 FirePass 4100 SSL VPN 'download_plugin.php3' server-side script (14.11.2007)

Переполнения буфера в Microsoft Word
дополнено с 11 июня 2009 г.
Опубликовано:14 июня 2009 г.
Источник:
SecurityVulns ID:9983
Тип:клиент
Уровень опасности:
8/10
Описание:Несколько различных переполнений буфера при разборе документов.
Затронутые продукты:MICROSOFT : Office 2000
 MICROSOFT : Office XP
 MICROSOFT : Office 2003
 MICROSOFT : Office 2004 for Mac
 MICROSOFT : Office 2007
 MICROSOFT : Office 2008 for Mac
CVE:CVE-2009-0565 (Buffer overflow in Microsoft Office Word 2000 SP3, 2002 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a Word document with a malformed record that triggers memory corruption, aka "Word Buffer Overflow Vulnerability.")
 CVE-2009-0563 (Stack-based buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; Microsoft Office Word Viewer 2003 SP3; Microsoft Office Word Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a Word document with a crafted tag containing an invalid length field, aka "Word Buffer Overflow Vulnerability.")
Оригинальный текстdocumentVUPEN Security Research, VUPEN Security - Microsoft Office Word Document Parsing Buffer Overflow Vulnerability (14.06.2009)
 documentZDI, ZDI-09-035: Microsoft Word Document Stack Based Buffer Overflow Vulnerability (11.06.2009)
 documentMICROSOFT, Microsoft Security Bulletin MS09-027 - Critical (11.06.2009)
Файлы:Microsoft Security Bulletin MS09-027 - Critical Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (969514)

Многочисленные уязвимости в Mozilla Firefox
Опубликовано:14 июня 2009 г.
Источник:
SecurityVulns ID:9986
Тип:клиент
Уровень опасности:
8/10
Описание:Повышение привилегий, межсайтовый доступ к данным, DoS, кратковременные условия, подмена SSL при использовании прокси, многочисленные повреждения памяти.
Затронутые продукты:MOZILLA : Firefox 3.0
CVE:CVE-2009-1841 (js/src/xpconnect/src/xpcwrappedjsclass.cpp in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to execute arbitrary web script with the privileges of a chrome object, as demonstrated by the browser sidebar and the FeedWriter.)
 CVE-2009-1840 (Mozilla Firefox before 3.0.11, Thunderbird, and SeaMonkey do not check content policy before loading a script file into a XUL document, which allows remote attackers to bypass intended access restrictions via a crafted HTML document, as demonstrated by a "web bug" in an e-mail message, or web script or an advertisement in a web page.)
 CVE-2009-1839 (Mozilla Firefox 3 before 3.0.11 associates an incorrect principal with a file: URL loaded through the location bar, which allows user-assisted remote attackers to bypass intended access restrictions and read files via a crafted HTML document, aka a "file-URL-to-file-URL scripting" attack.)
 CVE-2009-1838 (The garbage-collection implementation in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 sets an element's owner document to null in unspecified circumstances, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via a crafted event handler, related to an incorrect context for this event handler.)
 CVE-2009-1837 (Race condition in the NPObjWrapper_NewResolve function in modules/plugin/base/src/nsJSNPRuntime.cpp in xul.dll in Mozilla Firefox 3 before 3.0.11 might allow remote attackers to execute arbitrary code via a page transition during Java applet loading, related to a use-after-free vulnerability for memory associated with a destroyed Java object.)
 CVE-2009-1836 (Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.)
 CVE-2009-1835 (Mozilla Firefox before 3.0.11 and SeaMonkey before 1.1.17 associate local documents with external domain names located after the file:// substring in a URL, which allows user-assisted remote attackers to read arbitrary cookies via a crafted HTML document, as demonstrated by a URL with file://example.com/C:/ at the beginning.)
 CVE-2009-1834 (Visual truncation vulnerability in netwerk/dns/src/nsIDNService.cpp in Mozilla Firefox before 3.0.11 and SeaMonkey before 1.1.17 allows remote attackers to spoof the location bar via an IDN with invalid Unicode characters that are displayed as whitespace, as demonstrated by the \u115A through \u115E characters.)
 CVE-2009-1833 (The JavaScript engine in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) js_LeaveSharpObject, (2) ParseXMLSource, and (3) a certain assertion in jsinterp.c; and other vectors.)
 CVE-2009-1832 (Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors involving "double frame construction.")
 CVE-2009-1392 (The browser engine in Mozilla Firefox 3 before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) nsEventStateManager::GetContentState and nsNativeTheme::CheckBooleanAttr; (2) UnhookTextRunFromFrames and ClearAllTextRunReferences; (3) nsTextFrame::ClearTextRun; (4) IsPercentageAware; (5) PL_DHashTableFinish; (6) nsListBoxBodyFrame::GetNextItemBox; (7) AtomTableClearEntry, related to the atom table, DOM mutation events, and Unicode surrogates; (8) nsHTMLEditor::HideResizers; and (9) nsWindow::SetCursor, related to changing the cursor; and other vectors.)
Оригинальный текстdocumentMOZILLA, Mozilla Foundation Security Advisory 2009-24 (14.06.2009)
 documentMOZILLA, Mozilla Foundation Security Advisory 2009-25 (14.06.2009)
 documentMOZILLA, Mozilla Foundation Security Advisory 2009-26 (14.06.2009)
 documentMOZILLA, Mozilla Foundation Security Advisory 2009-27 (14.06.2009)
 documentMOZILLA, Mozilla Foundation Security Advisory 2009-30 (14.06.2009)
 documentMOZILLA, Mozilla Foundation Security Advisory 2009-28 (14.06.2009)
 documentMOZILLA, Mozilla Foundation Security Advisory 2009-29 (14.06.2009)
 documentMOZILLA, Mozilla Foundation Security Advisory 2009-31 (14.06.2009)
 documentMOZILLA, Mozilla Foundation Security Advisory 2009-32 (14.06.2009)
 documentSECUNIA, Secunia Research: Mozilla Firefox Java Applet Loading Vulnerability (14.06.2009)

DoS против интерфейса IPv6 в FreeBSD
Опубликовано:14 июня 2009 г.
Источник:
SecurityVulns ID:9988
Тип:локальная
Уровень опасности:
5/10
Описание:Непривилегированный пользователь может устанавливать свойства и отключать интерфейс.
Оригинальный текстdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-09:10.ipv6 (14.06.2009)

DoS против Google Chrome
Опубликовано:14 июня 2009 г.
Источник:
SecurityVulns ID:9989
Тип:удаленная
Уровень опасности:
3/10
Описание:<script>location.hostname = "%";</script> приводит к вечному циклу.
Затронутые продукты:GOOGLE : Chrome 2.0
Оригинальный текстdocumentMustLive, DoS vulnerabilities in Mozilla and Google Chrome (14.06.2009)
Файлы:Mozilla & Google Chrome DoS Exploit

Выполнение кода через плагин Firefox DX Studio Player
Опубликовано:14 июня 2009 г.
Источник:
SecurityVulns ID:9991
Тип:удаленная
Уровень опасности:
5/10
Описание:Возможно выполнение системных команд через Javascript.
Затронутые продукты:DXSTUDIO : DX Studio Player 3.0
CVE:CVE-2009-2011 (Worldweaver DX Studio Player 3.0.29.0, 3.0.22.0, 3.0.12.0, and probably other versions before 3.0.29.1, when used as a plug-in for Firefox, does not restrict access to the shell.execute JavaScript API method, which allows remote attackers to execute arbitrary commands via a .dxstudio file that invokes this method.)
Оригинальный текстdocumentCORE SECURITY TECHNOLOGIES ADVISORIES, CORE-2009-0521 - DX Studio Player Firefox plug-in command injection (14.06.2009)

Многочисленные уязвимости безопасности в Microsoft Active Directory
дополнено с 9 июня 2009 г.
Опубликовано:14 июня 2009 г.
Источник:
SecurityVulns ID:9975
Тип:удаленная
Уровень опасности:
7/10
Описание:Двойное освобождение памяти, утечки памяти.
Затронутые продукты:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
CVE:CVE-2009-1139 (Memory leak in the LDAP service in Active Directory on Microsoft Windows 2000 SP4 and Server 2003 SP2, and Active Directory Application Mode (ADAM) on Windows XP SP2 and SP3 and Server 2003 SP2, allows remote attackers to cause a denial of service (memory consumption and service outage) via (1) LDAP or (2) LDAPS requests with unspecified OID filters, aka "Active Directory Memory Leak Vulnerability.")
 CVE-2009-1138 (The LDAP service in Active Directory on Microsoft Windows 2000 SP4 does not properly free memory for LDAP and LDAPS requests, which allows remote attackers to execute arbitrary code via a request that uses hexadecimal encoding, whose associated memory is not released, related to a "DN AttributeValue," aka "Active Directory Invalid Free Vulnerability." NOTE: this issue is probably a memory leak.)
Оригинальный текстdocumentIDEFENSE, iDefense Security Advisory 06.11.09: Microsoft Active Directory Hexdecimal DN AttributeValue Invalid Free Vulnerability (14.06.2009)
 documentMICROSOFT, Microsoft Security Bulletin MS09-018 - Critical Vulnerabilities in Active Directory Could Allow Remote Code Execution (971055) (09.06.2009)
Файлы:Microsoft Security Bulletin MS09-018 - Critical Vulnerabilities in Active Directory Could Allow Remote Code Execution (971055)

Выполнение кода через SNMP в HP OpenView Network Node Manager
дополнено с 14 июня 2009 г.
Опубликовано:27 июня 2009 г.
Источник:
SecurityVulns ID:9992
Тип:удаленная
Уровень опасности:
6/10
Описание:Переполнение буфера в приложении rping.
Затронутые продукты:HP : OpenView Network Node Manager 7.53
CVE:CVE-2009-1420 (Stack-based buffer overflow in rping in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53, when used with SNMP (aka HPOvNNM.HPOVSNMP) before 1.30.009 and MIB (aka HPOvNNM.HPOVMIB) before 1.30.009, allows remote attackers to execute arbitrary code or cause a denial of service via unknown vectors.)
Оригинальный текстdocumentIDEFENSE, iDefense Security Advisory 06.26.09: HP Network Node Manager rping Stack Buffer Overflow Vulnerability (27.06.2009)
 documentHP, [security bulletin] HPSBMA02430 SSRT080094 rev.1 - HP OpenView Network Node Manager (OV NNM) Running SNMP and MIB, Remote Execution of Arbitrary Code, Denial of Service (DoS) (14.06.2009)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород