Информационная безопасность
[RU] switch to English


Подмена сертификата в библиотеке GnuTLS
Опубликовано:20 августа 2009 г.
Источник:
SecurityVulns ID:10169
Тип:библиотека
Уровень опасности:
6/10
Описание:Возможна подмена имени сертификата через нулевой символ, принимаются сертификаты со слабым хэшем MD2.
Затронутые продукты:GNU : GnuTLS 2.8
CVE:CVE-2009-2730 (libgnutls in GnuTLS before 2.8.2 does not properly handle a '\0' character in a domain name in the subject's (1) Common Name (CN) or (2) Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.)
 CVE-2009-2409 (The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.)
Оригинальный текстdocumentUBUNTU, [USN-809-1] GnuTLS vulnerabilities (20.08.2009)

Переполнение буфера в ProShow
Опубликовано:20 августа 2009 г.
Источник:
SecurityVulns ID:10170
Тип:локальная
Уровень опасности:
3/10
Описание:Переполнение буфера при разборе файлов .psh
Затронутые продукты:PROSHOW : ProShow 4.0
Оригинальный текстdocumentSecurity Vulnerability Research Team, [Bkis-11-2009] ProShow Gold Buffer Overflow Vulnerabilities (20.08.2009)

Повреждение памяти в ActiveX Microsoft Office Web Components
дополнено с 14 июля 2009 г.
Опубликовано:20 августа 2009 г.
Источник:
SecurityVulns ID:10065
Тип:клиент
Уровень опасности:
8/10
Описание:Уязвимость в ActiveX компоненте активно используется для скрытой установки вредоносного кода.
Затронутые продукты:MICROSOFT : Office XP
 MICROSOFT : Office 2003
CVE:CVE-2009-2496 (Heap-based buffer overflow in the Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 SP1, and Office Small Business Accounting 2006 allows remote attackers to execute arbitrary code via unspecified parameters to unknown methods, aka "Office Web Components Heap Corruption Vulnerability.")
 CVE-2009-1534 (Buffer overflow in the Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2000 Web Components SP3, Office XP Web Components SP3, BizTalk Server 2002, and Visual Studio .NET 2003 SP1 allows remote attackers to execute arbitrary code via crafted property values, aka "Office Web Components Buffer Overflow Vulnerability.")
 CVE-2009-1136 (The Microsoft Office Web Components Spreadsheet ActiveX control (aka OWC10 or OWC11), as distributed in Office XP SP3 and Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 Gold and SP1, and Office Small Business Accounting 2006, when used in Internet Explorer, allows remote attackers to execute arbitrary code via a crafted call to the msDataSourceObject method, as exploited in the wild in July and August 2009, aka "Office Web Components HTML Script Vulnerability.")
 CVE-2009-0562 (The Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 SP1, and Office Small Business Accounting 2006 does not properly allocate memory, which allows remote attackers to execute arbitrary code via unspecified vectors that trigger "system state" corruption, aka "Office Web Components Memory Allocation Vulnerability.")
Оригинальный текстdocumentIDEFENSE, iDefense Security Advisory 08.11.09: Microsoft Office Web Components 2000 Buffer Overflow Vulnerability (20.08.2009)
 documentZDI, ZDI-09-055: Microsoft Office OWC10 ActiveX Control Loading and Unloading Heap Corruption Vulnerability (12.08.2009)
 documentZDI, ZDI-09-054: Microsoft Office OWC10.Spreadsheet ActiveX msDataSourceObject() Heap Corruption Vulnerability (12.08.2009)
 documentZDI, ZDI-09-056: Microsoft Office OWC10.Spreadsheet ActiveX BorderAround() Heap Corruption Vulnerability (12.08.2009)
 documentMICROSOFT, Microsoft Security Bulletin MS09-043 - Critical Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution (957638) (11.08.2009)
 documentnoreply-secresearch_(at)_fortinet.com, FortiGuard Advisory: Microsoft Office Web Components Remote Memory Corruption Vulnerability (14.07.2009)
Файлы:Microsoft Security Advisory (973472) Vulnerability in Microsoft Office Web Components Control Could Allow Remote Code Execution
 Microsoft Security Bulletin MS09-043 - Critical Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution (957638)

DoS против perl
дополнено с 3 июля 2009 г.
Опубликовано:20 августа 2009 г.
Источник:
SecurityVulns ID:10035
Тип:библиотека
Уровень опасности:
5/10
Описание:Отказ при разборе сжатия zlib через Compress::Raw::Zlib и bzip2 в Compress-Raw-Bzip2
Затронутые продукты:PERL : perl 5.10
CVE:CVE-2009-1884 (Off-by-one error in the bzinflate function in Bzip2.xs in the Compress-Raw-Bzip2 module before 2.018 for Perl allows context-dependent attackers to cause a denial of service (application hang or crash) via a crafted bzip2 compressed stream that triggers a buffer overflow, a related issue to CVE-2009-1391.)
 CVE-2009-1391 (Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009.)
Оригинальный текстdocumentMANDRIVA, [ MDVSA-2009:207 ] perl-Compress-Raw-Bzip2 (20.08.2009)
 documentUBUNTU, [USN-794-1] Perl vulnerability (03.07.2009)

DoS против антивируса Касперского
Опубликовано:20 августа 2009 г.
Источник:
SecurityVulns ID:10168
Тип:клиент
Уровень опасности:
5/10
Описание:Вечный цикл при разборе URL с большим количеством точек.
Затронутые продукты:KASPERSKY : Kaspersky Anti-Virus 2010
 KASPERSKY : Kaspersky Internet Security 2010
Оригинальный текстdocumentMaksymilian Arciemowicz, Kaspersky AV/IS 2010 (avp.exe) Denial-of-Service (20.08.2009)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород