Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в Microsoft Internet Explorer
дополнено с 11 апреля 2012 г.
Опубликовано:19 апреля 2012 г.
Источник:
SecurityVulns ID:12319
Тип:клиент
Уровень опасности:
8/10
Описание:Многочисленные уязвимости дают возможность выполнения кода.
Затронутые продукты:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
CVE:CVE-2012-0172 (Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "VML Style Remote Code Execution Vulnerability.")
 CVE-2012-0171 (Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "SelectAll Remote Code Execution Vulnerability.")
 CVE-2012-0170 (Microsoft Internet Explorer 6 and 7 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "OnReadyStateChange Remote Code Execution Vulnerability.")
 CVE-2012-0169 (Microsoft Internet Explorer 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "JScript9 Remote Code Execution Vulnerability.")
 CVE-2012-0168 (Microsoft Internet Explorer 6 through 9 allows user-assisted remote attackers to execute arbitrary code via a crafted HTML document that is not properly handled during a "Print table of links" print operation, aka "Print Feature Remote Code Execution Vulnerability.")
Оригинальный текстdocumentVUPEN Security Research, VUPEN Security Research - Microsoft Internet Explorer VML Remote Code Execution (MS12-023 / CVE-2012-0172) (19.04.2012)
Файлы:Microsoft Security Bulletin MS12-023 - Critical Cumulative Security Update for Internet Explorer (2675157)

DoS против HP OpenVMS
Опубликовано:19 апреля 2012 г.
Источник:
SecurityVulns ID:12323
Тип:локальная
Уровень опасности:
5/10
Затронутые продукты:HP : OpenVMS 7.3
 HP : OpenVMS 8.3
 HP : OpenVMS 8.4
CVE:CVE-2012-0134 (Unspecified vulnerability in HP OpenVMS 7.3-2 on the Alpha platform, 8.3 and 8.4 on the Alpha and IA64 platforms, and 8.3-1h1 on the IA64 platform allows local users to cause a denial of service via unknown vectors.)
Оригинальный текстdocumentHP, [security bulletin] HPSBOV02765 SSRT100828 rev.1 - HP OpenVMS, local Denial of Service (DoS) (19.04.2012)

Обход фильтрации в Squid / McAfee Web Gateway
Опубликовано:19 апреля 2012 г.
Источник:
SecurityVulns ID:12324
Тип:удаленная
Уровень опасности:
4/10
Описание:Сервер доверяет заголовку Host: в запросах CONNECT при определении имени хоста.
Затронутые продукты:SQUID : squid 3.1
 MCAFEE : McAfee Web Gateway 7.0
CVE:CVE-2012-2213 (** DISPUTED ** Squid 3.1.9 allows remote attackers to bypass the access configuration for the CONNECT method by providing an arbitrary allowed hostname in the Host HTTP header. NOTE: this issue might not be reproducible, because the researcher is unable to provide a squid.conf file for a vulnerable system, and the observed behavior is consistent with a squid.conf file that was (perhaps inadvertently) designed to allow access based on a "req_header Host" acl regex that matches www.uol.com.br.)
 CVE-2012-2212 (** DISPUTED ** McAfee Web Gateway 7.0 allows remote attackers to bypass the access configuration for the CONNECT method by providing an arbitrary allowed hostname in the Host HTTP header. NOTE: this issue might not be reproducible, because the researcher did not provide configuration details for the vulnerable system, and the observed behavior might be consistent with a configuration that was (perhaps inadvertently) designed to allow access based on Host HTTP headers.)
Оригинальный текстdocumentGabriel Menezes Nunes, Squid URL Filtering Bypass (19.04.2012)
 documentGabriel Menezes Nunes, McAfee Web Gateway URL Filtering Bypass (19.04.2012)

Многочисленные уязвимости безопасности в Adobe Acrobat / Reader
Опубликовано:19 апреля 2012 г.
Источник:
SecurityVulns ID:12325
Тип:клиент
Уровень опасности:
7/10
Описание:Повреждения памяти, целочисленное переполнение, выполнение кода.
Затронутые продукты:ADOBE : Reader 10.1
 ADOBE : Acrobat 10.1
 ADOBE : Reader 9.5
CVE:CVE-2012-0777 (The JavaScript API in Adobe Reader and Acrobat 9.x before 9.5.1 and 10.x before 10.1.3 on Mac OS X and Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.)
 CVE-2012-0776 (The installer in Adobe Reader 9.x before 9.5.1 and 10.x before 10.1.3 allows attackers to bypass intended access restrictions and execute arbitrary code via unspecified vectors.)
 CVE-2012-0775 (The JavaScript implementation in Adobe Reader and Acrobat 9.x before 9.5.1 and 10.x before 10.1.3 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.)
 CVE-2012-0774 (Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.1 and 10.x before 10.1.3 allows attackers to execute arbitrary code via a crafted TrueType font.)
Оригинальный текстdocumentACROS Security, ACROS Blog: Adobe Reader X (10.1.2) msiexec.exe Planting (19.04.2012)
 documentADOBE, Security updates available for Adobe Reader and Acrobat (19.04.2012)

Инъекция SQL в SQLAlchemy
Опубликовано:19 апреля 2012 г.
Источник:
SecurityVulns ID:12326
Тип:библиотека
Уровень опасности:
5/10
Описание:Не проверяются данный SQL-запросов
Затронутые продукты:SQLALCHEMY : SQLAlchemy 0.6
CVE:CVE-2012-0805 (Multiple SQL injection vulnerabilities in SQLAlchemy before 0.7.0b4, as used in Keystone, allow remote attackers to execute arbitrary SQL commands via the (1) limit or (2) offset keyword to the select function, or unspecified vectors to the (3) select.limit or (4) select.offset function.)
Оригинальный текстdocumentMANDRIVA, [ MDVSA-2012:059 ] python-sqlalchemy (19.04.2012)

Многочисленные уязвимости безопасности в jabber-клиенте gajim
Опубликовано:19 апреля 2012 г.
Источник:
SecurityVulns ID:12327
Тип:удаленная
Уровень опасности:
6/10
Описание:Некомментируемые шел-символы, проблема символьных линков, SQL-инъекции.
Затронутые продукты:GAJIM : gajim 0.15
CVE:CVE-2012-2093 (src/common/latex.py in Gajim 0.15 allows local users to overwrite arbitrary files via a symlink attack on a temporary latex file, related to the get_tmpfile_name function.)
 CVE-2012-2086 (SQL injection vulnerability in the get_last_conversation_lines function in common/logger.py in Gajim before 0.15 allows remote attackers to execute arbitrary SQL commands via the jig parameter.)
 CVE-2012-1987 (Unspecified vulnerability in Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys to (1) cause a denial of service (memory consumption) via a REST request to a stream that triggers a thread block, as demonstrated using CVE-2012-1986 and /dev/random; or (2) cause a denial of service (filesystem consumption) via crafted REST requests that use "a marshaled form of a Puppet::FileBucket::File object" to write to arbitrary file locations.)
Оригинальный текстdocumentDEBIAN, [SECURITY] [DSA 2453-1] gajim security update (19.04.2012)

Переполнение индекса массива в Samba
Опубликовано:19 апреля 2012 г.
Источник:
SecurityVulns ID:12328
Тип:удаленная
Уровень опасности:
9/10
Описание:Переполнение индекса массива при обработке RPC-запроса.
CVE:CVE-2012-1182 (The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.)

Повышение привилегий в Microsoft SQL Server
Опубликовано:19 апреля 2012 г.
Источник:
SecurityVulns ID:12329
Тип:локальная
Уровень опасности:
4/10
Описание:Повышение привилегий через RESTORE DATABASE
Затронутые продукты:MICROSOFT : SQL Server 2005
 MICROSOFT : SQL Server 2008
Оригинальный текстdocumentSHATTER, TeamSHATTER Security Advisory: Privilege escalation via internal sql injection in RESTORE DATABASE command (19.04.2012)

Уязвимости безопасности в RealNetworks Helix Server
Опубликовано:19 апреля 2012 г.
Источник:
SecurityVulns ID:12330
Тип:клиент
Уровень опасности:
6/10
Описание:Утечка информации, DoS через SNMP.
Затронутые продукты:REAL : Helix Server 14.2
CVE:CVE-2012-1923 (RealNetworks Helix Server and Helix Mobile Server 14.x before 14.3.x store passwords in cleartext under adm_b_db\users\, which allows local users to obtain sensitive information by reading a database.)
Оригинальный текстdocumentSECUNIA, Secunia Research: Helix Server SNMP Master Agent Service Two Denial of Service Vulnerabilities (19.04.2012)
 documentSECUNIA, Secunia Research: RealNetworks Helix Server Credentials Disclosure Security Issue (19.04.2012)

Уязвимости безопасности в Adobe Flash Player
дополнено с 20 марта 2012 г.
Опубликовано:19 апреля 2012 г.
Источник:
SecurityVulns ID:12276
Тип:клиент
Уровень опасности:
7/10
Описание:Несколько повреждений памяти.
Затронутые продукты:ADOBE : Flash Player 11.1
CVE:CVE-2012-0769 (Adobe Flash Player before 10.3.183.16 and 11.x before 11.1.102.63 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.7 on Android 2.x and 3.x; and before 11.1.115.7 on Android 4.x does not properly handle integers, which allows attackers to obtain sensitive information via unspecified vectors.)
 CVE-2012-0768 (The Matrix3D component in Adobe Flash Player before 10.3.183.16 and 11.x before 11.1.102.63 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.7 on Android 2.x and 3.x; and before 11.1.115.7 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.)
Оригинальный текстdocumentFermin J. Serna, CVE-2012-0769, the case of the perfect info leak (19.04.2012)
 documentADOBE, Security update available for Adobe Flash Player (20.03.2012)
 documentVUPEN Security Research, VUPEN Security Research - Adobe Flash Player "Matrix3D" Remote Memory Corruption (CVE-2012-0768) (20.03.2012)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород