Computer Security
[EN] securityvulns.ru no-pyccku


mutt SSL certificate validation vulnerability
Published:01.10.2011
Source:
SecurityVulns ID:11935
Type:m-i-t-m
Threat Level:
4/10
Description:SMTP and POP3 certificate hostname is not validated correctly.
CVE:CVE-2011-1429 (Mutt does not verify that the smtps server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL SMTP server via an arbitrary certificate, a different vulnerability than CVE-2009-3766.)
Original documentdocumentUBUNTU, [USN-1221-1] Mutt vulnerability (01.10.2011)

Mozilla Firefox / Thunderbird / Seamonkey multiple security vulnerabilities
Published:01.10.2011
Source:
SecurityVulns ID:11929
Type:remote
Threat Level:
9/10
Description:Multiple memory corruptions, crossite scripting, code executions, etc
Affected:MOZILLA : Firefox 3.6
 MOZILLA : Thunderbird 6.0
 MOZILLA : Firefox 6.0
 MOZILLA : SeaMonkey 2.3
CVE:CVE-2011-3232 (YARR, as used in Mozilla Firefox before 7.0, Thunderbird before 7.0, and SeaMonkey before 2.4, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript.)
 CVE-2011-3005 (Use-after-free vulnerability in Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OGG headers in a .ogg file.)
 CVE-2011-3004 (The JSSubScriptLoader in Mozilla Firefox 4.x through 6 and SeaMonkey before 2.4 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior.)
 CVE-2011-3003 (Mozilla Firefox before 7.0 and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unspecified WebGL test case that triggers a memory-allocation error and a resulting out-of-bounds write operation.)
 CVE-2011-3002 (Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 7.0 and SeaMonkey before 2.4, does not validate the return value of a GrowAtomTable function call, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a memory-allocation error and a resulting buffer overflow.)
 CVE-2011-3001 (Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent manual add-on installation in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that triggers an unspecified internal error.)
 CVE-2011-3000 (Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not properly handle HTTP responses that contain multiple Location, Content-Length, or Content-Disposition headers, which makes it easier for remote attackers to conduct HTTP response splitting attacks via crafted header values.)
 CVE-2011-2999 (Mozilla Firefox before 3.6.23 and 4.x through 5, Thunderbird before 6.0, and SeaMonkey before 2.3 do not properly handle "location" as the name of a frame, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, a different vulnerability than CVE-2010-0170.)
 CVE-2011-2998 (Integer underflow in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via JavaScript code containing a large RegExp expression.)
 CVE-2011-2997 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2011-2996 (Unspecified vulnerability in the plugin API in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2011-2995 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2011-2372 (Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent the starting of a download in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site.)
Original documentdocumentMOZILLA, Mozilla Foundation Security Advisory 2011-45 (01.10.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-44 (01.10.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-43 (01.10.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-42 (01.10.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-41 (01.10.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-40 (01.10.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-39 (01.10.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-38 (01.10.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-37 (01.10.2011)
 documentMOZILLA, Mozilla Foundation Security Advisory 2011-36 (01.10.2011)

Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:01.10.2011
Source:
SecurityVulns ID:11930
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:ADOBE : ColdFusion 9.0
 IMPRESSPAGES : ImpressPages CMS 1.0
 OPENENGINE : openEngine 2.0
 JOOMLA : Joomla 1.7
 TRAQ : Traq 2.2
 ESS : European Security Services GPS 1.0
 BITWEAVER : Bitweaver 2.8
Original documentdocument[email protected], NGS00109 Patch Notification: ImpressPages CMS Remote code execution (01.10.2011)
 documentsschurtz_(at)_t-online.de, openEngine 2.0 'id' Blind SQL Injection vulnerability (01.10.2011)
 documentsschurtz_(at)_t-online.de, Bitweaver 2.8.1 Multiple Cross-site Scripting Vulnerabilities (01.10.2011)
 documentesearch_(at)_vulnerability-lab.com, European Security Services GPS v1.0 - Multiple Vulnerabilities (01.10.2011)
 documentYGN Ethical Hacker Group, Multiple vulnerabilities in Traq (01.10.2011)
 documentYGN Ethical Hacker Group, Joomla! 1.7.0 | Multiple Cross Site Scripting (XSS) Vulnerabilities (01.10.2011)
 documentMustLive, XSS и FPD уязвимости в Adobe ColdFusion (01.10.2011)

Barracuda Backup multiple security vulnerabilities
Published:01.10.2011
Source:
SecurityVulns ID:11931
Type:remote
Threat Level:
5/10
Description:Authentication bypass, crossite scripting.
Affected:BARRACUDANETWORK : Barracuda Backup 2.0
Original documentdocumentVulnerability Lab, Barracuda Backup v2.0 - Multiple Web Vulnerabilities (01.10.2011)

Wireshark multiple security vulnerabilities
Published:01.10.2011
Source:
SecurityVulns ID:11932
Type:remote
Threat Level:
5/10
Description:DoS on different protocols dissectors, unsafe dynamic library loading.
Affected:WIRESHARK : Wireshark 1.6
CVE:CVE-2011-3484 (The unxorFrame function in epan/dissectors/packet-opensafety.c in the OpenSafety dissector in Wireshark 1.6.x before 1.6.2 does not properly validate a certain frame size, which allows remote attackers to cause a denial of service (loop and application crash) via a malformed packet.)
 CVE-2011-3483 (Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a "buffer exception handling vulnerability.")
 CVE-2011-3482 (The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.2 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.)
 CVE-2011-3360 (Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory.)
Original documentdocumentMANDRIVA, [ MDVSA-2011:138 ] wireshark (01.10.2011)

NCSS memory corruption
Published:01.10.2011
Source:
SecurityVulns ID:11933
Type:local
Threat Level:
3/10
Description:Memory corruption on S0 files parsing.
Affected:NCSS : NCSS 07.1
Original documentdocumentLuigi Auriemma, Arbitrary memory corruption in NCSS 07.1.21 (01.10.2011)

Puppet multiple security vulnerabilities
updated since 01.10.2011
Published:27.11.2011
Source:
SecurityVulns ID:11934
Type:local
Threat Level:
5/10
Description:Multiple file overwrite vulnerabilities, certificates spooging.
Affected:PUPPET : Puppet 2.6
CVE:CVE-2011-3872 (Puppet 2.6.x before 2.6.12 and 2.7.x before 2.7.6, and Puppet Enterprise (PE) Users 1.0, 1.1, and 1.2 before 1.2.4, when signing an agent certificate, adds the Puppet master's certdnsnames values to the X.509 Subject Alternative Name field of the certificate, which allows remote attackers to spoof a Puppet master via a man-in-the-middle (MITM) attack against an agent that uses an alternate DNS name for the master, aka "AltNames Vulnerability.")
 CVE-2011-3871 (Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.)
 CVE-2011-3870 (Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to modify the permissions of arbitrary files via a symlink attack on the SSH authorized_keys file.)
 CVE-2011-3869 (Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to overwrite arbitrary files via a symlink attack on the .k5login file.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2352-1] puppet security update (27.11.2011)
 documentUBUNTU, [USN-1223-1] Puppet vulnerabilities (01.10.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod