Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в Adobe Flash Player
дополнено с 12 августа 2011 г.
Опубликовано:27 августа 2011 г.
Источник:
SecurityVulns ID:11851
Тип:клиент
Уровень опасности:
8/10
Описание:Повреждения памяти, переполнения буфера, целочисленные переполнения, межсайтовый скриптинг.
Затронутые продукты:ADOBE : Flash Player 10.3
 ADOBE : AIR 2.7
CVE:CVE-2011-2425 (Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2140, and CVE-2011-2417.)
 CVE-2011-2417 (Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2140, and CVE-2011-2425.)
 CVE-2011-2416 (Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2136 and CVE-2011-2138.)
 CVE-2011-2415 (Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2137, and CVE-2011-2414.)
 CVE-2011-2414 (Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2137, and CVE-2011-2415.)
 CVE-2011-2140 (Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2417, and CVE-2011-2425.)
 CVE-2011-2139 (Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows remote attackers bypass the Same Origin Policy and obtain sensitive information via unspecified vectors.)
 CVE-2011-2138 (Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2136 and CVE-2011-2416.)
 CVE-2011-2137 (Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2414, and CVE-2011-2415.)
 CVE-2011-2136 (Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2138 and CVE-2011-2416.)
 CVE-2011-2135 (Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2140, CVE-2011-2417, and CVE-2011-2425.)
 CVE-2011-2134 (Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2137, CVE-2011-2414, and CVE-2011-2415.)
 CVE-2011-2130 (Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2134, CVE-2011-2137, CVE-2011-2414, and CVE-2011-2415.)
Оригинальный текстdocumentZDI, ZDI-11-276: Adobe Flash Player MP4 sequenceParameterSetNALUnit Remote Code Execution Vulnerability (27.08.2011)
 documentVUPEN Security Research, VUPEN Security Research - Adobe Flash Player ActionScript FileReference Buffer Overflow (APSB11-21) (17.08.2011)
 documentZDI, ZDI-11-253: Adobe Flash Player BitmapData.scroll Integer Overflow Remote Code Execution Vulnerability (17.08.2011)
 documentIDEFENSE, iDefense Security Advisory 08.09.11: Adobe Flash Player ActionScript Display Memory Corruption Vulnerability (12.08.2011)
 documentIDEFENSE, iDefense Security Advisory 08.09.11: Adobe Flash Player Integer Overflow (12.08.2011)
Файлы:Security update available for Adobe Flash Player

Многочисленные переполнения буфера в EMC AutoStart
дополнено с 19 августа 2011 г.
Опубликовано:27 августа 2011 г.
Источник:
SecurityVulns ID:11876
Тип:удаленная
Уровень опасности:
5/10
Описание:Многочисленные переполнения буфера при обработке сетевых запросов.
Затронутые продукты:EMC : AutoStart 5.3
CVE:CVE-2011-2735 (Multiple buffer overflows in EMC AutoStart 5.3.x and 5.4.x before 5.4.1 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by sending a crafted message over TCP.)
Оригинальный текстdocumentZDI, ZDI-11-274: EMC Autostart ftAgent Opcode 0x140 Parsing Remote Code Execution Vulnerability (27.08.2011)
 documentZDI, ZDI-11-275: EMC Autostart ftAgent Opcode 0x11 Parsing Remote Code Execution Vulnerability (27.08.2011)
 documentZDI, ZDI-11-273: EMC Autostart Domain Name Logging Remote Code Execution Vulnerability (27.08.2011)
 documentEMC, ESA-2011-025: Multiple buffer overflow vulnerabilities in EMC AutoStart (19.08.2011)

Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)
Опубликовано:27 августа 2011 г.
Источник:
SecurityVulns ID:11878
Тип:удаленная
Уровень опасности:
5/10
Описание:Инъекции PHP, инъекции SQL, обратный путь в каталогах, межсайтовый скриптинг, модификация файлов, утечка информации и т.д.
Затронутые продукты:LEDGERSMB : LedgerSMB 1.2
 SQLLEDGER : SQL-Ledger 2.8
 JCOW : Jcow 4.2
 JCOW : Jcow 5.2
 CONCRETE5 : Concrete CMS 5.4
 GLPI : GLPI 0.80
 APACHE : Wicket 1.4
Оригинальный текстdocumentchris.travers_(at)_gmail.com, Security advisory: SQL Injection in LedgerSMB 1.2.24 and lower (27.08.2011)
 documentAPACHE, [CVE-2011-2712] Apache Wicket XSS vulnerability (27.08.2011)
 documentChris Travers, SQL-Ledger patch update for SQL injection (27.08.2011)
 documentnoreply_(at)_ptsecurity.ru, JagoanStore CMS Arbitary file upload vulnerability (27.08.2011)
 documentnoreply_(at)_ptsecurity.ru, [PT-2011-23] Database information disclosure in GLPI (27.08.2011)
 documentYGN Ethical Hacker Group, [PT-2011-23] Database information disclosure in GLPI (27.08.2011)
 documentYGN Ethical Hacker Group, ValtNet (photogallery.html?id_categoria) Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, CreatiWeb Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, Alfazeta (list-prodotti.php?idcategoria) Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, Warah Agencia (productos.php?categoria_id) Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, ################################ IRANIAN THE BEST HACKERS IN THE WORLD ################## #################### #################### ## ## Remote SQL injection Vulnerability ## ## Dataminas (noticias.php?categoria_id) (galeria.php?galeria (27.08.2011)
 documentYGN Ethical Hacker Group, Dataminas (noticias.php?categoria_id) (galeria.php?galeria_id) Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, Nafis Group (review.php?ID) Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, Nativedreams (Fabarth_gallery.php?categoria_id) Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, Data Center Foz (product_cat.php?CATEGORIA_ID) Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, LAB GRAPHIC DESIGN (index.php?categoria_id) Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, B-Keen communication (dettaglio_news.php&id) Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, BUZLAB (prodotti.php?idCategoria) Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, Foresta Creativa (prodotti.php?idCategoria) Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, Web Progetto (prodotti.php?idcategoria) Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, Spherica Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, Marinet Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, Marinet Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, TconZERO (prodotto.php?idprodotto) Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, Web Art Studio (prodotto.php?lang) Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, OMNITEC (prodotto.php?id_prodotto) Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, Listendifferent (prodotto.php?IDprodotto) Remote SQL injection Vulnerability (27.08.2011)
 documentYGN Ethical Hacker Group, Concrete CMS 5.4.1.1 <= Cross Site Scripting (27.08.2011)
 documentYGN Ethical Hacker Group, Jcow CMS 4.2 <= | Cross Site Scripting (27.08.2011)
 documentYGN Ethical Hacker Group, Jcow CMS 4.x:4.2 <= , 5.x:5.2 <= | Arbitrary Code Execution (27.08.2011)

Многочисленные уязвимости безопасности в PHP
Опубликовано:27 августа 2011 г.
Источник:
SecurityVulns ID:11879
Тип:библиотека
Описание:Обращения по нулевому указателю, повреждения памяти в ZipArchive.
Затронутые продукты:PHP : PHP 5.3
CVE:CVE-2011-2483 (crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash.)
 CVE-2011-2202 (The rfc1867_post_handler function in main/rfc1867.c in PHP before 5.3.7 does not properly restrict filenames in multipart/form-data POST requests, which allows remote attackers to conduct absolute path traversal attacks, and possibly create or overwrite arbitrary files, via a crafted upload request, related to a "file path injection vulnerability.")
 CVE-2011-1938 (Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.)
 CVE-2011-1657 (The (1) ZipArchive::addGlob and (2) ZipArchive::addPattern functions in ext/zip/php_zip.c in PHP 5.3.6 allow context-dependent attackers to cause a denial of service (application crash) via certain flags arguments, as demonstrated by (a) GLOB_ALTDIRFUNC and (b) GLOB_APPEND.)
 CVE-2011-1148 (Use-after-free vulnerability in the substr_replace function in PHP 5.3.6 and earlier allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by using the same variable for multiple arguments.)
Оригинальный текстdocumentSLACKWARE, [slackware-security] php (SSA:2011-237-01) (27.08.2011)
 documentMaksymilian Arciemowicz, PHP 5.3.6 multiple null pointer dereference (27.08.2011)

Повреждение памяти в Lumension Device Control
дополнено с 25 мая 2011 г.
Опубликовано:27 августа 2011 г.
Источник:
SecurityVulns ID:11687
Тип:удаленная
Уровень опасности:
5/10
Описание:Повреждение памяти при разборе трафика TCP/65129.
Затронутые продукты:LUMENSION : Lumension Device Control 4.4
Оригинальный текстdocument[email protected], NGS00054 Technical Advisory: : Lumension Device Control (formerly Sanctuary) remote memory corruption (27.08.2011)
 document[email protected], NGS00054 Patch Notification: Lumension Device Control (formerly Sanctuary) remote memory corruption (25.05.2011)

DoS против многих HTTP-серверов
дополнено с 27 августа 2011 г.
Опубликовано:20 октября 2011 г.
Источник:
SecurityVulns ID:11880
Тип:удаленная
Уровень опасности:
8/10
Описание:Обработка заголовка Range может привести к исчерпанию памяти.
Затронутые продукты:APACHE : Apache 1.3
 APACHE : Apache 2.0
 APACHE : Apache 2.2
CVE:CVE-2011-3348 (The mod_proxy_ajp module in the Apache HTTP Server before 2.2.21, when used with mod_proxy_balancer in certain configurations, allows remote attackers to cause a denial of service (temporary "error state" in the backend server) via a malformed HTTP request.)
 CVE-2011-3192 (The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.)
Оригинальный текстdocumentCISCO, Cisco Security Advisory: Apache HTTPd Range Header Denial of Service Vulnerability (30.08.2011)
 documentXianuro GL, HTTPKiller - (Global HTTP DoS) (27.08.2011)
 document , Advisory: Range header DoS vulnerability Apache HTTPD 1.3/2.x (CVE-2011-3192) (27.08.2011)
Файлы:HTTPKiller - FHTTP Kit by Xianur0
 Apache httpd Remote Denial of Service (memory exhaustion)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород