Computer Security
[EN] securityvulns.ru no-pyccku


HP-UX System Administration Manager unauthorized access
Published:01.08.2008
Source:
SecurityVulns ID:9191
Type:remote
Threat Level:
6/10
Affected:HP : HP-UX 11.11
 HP : HP-UX 11.23
CVE:CVE-2008-1662
Original documentdocumentHP, [security bulletin] HPSBUX02286 SSRT071466 rev.1 - HP-UX Running System Administration Manager (SAM), Unintended Remote Access (01.08.2008)

CA ARCserve Backup for Laptops and Desktops buffer overflow
Published:01.08.2008
Source:
SecurityVulns ID:9192
Type:remote
Threat Level:
6/10
Description:LGServer server process buffer overflow.
Affected:CA : ARCserve Backup 11.1
 CA : ARCserve Backup 11.5
 CA : CA Desktop Management Suite 11.2
 CA : CA Protection Suites 2
 CA : ARCserve Backup 11.0
 CA : CA Desktop Management Suite 11.1
 CA : CA Protection Suites 3.0
 CA : CA Protection Suites 3.1
CVE:CVE-2008-3175 (Integer underflow in rxRPC.dll in the LGServer service in the server in CA ARCserve Backup for Laptops and Desktops 11.0 through 11.5 allows remote attackers to execute arbitrary code or cause a denial of service via a crafted message that triggers a buffer overflow.)
Original documentdocumentCA, CA ARCserve Backup for Laptops and Desktops Server LGServer Service Vulnerability (01.08.2008)

httrack buffer overflow
Published:01.08.2008
Source:
SecurityVulns ID:9194
Type:client
Threat Level:
5/10
Description:Buffer overflow on oversized URL.
Affected:HTTRACK : httrack 3.42
Original documentdocumentDEBIAN, [SECURITY] [DSA 1626-1] New httrack packages fix arbitrary code execution (01.08.2008)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:01.08.2008
Source:
SecurityVulns ID:9183
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:PLIGG : Pligg 9.9
 CSPHONEBOOK : csphonebook 1.02
 ATMAIL : Atmail 5.41
Original documentdocumentfree_julie_amero_(at)_hush.com, Atmail Remote Authentication Bypass, Full DB Compromise (01.08.2008)
 documentGhost hacker, [~] Greetz : Me93fg & Mr.SaFa7 (01.08.2008)
 documentJeiAr, Pligg <= 9.9.0 Multiple Vulnerabilities (01.08.2008)
 documentirancrash_(at)_gmail.com, DEV WMS Multiple Vulnerabilities (01.08.2008)

libxslt multiple security vulnerabilities
Published:01.08.2008
Source:
SecurityVulns ID:9185
Type:library
Threat Level:
6/10
Description:Heap buffer overflow, invalid digital signature check.
Affected:LIBXSLT : libxslt 1.1
CVE:CVE-2008-2935 (Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as "an argument in the XSL input.")
Original documentdocumentAndrea Barisani, [oCERT-2008-009] libxslt heap overflow (01.08.2008)

Blue Coat K9 Web Protection buffer overflow
Published:01.08.2008
Source:
SecurityVulns ID:9186
Type:client
Threat Level:
5/10
Description:Buffer overflow on Referer header parsing. Buffer overflow on control server response parsing.
Affected:BLUECOAT : K9 Web Protection 3.2
Original documentdocumentSECUNIA, Secunia Research: Blue Coat K9 Web Protection Response Handling Buffer Overflows (01.08.2008)
 documentSECUNIA, Secunia Research: Blue Coat K9 Web Protection "Referer" Header Buffer Overflow (01.08.2008)

pan newsreader buffer overflow
Published:01.08.2008
Source:
SecurityVulns ID:9189
Type:client
Threat Level:
5/10
Description:Buffer overflow on .nzb files parsing.
Affected:GNOME : pan 0.132
Original documentdocumentGENTOO, [ GLSA 200807-15 ] Pan: User-assisted execution of arbitrary code (01.08.2008)

Citrix Metaframe Privilege escalation
Published:01.08.2008
Source:
SecurityVulns ID:9184
Type:local
Threat Level:
3/10
Description:Autorun item path is not fully specified.
Affected:CITRIX : MetaFrame Presentation Server 3.0
 CITRIX : MetaFrame XP 1.0
Original documentdocumentWendel Guglielmetti Henrique, Citrix MetaFrame Privilege Escalation (01.08.2008)

SAP MaxDB privilege escalation
Published:01.08.2008
Source:
SecurityVulns ID:9188
Type:local
Threat Level:
5/10
Description:It's possible to obtain sdb:sdba privileges via dmbsrv process because of untrusted path usage.
Affected:SAP : MaxDB 7.5
 SAP : MaxDB 7.6
Original documentdocumentIDEFENSE, iDefense Security Advisory 07.30.08: SAP MaxDB dbmsrv Untrusted Execution Path Vulnerability (01.08.2008)

newsx buffer overflow
Published:01.08.2008
Source:
SecurityVulns ID:9187
Type:remote
Threat Level:
5/10
Description:Buffer overflow on the article with large number of lines beginning with period.
Affected:NEWSX : newsx 1.6
CVE:CVE-2008-3252 (Stack-based buffer overflow in the read_article function in getarticle.c in newsx 1.6 allows remote attackers to execute arbitrary code via a news article containing a large number of lines starting with a period.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 1622-1] New newsx packages fix arbitrary code execution (01.08.2008)

Python multiple security vulnerabilities
Published:01.08.2008
Source:
SecurityVulns ID:9190
Type:library
Threat Level:
6/10
Description:Integer overflows, buffer overflows, cryptographic problems in multiple functions.
Affected:PYTHON : python 2.4
 PYTHON : python 2.5
CVE:CVE-2008-3144 (Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations. NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.)
 CVE-2008-3143 (Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by "checks for integer overflows, contributed by Google.")
 CVE-2008-3142 (Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.)
 CVE-2008-2316 (Integer overflow in _hashopenssl.c in the hashlib module in Python 2.5.2 and earlier might allow context-dependent attackers to defeat cryptographic digests, related to "partial hashlib hashing of data exceeding 4GB.")
 CVE-2008-2315 (Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.)
Original documentdocumentGENTOO, [ GLSA 200807-16 ] Python: Multiple vulnerabilities (01.08.2008)

Apache Tomcat multiple security vulnerabilities
updated since 01.08.2008
Published:28.01.2009
Source:
SecurityVulns ID:9193
Type:remote
Threat Level:
6/10
Description:Crossite scripting, information leak.
Affected:APACHE : Tomcat 4.1
 APACHE : Tomcat 5.5
 APACHE : Tomcat 6.0
 CA : Cohesion Application Configuration Manager 4.5
CVE:CVE-2008-2938 (Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370. NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.)
 CVE-2008-2370 (Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.)
 CVE-2008-1232 (Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.)
Original documentdocumentCA, CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1) (28.01.2009)
 documentWilliam A. Rowe, Jr., Java Runtime UTF-8 Decoder Smuggling Vector (11.01.2009)
 documentAPACHE, [SECURITY] CVE-2008-2938 - Apache Tomcat information disclosure vulnerability - Update 2 (19.12.2008)
 documentAPACHE, [SECURITY] CVE-2008-2938 - Apache Tomcat information disclosure vulnerability - Updated (10.09.2008)
 documentemericboit_(at)_yahoo.fr, Apache Tomcat <= 6.0.18 UTF8 Directory Traversal Vulnerability (12.08.2008)
 documentAPACHE, [CVE-2008-1232] Apache Tomcat XSS vulnerability (01.08.2008)
 documentAPACHE, [CVE-2008-2370] Apache Tomcat information disclosure vulnerability (01.08.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod