Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в Apache
Опубликовано:28 июля 2014 г.
Источник:
SecurityVulns ID:13888
Тип:удаленная
Уровень опасности:
7/10
Описание:Переполнение буфера в mod_status, DoS через mod_proxy, mod_deflate, mod_cgid.
Затронутые продукты:APACHE : Apache 2.4
CVE:CVE-2014-0231 (The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.)
 CVE-2014-0226 (Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.)
 CVE-2014-0118 (The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.)
 CVE-2014-0117 (The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.)
Оригинальный текстdocumentUBUNTU, [USN-2299-1] Apache HTTP Server vulnerabilities (28.07.2014)

Многочисленные уязвимости безопасности в Videolan vlc
Опубликовано:28 июля 2014 г.
Источник:
SecurityVulns ID:13889
Тип:библиотека
Уровень опасности:
6/10
Описание:Переполнение буфера при разборе различных видеоформатов.
Затронутые продукты:VIDEOLAN : vlc 2.0
CVE:CVE-2013-4388 (Buffer overflow in the mp4a packetizer (modules/packetizer/mpeg4audio.c) in VideoLAN VLC Media Player before 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.)
 CVE-2013-1954 (The ASF Demuxer (modules/demux/asf/asf.c) in VideoLAN VLC media player 2.0.5 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ASF movie that triggers an out-of-bounds read.)
 CVE-2013-1868 (Multiple buffer overflows in VideoLAN VLC media player 2.0.4 and earlier allow remote attackers to cause a denial of service (crash) and execute arbitrary code via vectors related to the (1) freetype renderer and (2) HTML subtitle parser.)
Оригинальный текстdocumentDEBIAN, [SECURITY] [DSA 2973-1] vlc security update (28.07.2014)

Несанкционированный доступ к файлам в CUPS
дополнено с 22 июля 2014 г.
Опубликовано:28 июля 2014 г.
Источник:
SecurityVulns ID:13879
Тип:локальная
Уровень опасности:
5/10
Описание:Несанкционированный доступ к файлам rss
Затронутые продукты:CUPS : cups 1.7
CVE:CVE-2014-5031 (The web interface in CUPS before 2.0 does not check that files have world-readable permissions, which allows remote attackers to obtains sensitive information via unspecified vectors.)
 CVE-2014-5030 (CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.)
 CVE-2014-5029 (The web interface in CUPS 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/ and language[0] set to null. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3537.)
 CVE-2014-3537 (The web interface in CUPS before 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/.)
Оригинальный текстdocumentDEBIAN, [SECURITY] [DSA 2990-1] cups security update (28.07.2014)
 documentUBUNTU, [USN-2293-1] CUPS vulnerability (22.07.2014)

Многочисленные уязвимости безопасности в Mozilla Firefox / Thunderbird / Seamonkey
Опубликовано:28 июля 2014 г.
Источник:
SecurityVulns ID:13890
Тип:клиент
Уровень опасности:
8/10
Описание:Многочисленные повреждения памяти, переполнения буфера.
Затронутые продукты:MOZILLA : Firefox 30
 MOZILLA : Firefox ESR 24.6
 MOZILLA : Thunderbird 24.6
CVE:CVE-2014-1561 (Mozilla Firefox before 31.0 does not properly restrict use of drag-and-drop events to spoof customization events, which allows remote attackers to alter the placement of UI icons via crafted JavaScript code that is encountered during (1) page, (2) panel, or (3) toolbar customization.)
 CVE-2014-1560 (Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use ASCII character encoding in a required context.)
 CVE-2014-1559 (Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use UTF-8 character encoding in a required context, a different vulnerability than CVE-2014-1558.)
 CVE-2014-1558 (Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use UTF-8 character encoding in a required context, a different vulnerability than CVE-2014-1559.)
 CVE-2014-1557 (The ConvolveHorizontally function in Skia, as used in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, does not properly handle the discarding of image data during function execution, which allows remote attackers to execute arbitrary code by triggering prolonged image scaling, as demonstrated by scaling of a high-quality image.)
 CVE-2014-1556 (Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to execute arbitrary code via crafted WebGL content constructed with the Cesium JavaScript library.)
 CVE-2014-1555 (Use-after-free vulnerability in the nsDocLoader::OnProgress function in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allows remote attackers to execute arbitrary code via vectors that trigger a FireOnStateChange event.)
 CVE-2014-1554 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2014-1552 (Mozilla Firefox before 31.0 and Thunderbird before 31.0 do not properly implement the sandbox attribute of the IFRAME element, which allows remote attackers to bypass intended restrictions on same-origin content via a crafted web site in conjunction with a redirect.)
 CVE-2014-1551 (Use-after-free vulnerability in the FontTableRec destructor in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 on Windows allows remote attackers to execute arbitrary code via crafted use of fonts in MathML content, leading to improper handling of a DirectWrite font-face object.)
 CVE-2014-1550 (Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering.)
 CVE-2014-1549 (The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via crafted audio content that is improperly handled during playback buffering.)
 CVE-2014-1548 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2014-1547 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
Файлы:MFSA 2014-56 Miscellaneous memory safety hazards (rv:31.0 / rv:24.7)
 MFSA 2014-57 Buffer overflow during Web Audio buffering for playback
 MFSA 2014-58 Use-after-free in Web Audio due to incorrect control message ordering
 MFSA 2014-59 Use-after-free in DirectWrite font handling
 MFSA 2014-60 Toolbar dialog customization event spoofing
 MFSA 2014-61 Use-after-free with FireOnStateChange event
 MFSA 2014-62 Exploitable WebGL crash with Cesium JavaScript library
 MFSA 2014-63 Use-after-free while when manipulating certificates in the trusted cache
 MFSA 2014-64 Crash in Skia library when scaling high quality images
 MFSA 2014-65 Certificate parsing broken by non-standard character encoding
 MFSA 2014-66 IFRAME sandbox same-origin access through redirect

Уязвимости безопасности в Barracuda Networks Firewall / Web Firewall / Spam&Virus Firewall
дополнено с 28 июля 2014 г.
Опубликовано:26 августа 2014 г.
Источник:
SecurityVulns ID:13887
Тип:удаленная
Уровень опасности:
5/10
Описание:Обход ограничений, XSS.
Затронутые продукты:BARRACUDANETWORK : Barracuda Networks Firewall 6.1
 BARRACUDANETWORK : Web Firewall 610
 BARRACUDANETWORK : Spam & Virus Firewall 600
 BARRACUDANETWORK : Barracuda Networks Web Security Flex 4.1
CVE:CVE-2014-2595
Оригинальный текстdocumentVulnerability Lab, Barracuda Networks Web Security Flex v4.1 - Persistent Vulnerabilities (BNSEC-699) (26.08.2014)
 documentadvisories_(at)_portcullis-security.com, CVE-2014-2595 - Authentication Bypass in Barracuda Web Application Firewall (11.08.2014)
 documentVulnerability Lab, Barracuda Networks Web Application Firewall v6.1.5 & LoadBalancer v4.2.2 #37 - Filter Bypass & Multiple Vulnerabilities (04.08.2014)
 documentVulnerability Lab, Barracuda Networks Spam&Virus Firewall v5.1.3 - Client Side Cross Site Vulnerability (28.07.2014)
 documentVulnerability Lab, Barracuda Networks Spam&Virus Firewall v6.0.2 (600 & Vx) - Client Side Cross Site Vulnerability (28.07.2014)
 documentVulnerability Lab, Barracuda Networks #35 Web Firewall 610 v6.0.1 - Filter Bypass & Persistent Vulnerability (28.07.2014)
 documentVulnerability Lab, Barracuda Networks Firewall 6.1.2 #36 - Filter Bypass & Exception Handling Vulnerability + PoC Video BNSEC-2398 (28.07.2014)
 documentVulnerability Lab, Barracuda Networks Firewall 6.1.5 - Filter Bypass & Persistent Vulnerabilities (28.07.2014)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород