Информационная безопасность
[RU] switch to English


DoS против беспроводных точек доступа Aruba
Опубликовано:28 октября 2009 г.
Источник:
SecurityVulns ID:10352
Тип:удаленная
Уровень опасности:
5/10
Описание:Отказ при разборе некорректного фрейма 802.11 association request.
Затронутые продукты:ARUBANETWORKS : ArubaOS 3.1
 ARUBANETWORKS : ArubaOS 3.3
 ARUBANETWORKS : ArubaOS 3.4
Оригинальный текстdocumentARUBANETWORKS, Aruba Networks Advisory ID: AID-102609 - Malformed 802.11 Association Request frame causes Denial of Service condition on an Access Point (28.10.2009)

Обход ограничений в Asterisk
Опубликовано:28 октября 2009 г.
Источник:
SecurityVulns ID:10354
Тип:удаленная
Уровень опасности:
5/10
Описание:Ограничения ACL не распространялись на сообщения SIP INVITE.
Затронутые продукты:ASTERISK : Asterisk 1.2
 DIGIUM : Asterisk 1.4
 ASTERISK : Asterisk 1.6
Оригинальный текстdocumentASTERISK, AST-2009-007: ACL not respected on SIP INVITE (28.10.2009)

Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)
Опубликовано:28 октября 2009 г.
Источник:
SecurityVulns ID:10355
Тип:удаленная
Уровень опасности:
5/10
Описание:Инъекции PHP, инъекции SQL, обратный путь в каталогах, межсайтовый скриптинг, модификация файлов, утечка информации и т.д.
Затронутые продукты:PHP168 : PHP168 6.0
Оригинальный текстdocumentinfo_(at)_securitylab.ir, PHP168 v6.0 rc (28.10.2009)

Слабые разрешения в Rising Antivirus / Firewall
Опубликовано:28 октября 2009 г.
Источник:
SecurityVulns ID:10353
Тип:локальная
Уровень опасности:
5/10
Описание:Слабые разрешения на исполняемые файлы программы и службы.
Затронутые продукты:RISING : Rising AntiVirus 2009
 RISING : Rising Internet Security 2009
 RISING : Rising Personal Firewall 2009
Оригинальный текстdocumentProtek Research Lab, {PRL} Rising Antivirus 2009 Privilege Escalation (28.10.2009)
 documentProtek Research Lab, {PRL} Rising Firewall 2009 Privilege Escalation (28.10.2009)
 documentShineShadow, Rising Multiple Products Local Privilege Escalation Vulnerability (28.10.2009)

Многочисленные уязвимости безопасности в KDE
Опубликовано:28 октября 2009 г.
Источник:
SecurityVulns ID:10351
Тип:клиент
Уровень опасности:
5/10
Описание:Скриптинг между приложениями в Ark, хэндлерах протоколов, KMail.
Затронутые продукты:KDE : KDE 4.3
Оригинальный текстdocumentAndrea Barisani, [oCERT-2009-015] KDE multiple issues (28.10.2009)

Многочисленные уязвимости безопасности в cups / poppler / xpdf / Adobe Reader
дополнено с 20 октября 2009 г.
Опубликовано:28 октября 2009 г.
Источник:
SecurityVulns ID:10333
Тип:библиотека
Уровень опасности:
7/10
Описание:Целочисленные переполнения, кратковременные условия.
Затронутые продукты:CUPS : cups 1.1
 CUPS : cups 1.3
 XPDF : xpdf 3.02
 POPPLER : poppler 0.10
CVE:CVE-2009-3609 (Integer overflow in the ImageStream::ImageStream function in Stream.cc in Xpdf before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, and CUPS pdftops, allows remote attackers to cause a denial of service (application crash) via a crafted PDF document that triggers a NULL pointer dereference or buffer over-read.)
 CVE-2009-3608 (Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.)
 CVE-2009-3606 (Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.)
 CVE-2009-3604 (The Splash::drawImage function in Splash.cc in Xpdf 2.x and 3.x before 3.02pl4, and Poppler 0.x, as used in GPdf and kdegraphics KPDF, does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document that triggers a NULL pointer dereference or a heap-based buffer overflow.)
 CVE-2009-3603 (Integer overflow in the SplashBitmap::SplashBitmap function in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1 might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1188.)
Оригинальный текстdocumentadam_(at)_hispasec.com, Adobe Acrobat Reader up to 9.1.1 ONLY Linux integer overflow to heap overflow. (28.10.2009)
 documentWill Drewry, [oCERT-2009-016] Poppler, xpdf integer overflow during heap allocation (22.10.2009)
 documentUBUNTU, [USN-850-1] poppler vulnerabilities (22.10.2009)
 documentMANDRIVA, [ MDVSA-2009:283 ] cups (20.10.2009)

Многочисленные уязвимости в Mozilla Firefox / Seamonkey
дополнено с 28 октября 2009 г.
Опубликовано:5 ноября 2009 г.
Источник:
SecurityVulns ID:10356
Тип:удаленная
Уровень опасности:
8/10
Описание:Переполнения буфера, повышение привилегий, утечка информации, межсайтовый скриптинг.
Затронутые продукты:MOZILLA : SeaMonkey 2.0
 MOZILLA : Firefox 3.0
 MOZILLA : Firefox 3.5
CVE:CVE-2009-3383 (Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2009-3382 (layout/base/nsCSSFrameConstructor.cpp in the browser engine in Mozilla Firefox 3.0.x before 3.0.15 does not properly handle first-letter frames, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.)
 CVE-2009-3381 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2009-3380 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2009-3379 (Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. NOTE: this might overlap CVE-2009-2663.)
 CVE-2009-3378 (The oggplay_data_handle_theora_frame function in media/liboggplay/src/liboggplay/oggplay_data.c in liboggplay, as used in Mozilla Firefox 3.5.x before 3.5.4, attempts to reuse an earlier frame data structure upon encountering a decoding error for the first frame, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via a crafted .ogg video file.)
 CVE-2009-3377 (Multiple unspecified vulnerabilities in liboggz before cf5feeaab69b05e24, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2009-3376 (Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, does not properly handle a right-to-left override (aka RLO or U+202E) Unicode character in a download filename, which allows remote attackers to spoof file extensions via a crafted filename, as demonstrated by displaying a non-executable extension for an executable file.)
 CVE-2009-3375 (content/html/document/src/nsHTMLDocument.cpp in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allows user-assisted remote attackers to bypass the Same Origin Policy and read an arbitrary content selection via the document.getSelection function.)
 CVE-2009-3374 (The XPCVariant::VariantDataToJS function in the XPCOM implementation in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 does not enforce intended restrictions on interaction between chrome privileged code and objects obtained from remote web sites, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via unspecified method calls, related to "doubly-wrapped objects.")
 CVE-2009-3373 (Heap-based buffer overflow in the GIF image parser in Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via unspecified vectors.)
 CVE-2009-3372 (Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via a crafted regular expression in a Proxy Auto-configuration (PAC) file.)
 CVE-2009-3371 (Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by creating JavaScript web-workers recursively.)
 CVE-2009-3370 (Mozilla Firefox before 3.0.15, and 3.5.x before 3.5.4, allows remote attackers to read form history by forging mouse and keyboard events that leverage the auto-fill feature to populate form fields, in an attacker-readable form, with history entries.)
 CVE-2009-3274 (Mozilla Firefox 3.6a1, 3.5.2, and earlier 2.x and 3.x versions on Linux uses a predictable /tmp pathname for files selected from the Downloads window, which allows local users to replace an arbitrary downloaded file by placing a file in a /tmp location before the download occurs, possibly related to the Archive Manager component. NOTE: some of these details are obtained from third party information.)
 CVE-2009-1563 (** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2009-0689. Reason: This candidate is a duplicate of CVE-2009-0689. Certain codebase relationships were not originally clear. Notes: All CVE users should reference CVE-2009-0689 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.)
 CVE-2009-0689 (Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.)
Оригинальный текстdocumentdisclosure_(at)_contextis.co.uk, Context IS Advisory - Autocomplete Data Theft in Mozilla Firefox (05.11.2009)
 documentIDEFENSE, iDefense Security Advisory 10.28.09: Mozilla Firefox GIF Color Map Parsing Buffer Overflow Vulnerability (29.10.2009)
 documentSECUNIA, Secunia Research: Mozilla Firefox Floating Point Memory Allocation Vulnerability (28.10.2009)
 documentJeremy Brown, Mozilla Firefox 3.5.3 Local Download Manager Exploit (28.10.2009)
 documentMOZILLA, Mozilla Foundation Security Advisory 2009-64 (28.10.2009)
 documentMOZILLA, Mozilla Foundation Security Advisory 2009-63 (28.10.2009)
 documentMOZILLA, Mozilla Foundation Security Advisory 2009-62 (28.10.2009)
 documentMOZILLA, Mozilla Foundation Security Advisory 2009-61 (28.10.2009)
 documentMOZILLA, Mozilla Foundation Security Advisory 2009-59 (28.10.2009)
 documentMOZILLA, You are here: Security Center > Mozilla Foundation Security Advisories > MFSA 2009-57 Mozilla Foundation Security Advisory 2009-57 (28.10.2009)
 documentMOZILLA, Mozilla Foundation Security Advisory 2009-56 (28.10.2009)
 documentMOZILLA, Mozilla Foundation Security Advisory 2009-55 (28.10.2009)
 documentMOZILLA, Mozilla Foundation Security Advisory 2009-54 (28.10.2009)
 documentMOZILLA, Mozilla Foundation Security Advisory 2009-53 (28.10.2009)
 documentMOZILLA, Mozilla Foundation Security Advisory 2009-52 (28.10.2009)
Файлы:Mozilla Firefox 3.5.3 Local Download Manager Exploit

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород