Информационная безопасность
[RU] switch to English


Многочисленные уязвимости в Apple Mac OS X
Опубликовано:16 декабря 2008 г.
Источник:
SecurityVulns ID:9519
Тип:удаленная
Уровень опасности:
8/10
Описание:DoS против Apple Type Services, переполнение буфера в BOM на архивах CPIO, переполнение буфера в CoreGraphics, некорректная обработка cookie для географических доменов в Safari, обход предупреждения на запуск опасного содержимого, многочисленные уязвимосит в Flash Player Plugin, многочисленные повышения привилегий, DoS против Internet Sharing, несанкционированный доступ в Podcast Producer, DoS через образы ISO.
Затронутые продукты:APPLE : MacOS X 10.4
 APPLE : MacOS X 10.5
CVE:CVE-2008-4824 (Multiple unspecified vulnerabilities in Adobe Flash Player 10.x before 10.0.12.36 and 9.x before 9.0.151.0 allow remote attackers to execute arbitrary code via unknown vectors related to "input validation errors.")
 CVE-2008-4823 (Cross-site scripting (XSS) vulnerability in Adobe Flash Player 9.0.124.0 and earlier allows remote attackers to inject arbitrary web script or HTML via vectors related to loose interpretation of an ActionScript attribute.)
 CVE-2008-4822 (Adobe Flash Player 9.0.124.0 and earlier does not properly interpret policy files, which allows remote attackers to bypass a non-root domain policy.)
 CVE-2008-4821 (Adobe Flash Player 9.0.124.0 and earlier, when a Mozilla browser is used, does not properly interpret jar: URLs, which allows attackers to obtain sensitive information via unknown vectors.)
 CVE-2008-4820 (Unspecified vulnerability in the Flash Player ActiveX control in Adobe Flash Player 9.0.124.0 and earlier on Windows allows attackers to obtain sensitive information via unknown vectors.)
 CVE-2008-4819 (Unspecified vulnerability in Adobe Flash Player 9.0.124.0 and earlier makes it easier for remote attackers to conduct DNS rebinding attacks via unknown vectors.)
 CVE-2008-4818 (Cross-site scripting (XSS) vulnerability in Adobe Flash Player 9.0.124.0 and earlier allows remote attackers to inject arbitrary web script or HTML via vectors involving HTTP response headers.)
 CVE-2008-4237 (Managed Client in Apple Mac OS X before 10.5.6 sometimes misidentifies a system when installing per-host configuration settings, which allows context-dependent attackers to have an unspecified impact by leveraging unintended settings, as demonstrated by the screen saver lock setting.)
 CVE-2008-4236 (Apple Type Services (ATS) in Apple Mac OS X 10.5 before 10.5.6 allows remote attackers to cause a denial of service (infinite loop) via a crafted embedded font in a PDF file.)
 CVE-2008-4234 (Incomplete blacklist vulnerability in the Quarantine feature in CoreTypes in Apple Mac OS X 10.5 before 10.5.6 allows user-assisted remote attackers to execute arbitrary code via an executable file with the content type indicating no application association for the file, which does not trigger a "potentially unsafe" warning message.)
 CVE-2008-4224 (UDF in Apple Mac OS X before 10.5.6 allows user-assisted attackers to cause a denial of service (system crash) via a malformed UDF volume in a crafted ISO file.)
 CVE-2008-4223 (Podcast Producer in Apple Mac OS X 10.5 before 10.5.6 allows remote attackers to bypass authentication and gain administrative access via unspecified vectors.)
 CVE-2008-4222 (natd in network_cmds in Apple Mac OS X before 10.5.6, when Internet Sharing is enabled, allows remote attackers to cause a denial of service (infinite loop) via a crafted TCP packet.)
 CVE-2008-4221 (The strptime API in Libsystem in Apple Mac OS X before 10.5.6 allows context-dependent attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via a crafted date string, related to improper memory allocation.)
 CVE-2008-4220 (Integer overflow in the inet_net_pton API in Libsystem in Apple Mac OS X before 10.5.6 allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors. NOTE: this may be related to the WLB-2008080064 advisory published by SecurityReason on 20080822; however, as of 20081216, there are insufficient details to be sure.)
 CVE-2008-4219 (The kernel in Apple Mac OS X before 10.5.6 allows local users to cause a denial of service (infinite loop and system halt) by running an application that is dynamically linked to libraries on an NFS server, related to occurrence of an exception in this application.)
 CVE-2008-4218 (Multiple integer overflows in the kernel in Apple Mac OS X before 10.5.6 on Intel platforms allow local users to gain privileges via a crafted call to (1) i386_set_ldt or (2) i386_get_ldt.)
 CVE-2008-4217 (Integer signedness error in BOM in Apple Mac OS X before 10.5.6 allows remote attackers to execute arbitrary code via the headers in a crafted CPIO archive, leading to a stack-based buffer overflow.)
 CVE-2008-3623 (Heap-based buffer overflow in CoreGraphics in Apple Safari before 3.2 on Windows, in iPhone OS 1.0 through 2.2.1, and in iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted image, related to improper handling of color spaces.)
 CVE-2008-3170 (Apple Safari allows web sites to set cookies for country-specific top-level domains, such as co.uk and com.au, which could allow remote attackers to perform a session fixation attack and hijack a user's HTTP session, aka "Cross-Site Cooking," a related issue to CVE-2004-0746, CVE-2004-0866, and CVE-2004-0867.)
 CVE-2008-1391
Оригинальный текстdocumentCERT, US-CERT Technical Cyber Security Alert TA08-350A -- Apple Updates for Multiple Vulnerabilities (16.12.2008)
 documentAPPLE, About the security content of Security Update 2008-008 / Mac OS X v10.5.6 (16.12.2008)

Утечка исходных кодов в TmaxSoft JEUS
Опубликовано:16 декабря 2008 г.
Источник:
SecurityVulns ID:9520
Тип:удаленная
Уровень опасности:
5/10
Описание:Возможно получение исходного кода скрипта через альтернативные NTFS-потоки путем добавления ::$DATA к имени файла.
Затронутые продукты:TMAXSOFT : JEUS 5
Оригинальный текстdocumentSimon Ryeo, Fwd: TmaxSoft JEUS Alternate Data Streams Vulnerability (16.12.2008)

DoS против Wireshark
Опубликовано:16 декабря 2008 г.
Источник:
SecurityVulns ID:9521
Тип:удаленная
Уровень опасности:
5/10
Описание:Вечный цикл при разборе WLCCP.
Оригинальный текстdocumentMANDRIVA, [ MDVSA-2008:242 ] wireshark (16.12.2008)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород