Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в Autonomy KeyView
дополнено с 29 июля 2010 г.
Опубликовано:26 августа 2010 г.
Источник:
SecurityVulns ID:11023
Тип:библиотека
Уровень опасности:
5/10
Описание:Переполнение буфера, целочисленные переполнения, повреждения памяти.
Затронутые продукты:AUTONOMY : KeyView 10.4
 AUTONOMY : KeyView 10.9
CVE:CVE-2010-1525 (Integer underflow in the SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted size for an unspecified record type, which triggers a heap-based buffer overflow.)
 CVE-2010-1524 (The SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via unspecified vectors related to allocation of an array of pointers and "string indexing," which triggers memory corruption.)
 CVE-2010-0135 (Heap-based buffer overflow in the WordPerfect 5.x reader (wosr.dll), as used in Autonomy KeyView 10.4 and 10.9 and possibly other products, allows remote attackers to execute arbitrary code via unspecified vectors related to "data blocks.")
 CVE-2010-0134 (Integer signedness error in rtfsr.dll in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via a crafted \ls keyword in a list override table entry in an RTF file, which triggers a buffer overflow.)
 CVE-2010-0133 (Multiple stack-based buffer overflows in the SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allow remote attackers to execute arbitrary code via unspecified vectors related to "certain records.")
 CVE-2010-0131 (Stack-based buffer overflow in the SpreadSheet Lotus 123 reader (wkssr.dll), as used in Autonomy KeyView 10.4 and 10.9, Symantec Mail Security, and possibly other products, allows remote attackers to execute arbitrary code via unspecified vectors related to floating point conversion in unknown record types.)
 CVE-2010-0126 (Heap-based buffer overflow in an unspecified library in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via a crafted compound file, as demonstrated using a Quattro Pro file, which is not properly handled by the Quattro speed reader (qpssr.dll).)
Оригинальный текстdocumentZDI, ZDI-10-157: IBM Lotus Notes Autonomy KeyView Office Shape Parsing Remote Code Execution Vulnerability (26.08.2010)
 documentZDI, ZDI-10-159: IBM Lotus Notes Autonomy KeyView WK3 Parsing Remote Code Execution Vulnerability (25.08.2010)
 documentZDI, ZDI-10-158: IBM Lotus Notes Autonomy KeyView WK3 Parsing Remote Code Execution Vulnerability (25.08.2010)
 documentZDI, ZDI-10-156: IBM Lotus Notes Autonomy KeyView Word Parsing Remote Code Execution Vulnerability (25.08.2010)
 documentSECUNIA, Secunia Research: Autonomy KeyView wkssr.dll Record Parsing Buffer Overflows (29.07.2010)
 documentSECUNIA, Secunia Research: Autonomy KeyView wkssr.dll String Indexing Vulnerability (29.07.2010)
 documentSECUNIA, Secunia Research: Autonomy KeyView wkssr.dll Integer Underflow Vulnerability (29.07.2010)
 documentSECUNIA, Secunia Research: Autonomy KeyView wosr.dll Data Block Parsing Buffer Overflow (29.07.2010)
 documentSECUNIA, Secunia Research: Autonomy KeyView rtfsr.dll RTF Parsing Signedness Error (29.07.2010)
 documentSECUNIA, Secunia Research: Autonomy KeyView wkssr.dll Floating Point Conversion Buffer Overflow (29.07.2010)
 documentSECUNIA, Secunia Research: Autonomy KeyView Compound File Parsing Buffer Overflow (29.07.2010)

Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)
Опубликовано:26 августа 2010 г.
Источник:
SecurityVulns ID:11093
Тип:удаленная
Уровень опасности:
5/10
Описание:Инъекции PHP, инъекции SQL, обратный путь в каталогах, межсайтовый скриптинг, модификация файлов, утечка информации и т.д.
Затронутые продукты:MOINMOIN : MoinMoin 1.9
 MAGIOS : Nagios XI 2009
 BLASTCHAT : BlastChat 3.3
CVE:CVE-2010-2970 (Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin 1.9.x before 1.9.3 allow remote attackers to inject arbitrary web script or HTML via crafted content, related to (1) action/SlideShow.py, (2) action/anywikidraw.py, and (3) action/language_setup.py, a similar issue to CVE-2010-2487.)
 CVE-2010-2969 (Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin 1.7.3 and earlier, and 1.9.x before 1.9.3, allow remote attackers to inject arbitrary web script or HTML via crafted content, related to (1) action/LikePages.py, (2) action/chart.py, and (3) action/userprofile.py, a similar issue to CVE-2010-2487.)
 CVE-2010-2487 (Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin 1.7.3 and earlier, 1.8.x before 1.8.8, and 1.9.x before 1.9.3 allow remote attackers to inject arbitrary web script or HTML via crafted content, related to (1) Page.py, (2) PageEditor.py, (3) PageGraphicalEditor.py, (4) action/CopyPage.py, (5) action/Load.py, (6) action/RenamePage.py, (7) action/backup.py, (8) action/login.py, (9) action/newaccount.py, and (10) action/recoverpass.py.)
Оригинальный текстdocumentAdam Baldwin, Nagios XI users.php SQL Injection (26.08.2010)
 documentUBUNTU, [USN-977-1] MoinMoin vulnerabilities (26.08.2010)
 documentaanisimov_(at)_ptsecurity.com, [Positive Technologies Research] Open Source WebEngine and Web Crawler v.0.2 is out! (26.08.2010)
 documentYGN Ethical Hacker Group, Joomla! Component com_bc Cross Script Scripting (XSS) Vulnerability (26.08.2010)
 documentYGN Ethical Hacker Group, Joomla! Component com_bcaccount Persistent Cross Script Scripting (XSS) Vulnerability (26.08.2010)
 documentYGN Ethical Hacker Group, BlastChat Chat Client Component version 3.3 <= Cross Script Scripting (XSS) Vulnerability (26.08.2010)
 documentMustLive, Многочисленные уязвимости в eSitesBuilder (26.08.2010)

Несанкционированный доступ к данным HP MagCloud iPad App
Опубликовано:26 августа 2010 г.
Источник:
SecurityVulns ID:11094
Тип:клиент
Уровень опасности:
5/10
Затронутые продукты:HP : MagCloud 1.0
CVE:CVE-2010-2711 (Unspecified vulnerability in the HP MagCloud app before 1.0.5 for the iPad allows remote attackers to read and modify MagCloud application data via unknown vectors.)
Оригинальный текстdocumentHP, [security bulletin] HPSBGN02569 SSRT100200 rev.1 - HP MagCloud iPad App, Remote Unauthorized Access to Data (26.08.2010)

Многочисленные уязвимости безопасности в Adobe Shockwave Player
Опубликовано:26 августа 2010 г.
Источник:
SecurityVulns ID:11095
Тип:клиент
Уровень опасности:
8/10
Описание:Многочисленные повреждения памяти.
Затронутые продукты:ADOBE : Shockwave Player 11.5
CVE:CVE-2010-2882 (DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3812 of a certain file.)
 CVE-2010-2881 (IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C0 of a certain file.)
 CVE-2010-2880 (DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x47 of a certain file.)
 CVE-2010-2879 (Multiple integer overflows in the allocator in the TextXtra.x32 module in Adobe Shockwave Player before 11.5.8.612 allow remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted (1) element count or (2) element size value in a file.)
 CVE-2010-2878 (DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a value associated with a buffer seek for a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.)
 CVE-2010-2877 (Adobe Shockwave Player before 11.5.8.612 does not properly validate a count value in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to IML32X.dll and DIRAPIX.dll.)
 CVE-2010-2876 (Adobe Shockwave Player before 11.5.8.612 does not properly validate values associated with buffer-size calculation for a 0xFFFFFFF8 record in a (1) .dir or (2) .dcr Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.)
 CVE-2010-2875 (Integer signedness error in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a length value associated with the tSAC chunk in a Director movie.)
 CVE-2010-2874 (Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to execute arbitrary code via unknown vectors that trigger memory corruption. NOTE: due to conflicting information and use of the same CVE identifier by the vendor, ZDI, and TippingPoint, it is not clear whether this issue is related to use of an uninitialized pointer, an incorrect pointer offset calculation, or both.)
 CVE-2010-2873 (Adobe Shockwave Player before 11.5.8.612 does not properly validate offset values in the rcsL RIFF chunks of (1) .DIR and (2) .DCR Director movies, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.)
 CVE-2010-2872 (Adobe Shockwave Player before 11.5.8.612 does not properly validate an offset value in the pami RIFF chunk in a Director movie, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted movie.)
 CVE-2010-2871 (Integer overflow in the 3D object functionality in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted size value in a 0xFFFFFF45 RIFF record in a Director movie.)
 CVE-2010-2870 (DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a certain chunk size in the mmap chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.)
 CVE-2010-2869 (IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3712 of a certain file.)
 CVE-2010-2868 (IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x320D of a certain file.)
 CVE-2010-2867 (DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly handle a certain return value associated with the rcsL chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to a "pointer offset vulnerability.")
 CVE-2010-2866 (Integer signedness error in the DIRAPI module in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a count value associated with an "undocumented structure" and the tSAC chunk in a Director movie.)
 CVE-2010-2865 (Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service via unknown vectors.)
 CVE-2010-2864 (IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C6 of a certain file.)
 CVE-2010-2863 (Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.)
Оригинальный текстdocumentCHECKPOINT, Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2882 (26.08.2010)
 documentCHECKPOINT, Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2880 (26.08.2010)
 documentCHECKPOINT, Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2864 (26.08.2010)
 documentCHECKPOINT, Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2869 (26.08.2010)
 documentCHECKPOINT, Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2881 (26.08.2010)
 documentCHECKPOINT, Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2868 (26.08.2010)
 documentIDEFENSE, iDefense Security Advisory 08.24.10: Adobe Shockwave Player Memory Corruption Vulnerability (26.08.2010)
 documentZDI, ZDI-10-164: Adobe Shockwave Player Director File FFFFFF88 Record Processing Remote Code Execution Vulnerability (26.08.2010)
 documentZDI, ZDI-10-163: Adobe Shockwave Director tSAC Chunk Parsing Remote Code Execution Vulnerability (26.08.2010)
 documentZDI, ZDI-10-162: Adobe Shockwave Director rcsL Chunk Remote Code Execution Vulnerability (26.08.2010)
 documentZDI, ZDI-10-161: Adobe Shockwave Director PAMI Chunk Remote Code Execution Vulnerability (26.08.2010)
 documentZDI, ZDI-10-160: Adobe Shockwave Player Director File FFFFFF45 Record Processing Remote Code Execution Vulnerability (26.08.2010)
 documentZDI, TPTI-10-15: Adobe Shockwave Director mmap Trusted Chunk Size Remote Code Execution Vulnerability (26.08.2010)
 documentZDI, TPTI-10-13: Adobe Shockwave Director tSAC Chunk Remote Code Execution Vulnerability (26.08.2010)
 documentZDI, TPTI-10-12: Adobe Shockwave TextXtra Allocator Integer Overflow Remote Code Execution Vulnerability (26.08.2010)
 documentZDI, TPTI-10-14: Adobe Shockwave Director rcsL Chunk Pointer Offset Remote Code Execution Vulnerability (26.08.2010)
 documentZDI, TPTI-10-09: Adobe Shockwave CSWV Chunk Memory Corruption Remote Code Execution Vulnerability (26.08.2010)
 documentZDI, TPTI-10-10: Adobe Shockwave tSAC Chunk Invalid Seek Memory Corruption Remote Code Execution Vulnerability (26.08.2010)
 documentADOBE, Security update available for Shockwave Player (26.08.2010)

Межсайтовый скриптинг в GFI WebMonitor
Опубликовано:26 августа 2010 г.
Источник:
SecurityVulns ID:11097
Тип:удаленная
Уровень опасности:
5/10
Описание:Межсайтовый скриптинг в интерфейсе администрирования.
Затронутые продукты:GFI : Webmonitor 20100324
Оригинальный текстdocumentOliver Karow, GFI WebMonitor Admin UI Remote Script Code Injection (26.08.2010)

Выполнение кода через ActiveX Trend Micro Internet Security
Опубликовано:26 августа 2010 г.
Источник:
SecurityVulns ID:11098
Тип:клиент
Уровень опасности:
7/10
Описание:Выполнение кода через extSetOwner
Затронутые продукты:Trend Micro Internet Security Pro 2010
Оригинальный текстdocumentZDI, ZDI-10-165: Trend Micro Internet Security Pro 2010 ActiveX extSetOwner Remote Code Execution Vulnerability (26.08.2010)

Подмена DLL во многих приложениях Microsoft Windows
дополнено с 26 августа 2010 г.
Опубликовано:19 декабря 2011 г.
Источник:
SecurityVulns ID:11096
Тип:клиент
Уровень опасности:
6/10
Описание:При вызове приложения ассоциированного с типом файлов, текущий путь устанавливается в папку, где находится файл, по-умолчанию загрузка динамических библиотек происходит из текущего пути.
Затронутые продукты:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
 PLOTSOFT : PDFill PDF Editor 8.0
 EMC : RSASecurID Software Token 4.1
CVE:CVE-2011-4141 (Untrusted search path vulnerability in EMC RSA SecurID Software Token 4.1 before 4.1.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a Software Token file.)
 CVE-2011-2016 (Untrusted search path vulnerability in Windows Mail and Windows Meeting Space in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .eml or .wcinv file, aka "Windows Mail Insecure Library Loading Vulnerability.")
 CVE-2011-1991 (Multiple untrusted search path vulnerabilities in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allow local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .doc, .rtf, or .txt file, related to (1) deskpan.dll in the Display Panning CPL Extension, (2) EAPHost Authenticator Service, (3) Folder Redirection, (4) HyperTerminal, (5) the Japanese Input Method Editor (IME), and (6) Microsoft Management Console (MMC), aka "Windows Components Insecure Library Loading Vulnerability.")
 CVE-2010-3199 (Untrusted search path vulnerability in TortoiseSVN 1.6.10, Build 19898 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a file that is processed by Tortoise. NOTE: this is only a vulnerability when a file extension is associated with TortoiseProc or TortoiseMerge, which is not the default.)
Оригинальный текстdocumentEMC, ESA-2011-039: RSA(r), The Security Division of EMC, announces security fixes and improvements for RSASecurID(r) Software Token 4.1 for Microsoft(r)Windows(r) (19.12.2011)
 documentrobkraus_(at)_soutionary.com, Foxit Reader Insecure Library Loading (22.07.2011)
 documentrobkraus_(at)_solutionary.com, PDFill Insecure Library Loading (10.06.2011)
 documentMitja Kolsek, Silently Pwning Protected-Mode IE9 and Innocent Windows Applications (08.05.2011)
 documentNSO Research, NSOADV-2010-010: DATEV Multiple Applications DLL Hijacking Vulnerability (24.01.2011)
 documentACROS Security, ASPR #2011-01-11-1: Remote Binary Planting in Multiple F-Secure Products (13.01.2011)
 documentapa-iutcert_(at)_nsec.ir, Google Desktop Insecure Library Loading Vulnerability (30.11.2010)
 documentapa-iutcert_(at)_nsec.ir, AOL Instant Messenger Insecure Library Loading Vulnerability (30.11.2010)
 documentSalvatore "drosophila" Fresta, Audacity <= 1.3 Beta Multiple Local Vulnerabilities (02.11.2010)
 documentapa-iutcert_(at)_nsec.ir, ACDSee Photo Manager Insecure Library Loading Vulnerability (28.10.2010)
 documentapa-iutcert_(at)_nsec.ir, FlipAlbum Vista Pro Insecure Library Loading Vulnerability (28.10.2010)
 documentapa-iutcert_(at)_nsec.ir, Internet Download Manager Insecure Library Loading Vulnerability (28.10.2010)
 documentapa-iutcert_(at)_nsec.ir, Nessus Client Insecure Library Loading Vulnerability (28.10.2010)
 documentapa-iutcert_(at)_nsec.ir, Orbit Downloader Insecure Library Loading Vulnerability (28.10.2010)
 documentapa-iutcert_(at)_nsec.ir, WinMerge Insecure Library Loading Vulnerability (28.10.2010)
 documentACROS Security, Breaking The SetDllDirectory Protection Against Binary Planting (28.10.2010)
 documentapa-iutcert_(at)_nsec.ir, Secunia PSI Insecure Library Loading Vulnerability (28.10.2010)
 documentACROS Security, How Visual Studio Makes Your Applications Vulnerable to Binary Planting (26.10.2010)
 documentindoushka salah el ddine, Microsft COFEE v1.1.2 DLL Hijacking Exploit (19.10.2010)
 documentindoushka salah el ddine, Vuris win32 mabezat DLL Hijacking Exploit (19.10.2010)
 documentapa-iutcert_(at)_nsec.ir, Accounting Pro 2003 Insecure Library Loading Vulnerability (19.10.2010)
 documentapa-iutcert_(at)_nsec.ir, Rafe 7 Insecure Library Loading Vulnerability (19.10.2010)
 documentapa-iutcert_(at)_nsec.ir, Brilliant Accounting System (59) Insecure Library Loading Vulnerability (19.10.2010)
 documentapa-iutcert_(at)_nsec.ir, Sahar Money Manager Insecure Library Loading Vulnerability (19.10.2010)
 documentapa-iutcert_(at)_nsec.ir, Holoo Insecure Library Loading Vulnerability (19.10.2010)
 documentapa-iutcert_(at)_nsec.ir, Xilisoft Video Converter Ultimate Insecure Library Loading Vulnerability (19.10.2010)
 documentYGN Ethical Hacker Group, Moovida Media Player version 2.0.0.15 Insecure DLL Hijacking Vulnerability (libc.dll,quserex.dll) (02.09.2010)
 documentYGN Ethical Hacker Group, KeePass version 2.12 <= Insecure DLL Hijacking Vulnerability (dwmapi.dll) (02.09.2010)
 documentnikhil_uitrgpv_(at)_yahoo.co.in, Tortoise SVN DLL Hijacking Vulnerability (02.09.2010)
 documentinfo_(at)_securitylab.ir, Microsoft Windows wscript.exe (XP) DLL Hijacking Exploit (wshfra.dll) (31.08.2010)
 documentYGN Ethical Hacker Group, QtWeb Browser version 3.3 build 043 Insecure DLL Hijacking Vulnerability (wintab32.dll) (30.08.2010)
 documentYGN Ethical Hacker Group, Maxthon Browser version 2.5.15.1000 Insecure DLL Hijacking Vulnerability (dwmapi.dll) (30.08.2010)
 documentYGN Ethical Hacker Group, Notepad++ version 5.7 Insecure DLL Hijacking Vulnerability (30.08.2010)
 documentglafkos_(at)_astalavista.com, Flash Player 9 DLL Hijacking Exploit (schannel.dll) (30.08.2010)
 documentglafkos_(at)_astalavista.com, Skype <= 4.2.0.169 DLL Hijacking Exploit (wab32.dll) (30.08.2010)
 documentMICROSOFT, Microsoft Security Advisory (2269637) Insecure Library Loading Could Allow Remote Code Execution (29.08.2010)
 documentCERT, US-CERT Technical Cyber Security Alert TA10-238A -- Microsoft Windows Insecurely Loads Dynamic Libraries (29.08.2010)
 documentglafkos_(at)_astalavista.com, TeamViewer <= 5.0.8703 DLL Hijacking Exploit (dwmapi.dll) (26.08.2010)
 documentglafkos_(at)_astalavista.com, Firefox <= 3.6.8 DLL Hijacking Exploit [dwmapi.dll] (26.08.2010)
 documentglafkos_(at)_astalavista.com, Adobe Device Central CS5 DLL Hijacking Exploit (qtcf.dll) (26.08.2010)
 documentglafkos_(at)_astalavista.com, Adobe Premier Pro CS4 DLL Hijacking Exploit (ibfs32.dll) (26.08.2010)
 documentglafkos_(at)_astalavista.com, Adobe Illustrator CS4 DLL Hijacking Exploit (aires.dll) (26.08.2010)
 documentglafkos_(at)_astalavista.com, Adobe InDesign CS4 DLL Hijacking Exploit (ibfs32.dll) (26.08.2010)
 documentglafkos_(at)_astalavista.com, Adobe On Location CS4 DLL Hijacking Exploit (ibfs32.dll) (26.08.2010)
Файлы:Microsoft Security Advisory (2269637) Insecure Library Loading Could Allow Remote Code Execution
 A new CWDIllegalInDllSearch registry entry is available to control the DLL search path algorithm
 Microsoft Security Bulletin MS11-059 - Important Vulnerability in Data Access Components Could Allow Remote Code Execution (2560656)
 Microsoft Security Bulletin MS11-071 - Important Vulnerability in Windows Components Could Allow Remote Code Execution (2570947) Published: Tuesday, September 13, 2011

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород