Информационная безопасность
[RU] switch to English


DoS через WebDav в Mac OS X
Опубликовано:29 июля 2010 г.
Источник:
SecurityVulns ID:11022
Тип:локальная
Уровень опасности:
4/10
Описание:Возможно вызвать отказ ядра через функцию webdav_mount().
Затронутые продукты:APPLE : MacOS X 10.6
CVE:CVE-2010-1794 (The webdav_mount function in webdav_vfsops.c in the WebDAV kernel extension (aka webdav_fs.kext) for Mac OS X 10.6 allows local users to cause a denial of service (panic) via a mount request with a large integer in the pa_socket_namelen field.)
Оригинальный текстdocumentDan Rosenberg, Mac OS X WebDAV kernel extension local denial-of-service (29.07.2010)

Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)
Опубликовано:29 июля 2010 г.
Источник:
SecurityVulns ID:11024
Тип:удаленная
Уровень опасности:
5/10
Описание:Инъекции PHP, инъекции SQL, обратный путь в каталогах, межсайтовый скриптинг, модификация файлов, утечка информации и т.д.
Затронутые продукты:JIRA : Jira 4.0
 JOOMLA : PBBooking 1.0
Оригинальный текстdocumentadvisories_(at)_intern0t.net, Jira Enterprise 4.0.1 - Multiple Low Risk Vulnerabilities (29.07.2010)
 documentSalvatore "drosophila" Fresta, PBBooking 1.0.4_3 Joomla Component Multiple Blind SQL Injection (29.07.2010)

Переполнение буфера в QQPlayer
Опубликовано:29 июля 2010 г.
Источник:
SecurityVulns ID:11021
Тип:локальная
Уровень опасности:
5/10
Описание:Переполнение буфера при разборе файлов .smi
Затронутые продукты:QQ : QQPlayer 2.3
Оригинальный текстdocumentlilf, QQplayer smi File Processing Buffer Overflow Vulnerability (29.07.2010)
Файлы:QQPlayer smi File Buffer Overflow Exploit

Многочисленные уязвимости безопасности в Autonomy KeyView
дополнено с 29 июля 2010 г.
Опубликовано:26 августа 2010 г.
Источник:
SecurityVulns ID:11023
Тип:библиотека
Уровень опасности:
5/10
Описание:Переполнение буфера, целочисленные переполнения, повреждения памяти.
Затронутые продукты:AUTONOMY : KeyView 10.4
 AUTONOMY : KeyView 10.9
CVE:CVE-2010-1525 (Integer underflow in the SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted size for an unspecified record type, which triggers a heap-based buffer overflow.)
 CVE-2010-1524 (The SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via unspecified vectors related to allocation of an array of pointers and "string indexing," which triggers memory corruption.)
 CVE-2010-0135 (Heap-based buffer overflow in the WordPerfect 5.x reader (wosr.dll), as used in Autonomy KeyView 10.4 and 10.9 and possibly other products, allows remote attackers to execute arbitrary code via unspecified vectors related to "data blocks.")
 CVE-2010-0134 (Integer signedness error in rtfsr.dll in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via a crafted \ls keyword in a list override table entry in an RTF file, which triggers a buffer overflow.)
 CVE-2010-0133 (Multiple stack-based buffer overflows in the SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allow remote attackers to execute arbitrary code via unspecified vectors related to "certain records.")
 CVE-2010-0131 (Stack-based buffer overflow in the SpreadSheet Lotus 123 reader (wkssr.dll), as used in Autonomy KeyView 10.4 and 10.9, Symantec Mail Security, and possibly other products, allows remote attackers to execute arbitrary code via unspecified vectors related to floating point conversion in unknown record types.)
 CVE-2010-0126 (Heap-based buffer overflow in an unspecified library in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via a crafted compound file, as demonstrated using a Quattro Pro file, which is not properly handled by the Quattro speed reader (qpssr.dll).)
Оригинальный текстdocumentZDI, ZDI-10-157: IBM Lotus Notes Autonomy KeyView Office Shape Parsing Remote Code Execution Vulnerability (26.08.2010)
 documentZDI, ZDI-10-159: IBM Lotus Notes Autonomy KeyView WK3 Parsing Remote Code Execution Vulnerability (25.08.2010)
 documentZDI, ZDI-10-158: IBM Lotus Notes Autonomy KeyView WK3 Parsing Remote Code Execution Vulnerability (25.08.2010)
 documentZDI, ZDI-10-156: IBM Lotus Notes Autonomy KeyView Word Parsing Remote Code Execution Vulnerability (25.08.2010)
 documentSECUNIA, Secunia Research: Autonomy KeyView wkssr.dll Record Parsing Buffer Overflows (29.07.2010)
 documentSECUNIA, Secunia Research: Autonomy KeyView wkssr.dll String Indexing Vulnerability (29.07.2010)
 documentSECUNIA, Secunia Research: Autonomy KeyView wkssr.dll Integer Underflow Vulnerability (29.07.2010)
 documentSECUNIA, Secunia Research: Autonomy KeyView wosr.dll Data Block Parsing Buffer Overflow (29.07.2010)
 documentSECUNIA, Secunia Research: Autonomy KeyView rtfsr.dll RTF Parsing Signedness Error (29.07.2010)
 documentSECUNIA, Secunia Research: Autonomy KeyView wkssr.dll Floating Point Conversion Buffer Overflow (29.07.2010)
 documentSECUNIA, Secunia Research: Autonomy KeyView Compound File Parsing Buffer Overflow (29.07.2010)

Выполнение кода через Alert Management Service в Symantec Antivirus Corporate Edition
дополнено с 29 июля 2010 г.
Опубликовано:31 января 2011 г.
Источник:
SecurityVulns ID:11020
Тип:удаленная
Уровень опасности:
7/10
Описание:Возможно выполнение команд без авторизации через службу на порту TCP/38292.
Затронутые продукты:SYMANTEC : Symantec Antivirus Corporate Edition 10.1
 SYMANTEC : Symantec System Center 10.1
CVE:CVE-2010-3268 (The GetStringAMSHandler function in prgxhndl.dll in hndlrsvc.exe in the Intel Alert Handler service (aka Symantec Intel Handler service) in Intel Alert Management System (AMS), as used in Symantec Antivirus Corporate Edition 10.1.4.4010 on Windows 2000 SP4 and Symantec Endpoint Protection before 11.x, does not properly validate the CommandLine field of an AMS request, which allows remote attackers to cause a denial of service (application crash) via a crafted request.)
 CVE-2010-0111 (HDNLRSVC.EXE in the Intel Alert Handler service (aka Symantec Intel Handler service) in Intel Alert Management System (aka AMS or AMS2), as used in Symantec AntiVirus Corporate Edition (SAVCE) 10.x before 10.1 MR10, Symantec System Center (SSC) 10.x, and Symantec Quarantine Server 3.5 and 3.6, allows remote attackers to execute arbitrary programs by sending msgsys.exe a UNC share pathname, which is used directly in a CreateProcessA (aka CreateProcess) call.)
 CVE-2010-0110 (Multiple stack-based buffer overflows in Intel Alert Management System (aka AMS or AMS2), as used in Symantec AntiVirus Corporate Edition (SAVCE) 10.x before 10.1 MR10, Symantec System Center (SSC) 10.x, and Symantec Quarantine Server 3.5 and 3.6, allow remote attackers to execute arbitrary code via (1) a long string to msgsys.exe, related to the AMSSendAlertAct function in AMSLIB.dll in the Intel Alert Handler service (aka Symantec Intel Handler service); a long (2) modem string or (3) PIN number to msgsys.exe, related to pagehndl.dll in the Intel Alert Handler service; or (4) a message to msgsys.exe, related to iao.exe in the Intel Alert Originator service.)
Оригинальный текстdocumentnoreply_(at)_telus.com, TELUS Security Labs VR - Symantec Antivirus Intel Alert Handler Service Denial of Service (31.01.2011)
 documentnoreply_(at)_telus.com, TELUS Security Labs VR - Symantec Alert Management System HNDLRSVC Arbitrary Command Execution (31.01.2011)
 documentCORE SECURITY TECHNOLOGIES ADVISORIES, [CORE-2010-0728] Symantec Intel Handler Service Remote Denial-of-Service (15.12.2010)
 documentspider_(at)_foofus.net, Foofus.net Security Advisory: Symantec AMS Intel Alert Handler service Design Flaw (29.07.2010)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород