Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в Mozilla / Seamonkey / Thunderbird
Опубликовано:23 июня 2011 г.
Источник:
SecurityVulns ID:11746
Тип:клиент
Уровень опасности:
9/10
Описание:Многочисленные повреждения памяти, целочисленные переполнения, переполнение буфера, междоменный доступ к данным.
Затронутые продукты:MOZILLA : Firefox 3.6
 MOZILLA : Thunderbird 3.1
 MOZILLA : Firefox 4.0
CVE:CVE-2011-2377 (Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.)
 CVE-2011-2376 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2011-2375 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2011-2374 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2011-2373 (Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.)
 CVE-2011-2371 (Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.)
 CVE-2011-2370 (Mozilla Firefox before 5.0 does not properly enforce the whitelist for the xpinstall functionality, which allows remote attackers to trigger an installation dialog for a (1) add-on or (2) theme via unspecified vectors.)
 CVE-2011-2369 (Cross-site scripting (XSS) vulnerability in Mozilla Firefox 4.x through 4.0.1 allows remote attackers to inject arbitrary web script or HTML via an SVG element containing an HTML-encoded entity.)
 CVE-2011-2368 (The WebGL implementation in Mozilla Firefox 4.x through 4.0.1 does not properly restrict write operations, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.)
 CVE-2011-2367 (The WebGL implementation in Mozilla Firefox 4.x through 4.0.1 does not properly restrict read operations, which allows remote attackers to obtain sensitive information from GPU memory associated with an arbitrary process, or cause a denial of service (application crash), via unspecified vectors.)
 CVE-2011-2366 (Mozilla Gecko before 5.0, as used in Firefox before 5.0 and Thunderbird before 5.0, does not block use of a cross-domain image as a WebGL texture, which allows remote attackers to obtain approximate copies of arbitrary images via a timing attack involving a crafted WebGL fragment shader.)
 CVE-2011-2365 (Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.)
 CVE-2011-2364 (Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.)
 CVE-2011-2363 (Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.)
 CVE-2011-2362 (Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.)
 CVE-2011-0085 (Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.)
 CVE-2011-0083 (Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.)
Оригинальный текстdocumentZDI, ZDI-11-224: Mozilla Firefox SVGPointList.appendItem Remote Code Execution Vulnerability (23.06.2011)
 documentZDI, ZDI-11-225: Mozilla Firefox nsXULCommandDispatcher Remote Code Execution Vulnerability (23.06.2011)
 documentZDI, ZDI-11-223: Mozilla Firefox SVGPathSegList.replaceItem Remote Code Execution Vulnerability (23.06.2011)
Файлы:Mozilla Foundation Security Advisory 2011-19
 Mozilla Foundation Security Advisory 2011-20
 Mozilla Foundation Security Advisory 2011-21
 Mozilla Foundation Security Advisory 2011-22
 Mozilla Foundation Security Advisory 2011-23
 Mozilla Foundation Security Advisory 2011-24
 Mozilla Foundation Security Advisory 2011-25
 Mozilla Foundation Security Advisory 2011-26
 Mozilla Foundation Security Advisory 2011-27
 Mozilla Foundation Security Advisory 2011-28

Выполнение кода в Easewe FTP OCX ActiveX
Опубликовано:23 июня 2011 г.
Источник:
SecurityVulns ID:11747
Тип:клиент
Уровень опасности:
5/10
Описание:Выполнение когда через небезопасный метод.
Затронутые продукты:EASEWE : Easewe FTP OCX 4.5
Оригинальный текстdocumentHigh-Tech Bridge Security Research, HTB23015: Easewe FTP ActiveX Control Multiple Insecure Methods (23.06.2011)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород