Computer Security
[EN] securityvulns.ru no-pyccku


Multiple Mozilla / Firefox / Seamonkey / Thunderbird security vulnerabilities
updated since 27.07.2006
Published:02.08.2006
Source:
SecurityVulns ID:6414
Type:client
Threat Level:
9/10
Description:Multiple vulnerabilities allow unrestricted code execution. Can be used for hidden malware installation.
Affected:MOZILLA : Thunderbird 1.0
 NETSCAPE : Netscape 8.1
 MOZILLA : Firefox 1.5
 MOZILLA : Seamonkey 1.0
 KMELEON : K-Meleon 1.0
 FLOCK : Flock 0.7
CVE:CVE-2006-6956 (Microsoft Internet Explorer allows remote attackers to cause a denial of service (crash) via a web page that contains a large number of nested marquee tags, a related issue to CVE-2006-2723.)
 CVE-2006-6955 (Opera allows remote attackers to cause a denial of service (application crash) via a web page that contains a large number of nested marquee tags, a related issue to CVE-2006-2723.)
 CVE-2006-6954 (Flock beta 1 0.7 allows remote attackers to cause a denial of service (application crash) via a web page that contains a large number of nested marquee tags, a related issue to CVE-2006-2723.)
 CVE-2006-2723 (Unspecified versions of Mozilla Firefox allow remote attackers to cause a denial of service (crash) via a web page that contains a large number of nested marquee tags. NOTE: a followup post indicated that the initial report could not be verified.)
Original documentdocumentJuha-Matti Laurio, Netscape/K-Meleon/Flock JavaScript navigator Vulnerability (02.08.2006)
 documentCERT, US-CERT Technical Cyber Security Alert TA06-208A -- Mozilla Products Contain Multiple Vulnerabilities (28.07.2006)
 documentSECUNIA, [Full-disclosure] Secunia Research: Mozilla Firefox XPCOM Event Handling Memory Corruption (27.07.2006)
 documentUBUNTU, [USN-323-1] mozilla vulnerabilities (27.07.2006)
 documentUBUNTU, [USN-297-3] Thunderbird vulnerabilities (27.07.2006)
 documentSECUNIA, [SA19873] Mozilla Firefox Multiple Vulnerabilities (27.07.2006)
 documentZDI, [Full-disclosure] ZDI-06-025: Mozilla Firefox Javascript navigator Object Vulnerability (27.07.2006)
Files:Firefox <= 1.5.0.4 Javascript navigator Object Code Execution PoC

Microsoft Windows graphics subsystem DoS
Published:02.08.2006
Source:
SecurityVulns ID:6428
Type:library
Threat Level:
6/10
Description:Gdiplus.dll division by zero on .ICO files parsing.
Affected:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
Original documentdocumentMr.Niega_(at)_gmail.com, Gdiplus.dll division by 0 (02.08.2006)
Files:0-day crash poc gdiplus.dll

ISS BlackICE protection bypass
Published:02.08.2006
Source:
SecurityVulns ID:6431
Type:local
Threat Level:
5/10
Description:It's possible to inject fake pamversion.dll into BlackICE service.
Affected:ISS : BlackICE PC Protection 3.6
Original documentdocumentDavid Matousek, ISS BlackICE PC Protection DLL faking of run-time linked libraries Vulnerability (02.08.2006)

Symantec On-Demand Agent / Symantec On-Demand Protection protection bypass
Published:02.08.2006
Source:
SecurityVulns ID:6432
Type:local
Threat Level:
5/10
Description:It's possible to access encrypted data.
Original documentdocumentSYMANTEC, SYM06-013 Symantec On-Demand Protection Encrypted Data Exposure (02.08.2006)

PHP ip2long protection bypass
Published:02.08.2006
Source:
SecurityVulns ID:6433
Type:library
Threat Level:
6/10
Description:Function can return positive result on malformed argument, it can be used to bypass argument validation.
Affected:PHP : PHP 4.3
 PHP : PHP 5.0
Original documentdocumentrgod_(at)_autistici.org, PHP ip2long() function circumvention (02.08.2006)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:02.08.2006
Source:
SecurityVulns ID:6434
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:PHPADSNEW : phpAdsNew 2.0
 ATUTOR : ATutor 1.5
 MYBB : MyBB 1.3
 MYNEWSGROUPS : MyNewsGroups 0.6
 NETIOUS : Netious CMS 0.4
 COPPERMINE : Coppermine Photo Gallery 1.2
 MAMBO : Mambo Gallery Manager 095
 PHPAUCTION : PHPAuction 2.1
 COMEPLAYDYING : Seir Anphin 666 Community Management System
 NEWSLETTER : NewsLetter 3.5
 NEWSREPORTER : newsReporter 1.0
 KNUSPERLEICHT : Guestbook 3.5
 KNUSPERLEICHT : FAQ Script 1.0
 SHOUTBOX : ShoutBox 4.4
 WOWROSTER : WoW Roster 1.5
 JETBOX : Jetbox CMS 2.1
 XSTATICS : X-Statics 1.20
 XSTATICS : X-Protection 1.10
 XPOLL : X-Poll 1.10
 BANEX : Banex 2.21
 INM : Content Management Framework G3
Original documentdocumentStefan Friedli, [Full-disclosure] Content Management Framework "G3" - XSS Vulnerability in Search Function (02.08.2006)
 documentEduardo Vela, [Full-disclosure] X-Statics 1.20 SQL Injection Vulnerability (02.08.2006)
 documentEduardo Vela, [Full-disclosure] X-Protection 1.10 SQL Injection Vulnerability (02.08.2006)
 documentEduardo Vela, [Full-disclosure] X-Poll SQL Injection Vulnerability (02.08.2006)
 documentEduardo Vela, [Full-disclosure] TinyPHPForum Multiple Vulnerabilities (02.08.2006)
 documentEduardo Vela, [Full-disclosure] SQLiteWebAdmin multiple Vulnerabilities (02.08.2006)
 documentEduardo Vela, [Full-disclosure] Banex Multiple Vulnerabilities (02.08.2006)
 documentEduardo Vela, [Full-disclosure] Ajax Chat Multiple Vulnerabilities (02.08.2006)
 documentSECUNIA, [Full-disclosure] Secunia Research: Jetbox Multiple Vulnerabilities (02.08.2006)
 documentAG Spider, WoW Roster <= 1.5.x Remote File Include (hsList.php) (02.08.2006)
 documentbotan_(at)_linuxmail.org, [Kurdish Security # 21] ShoutBox v4.4 Remote Command Execution (02.08.2006)
 documentbotan_(at)_linuxmail.org, [Kurdish Security # 20 ] Quickie Remote Command Execution (02.08.2006)
 documentbotan_(at)_linuxmail.org, [Kurdish Security # 19 ] FileManager Remote Command Execution (02.08.2006)
 documentbotan_(at)_linuxmail.org, [Kurdish Security # 18 ] FAQ Script Remote Command Execution (02.08.2006)
 documentCyber Lords, SQL-Injection in [email protected] (02.08.2006)
 documentbotan_(at)_linuxmail.org, [Kurdish Security # 17 ] GuestBook 3.5 Remote Command Execution (02.08.2006)
 documentbotan_(at)_linuxmail.org, [Kurdish Security # 16 ] newsReporter v1.0 Remote Command Execution (02.08.2006)
 documentphilipp.niedziela_(at)_gmx.de, NewsLetter v3.5 <= (NL_PATH) Remote File Inclusion Exploit (02.08.2006)
 documentphilipp.niedziela_(at)_gmx.de, MyNewsGroups <= 0.6b (myng_root) Remote Inclusion Vulnerability (02.08.2006)
 documentvulnerabilities_(at)_mail.ru, SQL injection Seir Anphin v666 Community Management System (02.08.2006)
 documentphilipp.niedziela_(at)_gmx.de, PHPAuction 2.1 (maybe higher) with phpAdsNew 2.0.5 RFI (02.08.2006)
 documentSaudi Hackrz, com_moskool (admin.moskool.php) Remote File Include Vulnerabilities (02.08.2006)
 documentdr.jr7_(at)_hotmail.com, artlinks Mambo Component <= Remote Include Vulnerability (02.08.2006)
 documentdr.jr7_(at)_hotmail.com, mambatstaff Mambo Component <= Remote Include Vulnerability (02.08.2006)
 documentroozbeh afrasiabi, [KAPDA::#53] MYBB XSS and Dir Traversal in usercp.php (02.08.2006)
 documentA-S-T2006_(at)_hotmail.com, Mambo Gallery Manager v095.r3 Remote File Inclusion Vulnerabilities (02.08.2006)
 documentnewbinaryfile_(at)_gmail.com, XSS vulnerability on AWBS (02.08.2006)
 documentA-S-T2006_(at)_hotmail.com, Coppermine Photo Gallery v1.2.2b-Nuke Remote File Inclusion Vulnerabilities (02.08.2006)
 documentJacek, Netious CMS <= 0.4 SQL Injection and Session Management Vulnerabilities (02.08.2006)
Files:Exploits ATutor <= 1.5.3.1 'links' blind SQL injection / admin credentials disclosure
 TinyPHPForum 3.6 Admin Maker

Open Cubic Player buffer overflow
Published:02.08.2006
Source:
SecurityVulns ID:6435
Type:client
Threat Level:
5/10
Description:Multiple buffer overflows.
Affected:CUBIC : Open Cubic Player 2.6
Original documentdocumentLuigi Auriemma, Multiple vulnerabilities in Open Cubic Player 2.6.0pre6 / 0.1.10_rc5 (02.08.2006)
Files:Exploits Open Cubic Player <= 2.6.0pre6 / 0.1.10_rc5 multiple vulnerabilities

lhaplus buffer overflow
Published:02.08.2006
Source:
SecurityVulns ID:6436
Type:local
Threat Level:
5/10
Description:Buffer overflow on LZH archive header parsing.
Affected:LHAPLUS : Lhaplus 1.52
Original documentdocumentTAN Chew Keong, [vuln.sg] Lhaplus LHA Extended Header Handling Buffer Overflow Vulnerability (02.08.2006)

Sun Grid Engine buffer overflow
Published:02.08.2006
Source:
SecurityVulns ID:6437
Type:remote
Threat Level:
5/10
Affected:SUN : N1 Grid Engine 5.3
 SUN : N1 Grid Engine 6.0
Original documentdocumentSECUNIA, [SA21185] Sun Grid Engine Unspecified Buffer Overflow Vulnerability (02.08.2006)

Safari memory corruption
Published:02.08.2006
Source:
SecurityVulns ID:6438
Type:client
Threat Level:
5/10
Description:Memory corruption in KHTMLParser::popOneBlock().
Affected:APPLE : Safari 2.0
Original documentdocumentSECUNIA, [SA21271] Safari "KHTMLParser::popOneBlock()" Memory Corruption (02.08.2006)

MySQL MERGE tables privilege escalation
Published:02.08.2006
Source:
SecurityVulns ID:6439
Type:local
Threat Level:
4/10
Description:User may retain acces to MERGE table after access to original table is revoked.
Affected:MYSQL : MySQL 4.1
 ORACLE : MySQL 5.0
Original documentdocumentSECUNIA, [SA21259] MySQL MERGE Table Privilege Revoke Bypass (02.08.2006)

Sun Fire T2000 protection bypass
Published:02.08.2006
Source:
SecurityVulns ID:6440
Type:remote
Threat Level:
5/10
Description:Incorrect DSA signature verification.
Original documentdocumentSECUNIA, [SA21279] Sun Fire T2000 Incorrect DSA Signature Verification (02.08.2006)

VMWare ESX Server crossite scripting and password leak
updated since 02.06.2006
Published:02.08.2006
Source:
SecurityVulns ID:6212
Type:remote
Threat Level:
6/10
Description:Management Interface crossite scripting. Additionally, cleartext password is contained in session cookie and server log files.
Affected:VMWARE : VMware ESX Server 2.0
 VMWARE : VMware ESX Server 2.1
 VMWARE : VMware ESX Server 2.5
Original documentdocumentVMWARE, VMSA-2006-0004 Cross site scripting vulnerability and other fixes (02.08.2006)
 documentadvisories, Corsaire Security Advisory - VMware ESX Server Password Disclosure in Log issue (02.08.2006)
 documentadvisories, Corsaire Security Advisory - VMware ESX Server Password Disclosure in Cookie issue (02.08.2006)
 documentadvisories, Corsaire Security Advisory - VMware ESX Server Password Cross Site Request Forgery issue (02.08.2006)
 documentVMWARE, VMSA-2006-0002 - VMware Server sensitive information lifetime issue (03.06.2006)
 documentadvisories, Corsaire Security Advisory - VMware ESX Server Cross Site Scripting issue (02.06.2006)

Barracuda Spam Firewall multiple security vulnerabilities
updated since 02.08.2006
Published:09.08.2006
Source:
SecurityVulns ID:6430
Type:remote
Threat Level:
7/10
Description:Login.pm Web-interface hardcoded guest account password, /cgi-bin/preview_email.cgi directory traversal.
Affected:BARRACUDA : Barracuda Spam Firewall 3.3
Original documentdocumentMILW0RM, Barracuda Arbitrary File Disclosure + Command Execution (09.08.2006)
 documentMatthew Hall, [Full-disclosure] Barracuda Spam Firewall: Administrator Level Remote Command Execution [ID-20060804-01] (04.08.2006)
 documentgssincla_(at)_nnlsoftware.com, Barracuda Vulnerability: Arbitrary File Disclosure [NNL-20060801-02] (02.08.2006)
 documentgssincla_(at)_nnlsoftware.com, Barracuda Vulnerability: Hardcoded Password [NNL-20060801-01] (02.08.2006)

Multiple libtiff library vulnerabilities
updated since 02.08.2006
Published:31.08.2006
Source:
SecurityVulns ID:6429
Type:library
Threat Level:
8/10
Description:Multiple buffer overflows on TIFF images parsing, endless loop, integer overflows, memory corruption.
Affected:KDE : KDE 3.2
 LIBTIFF : libtiff 3.6
 LIBTIFF : libtiff 3.8
 SONY : PlayStation Portable
Original documentdocumentSECUNIA, [SA21672] Sony PSP TIFF Image Viewing Code Execution Vulnerability (31.08.2006)
 documentMANDRIVA, [ MDKSA-2006:137 ] - Updated libtiff packages fix multiple vulnerabilities (02.08.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod