Computer Security
[EN] securityvulns.ru no-pyccku


Mozilla Firefox / Thunderbird / Seamonkey multiple security vulnerabilities
Published:01.05.2014
Source:
SecurityVulns ID:13687
Type:client
Threat Level:
8/10
Description:Protection bypass, memory corruptions, ceritficate spoofing, privilege escalation, crossite scripting.
Affected:MOZILLA : Firefox 28.0
 MOZILLA : Seamonkey 2.25
 MOZILLA : Thunderbird 24.4
 MOZILLA : Firefox ESR 24.4
CVE:CVE-2014-1532 (Use-after-free vulnerability in the nsHostResolver::ConditionallyRefreshRecord function in libxul.so in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to host resolution.)
 CVE-2014-1531 (Use-after-free vulnerability in the nsGenericHTMLElement::GetWidthHeightForImage function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving an imgLoader object that is not properly handled during an image-resize operation.)
 CVE-2014-1530 (The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.)
 CVE-2014-1529 (The Web Notification API in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to bypass intended source-component restrictions and execute arbitrary JavaScript code in a privileged context via a crafted web page for which Notification.permission is granted.)
 CVE-2014-1528 (The sse2_composite_src_x888_8888 function in Pixman, as used in Cairo in Mozilla Firefox 28.0 and SeaMonkey 2.25 on Windows, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by painting on a CANVAS element.)
 CVE-2014-1527 (Mozilla Firefox before 29.0 on Android allows remote attackers to spoof the address bar via crafted JavaScript code that uses DOM events to prevent the reemergence of the actual address bar after scrolling has taken it off of the screen.)
 CVE-2014-1526 (The XrayWrapper implementation in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that is visited in the debugger, leading to unwrapping operations and calls to DOM methods on the unwrapped objects.)
 CVE-2014-1525 (The mozilla::dom::TextTrack::AddCue function in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 does not properly perform garbage collection for Text Track Manager variables, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) via a crafted VIDEO element in an HTML document.)
 CVE-2014-1524 (The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object.)
 CVE-2014-1523 (Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image.)
 CVE-2014-1522 (The mozilla::dom::OscillatorNodeEngine::ComputeCustom function in the Web Audio subsystem in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read, memory corruption, and application crash) via crafted content.)
 CVE-2014-1519 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2014-1518 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2014-1515 (Mozilla Firefox before 28.0.1 on Android processes a file: URL by copying a local file onto the SD card, which allows attackers to obtain sensitive information from the Firefox profile directory via a crafted application.)
 CVE-2014-1492 (The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.)
Files:Mozilla Foundation Security Advisory 2014-33
 Mozilla Foundation Security Advisory 2014-34
 Mozilla Foundation Security Advisory 2014-35
 Mozilla Foundation Security Advisory 2014-36
 Mozilla Foundation Security Advisory 2014-37
 Mozilla Foundation Security Advisory 2014-38
 Mozilla Foundation Security Advisory 2014-39
 Mozilla Foundation Security Advisory 2014-40
 Mozilla Foundation Security Advisory 2014-41
 Mozilla Foundation Security Advisory 2014-42
 Mozilla Foundation Security Advisory 2014-43
 Mozilla Foundation Security Advisory 2014-44
 Mozilla Foundation Security Advisory 2014-45
 Mozilla Foundation Security Advisory 2014-46
 Mozilla Foundation Security Advisory 2014-47

Debian dpkg directory traversal
Published:01.05.2014
Source:
SecurityVulns ID:13688
Type:local
Threat Level:
4/10
Description:Directory traversal via C-style quoted filenames on some distributions.
Affected:DEBIAN : dpkg 1.17
CVE:CVE-2014-0471 (Directory traversal vulnerability in the unpacking functionality in dpkg before 1.15.9, 1.16.x before 1.16.13, and 1.17.x before 1.17.8 allows remote attackers to write arbitrary files via a crafted source package, related to "C-style filename quoting.")
Original documentdocumentDEBIAN, [SECURITY] [DSA 2915-2] dpkg security update (01.05.2014)

Ubuntu Unity protection bypass
Published:01.05.2014
Source:
SecurityVulns ID:13689
Type:local
Threat Level:
5/10
Description:Screen lock bypass.
Affected:UNITY : Unity 7.2
Original documentdocumentUBUNTU, [USN-2184-2] Unity vulnerabilities (01.05.2014)
 documentUBUNTU, [USN-2184-1] Unity vulnerabilities (01.05.2014)

FreeBSD TCP fragments memory corruptions
Published:01.05.2014
Source:
SecurityVulns ID:13691
Type:remote
Threat Level:
8/10
Description:Memory corruptions on fragmented packets ressembly.
Affected:FREEBSD : FreeBSD 8.4
 FREEBSD : FreeBSD 9.2
 FREEBSD : FreeBSD 10.0
CVE:CVE-2014-3000 (The TCP reassembly function in the inet module in FreeBSD 8.3 before p16, 8.4 before p9, 9.1 before p12, 9.2 before p5, and 10.0 before p2 allows remote attackers to cause a denial of service (undefined memory access and system crash) or possibly read system memory via multiple crafted packets, related to moving a reassemble queue entry to the segment list when the queue is full.)
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-14:08.tcp (01.05.2014)

FreeBSD devfs protection bypass
Published:01.05.2014
Source:
SecurityVulns ID:13692
Type:local
Threat Level:
5/10
Description:Jailed processes are not restricted in devfs access.
Affected:FREEBSD : FreeBSD 10.0
CVE:CVE-2014-3001 (The device file system (aka devfs) in FreeBSD 10.0 before p2 does not load default rulesets when booting, which allows context-dependent attackers to bypass intended restrictions by leveraging a jailed device node process.)
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-14:07.devfs (01.05.2014)

elfutils libdw memory corruption
Published:01.05.2014
Source:
SecurityVulns ID:13693
Type:library
Threat Level:
5/10
Description:Memory corruption on ELF parsing.
Affected:ELFUTILS : elfutils 0.158
CVE:CVE-2014-0172 (Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.)
Original documentdocumentUBUNTU, [USN-2188-1] elfutils vulnerability (01.05.2014)

RSA Access Manager information leakage
Published:01.05.2014
Source:
SecurityVulns ID:13694
Type:local
Threat Level:
6/10
Description:Cleartext passwords may be logged.
Affected:EMC : RSA Access Manager Server 6.2
CVE:CVE-2014-0646 (The runtime WS component in the server in EMC RSA Access Manager 6.1.3 before 6.1.3.39, 6.1.4 before 6.1.4.22, 6.2.0 before 6.2.0.11, and 6.2.1 before 6.2.1.03, when INFO logging is enabled, allows local users to discover cleartext passwords by reading log files.)
Original documentdocumentEMC, ESA-2014-029: RSA® Access Manager Sensitive Information Disclosure Vulnerability (01.05.2014)

OpenSSL race conditions
updated since 01.05.2014
Published:05.05.2014
Source:
SecurityVulns ID:13690
Type:library
Threat Level:
7/10
Description:Race conditions lead to DoS or data injection.
Affected:OPENSSL : OpenSSL 1.0
CVE:CVE-2014-0198 (The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.)
 CVE-2010-5298 (Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.)
Original documentdocumentUBUNTU, [USN-2192-1] OpenSSL vulnerabilities (05.05.2014)
 documentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-14:09.openssl [REVISED] (01.05.2014)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod