Computer Security
[EN] securityvulns.ru no-pyccku


Cisco 10000 routers DoS
Published:02.10.2011
Source:
SecurityVulns ID:11937
Type:remote
Threat Level:
7/10
Description:Crash on ICMP packets parsing.
Affected:CISCO : Cisco 10000
CVE:CVE-2011-3270 (Unspecified vulnerability in Cisco IOS 12.2SB before 12.2(33)SB10 and 15.0S before 15.0(1)S3a on Cisco 10000 series routers allows remote attackers to cause a denial of service (device reload) via a sequence of crafted ICMP packets, aka Bug ID CSCtk62453.)
Original documentdocumentCISCO, Cisco Security Advisory: Cisco 10000 Series Denial of Service Vulnerability (02.10.2011)

Cisco IOS multiple security vulnerabilities
Published:02.10.2011
Source:
SecurityVulns ID:11936
Type:remote
Threat Level:
9/10
Description:IP SLA DoS, smart install (TCP/4786) code execution, memory leaks in IPS and firewall features, multiple SIP vulnerailibites, multiple protocols NAT translation DoS, multiple IPv6 DoS, DLSw DoS.
Affected:CISCO : IOS 12.2
 CISCO : IOS 15.0
 CISCO : IOS 15.1
 CISCO : IOS 15.2
 CISCO : IOS XE 3.3
CVE:CVE-2011-3282 (Unspecified vulnerability in Cisco IOS 12.2SRE before 12.2(33)SRE4, 15.0, and 15.1, and IOS XE 2.1.x through 3.3.x, when an MPLS domain is configured, allows remote attackers to cause a denial of service (device reload) via an ICMPv6 packet, related to an expired MPLS TTL, aka Bug ID CSCtj30155.)
 CVE-2011-3281 (Unspecified vulnerability in Cisco IOS 15.0 through 15.1, in certain HTTP Layer 7 Application Control and Inspection configurations, allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTP packet, aka Bug ID CSCto68554.)
 CVE-2011-3280 (Memory leak in the NAT implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xSG, allows remote attackers to cause a denial of service (memory consumption or device reload) by sending crafted SIP packets to UDP port 5060, aka Bug ID CSCtj04672.)
 CVE-2011-3279 (The provider-edge MPLS NAT implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xSG, allows remote attackers to cause a denial of service (device reload) via a malformed SIP packet to UDP port 5060, aka Bug ID CSCti98219.)
 CVE-2011-3278 (Unspecified vulnerability in the NAT implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xSG, allows remote attackers to cause a denial of service (device reload) by sending crafted SIP packets to UDP port 5060, aka Bug ID CSCti48483.)
 CVE-2011-3277 (Unspecified vulnerability in the NAT implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xSG, allows remote attackers to cause a denial of service (device reload) by sending crafted H.323 packets to TCP port 1720, aka Bug ID CSCth11006.)
 CVE-2011-3276 (Unspecified vulnerability in the NAT implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xSG, allows remote attackers to cause a denial of service (device reload or hang) by sending crafted SIP packets to TCP port 5060, aka Bug ID CSCso02147.)
 CVE-2011-3275 (Memory leak in Cisco IOS 12.4, 15.0, and 15.1, and IOS XE 2.5.x through 3.2.x, allows remote attackers to cause a denial of service (memory consumption) via a crafted SIP message, aka Bug ID CSCti48504.)
 CVE-2011-3274 (Unspecified vulnerability in Cisco IOS 12.2SRE before 12.2(33)SRE4, 15.0, and 15.1, and IOS XE 2.1.x through 3.3.x, when an MPLS domain is configured, allows remote attackers to cause a denial of service (device crash) via a crafted IPv6 packet, related to an expired MPLS TTL, aka Bug ID CSCto07919.)
 CVE-2011-3273 (Memory leak in Cisco IOS 15.0 through 15.1, when IPS or Zone-Based Firewall (aka ZBFW) is configured, allows remote attackers to cause a denial of service (memory consumption or device crash) via vectors that trigger many session creation flows, aka Bug ID CSCti79848.)
 CVE-2011-3272 (The IP Service Level Agreement (IP SLA) functionality in Cisco IOS 15.1, and IOS XE 2.1.x through 3.3.x, allows remote attackers to cause a denial of service (memory corruption and device reload) via malformed IP SLA packets, aka Bug ID CSCtk67073.)
 CVE-2011-3271 (Unspecified vulnerability in the Smart Install functionality in Cisco IOS 12.2 and 15.1 allows remote attackers to execute arbitrary code or cause a denial of service (device crash) via crafted TCP packets to port 4786, aka Bug ID CSCto10165.)
 CVE-2011-2072 (Memory leak in Cisco IOS 12.4, 15.0, and 15.1, Cisco IOS XE 2.5.x through 3.2.x, and Cisco Unified Communications Manager (CUCM) 6.x and 7.x before 7.1(5b)su4, 8.x before 8.5(1)su2, and 8.6 before 8.6(1) allows remote attackers to cause a denial of service (memory consumption and device reload or process failure) via a malformed SIP message, aka Bug IDs CSCtl86047 and CSCto88686.)
 CVE-2011-0946 (The NAT implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xSG, allows remote attackers to cause a denial of service (device reload or hang) via malformed NetMeeting Directory (aka Internet Locator Service or ILS) LDAP traffic, aka Bug ID CSCtd10712.)
 CVE-2011-0945 (Memory leak in the Data-link switching (aka DLSw) feature in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xS before 3.1.3S and 3.2.xS before 3.2.1S, when implemented over Fast Sequence Transport (FST), allows remote attackers to cause a denial of service (memory consumption and device reload or hang) via a crafted IP protocol 91 packet, aka Bug ID CSCth69364.)
 CVE-2011-0944 (Cisco IOS 12.4, 15.0, and 15.1 allows remote attackers to cause a denial of service (device reload) via malformed IPv6 packets, aka Bug ID CSCtj41194.)
 CVE-2011-0939 (Unspecified vulnerability in Cisco IOS 12.4, 15.0, and 15.1, and IOS XE 2.5.x through 3.2.x, allows remote attackers to cause a denial of service (device reload) via a crafted SIP message, aka Bug ID CSCth03022.)
Original documentdocumentCISCO, Cisco Security Advisory: Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerabilities (02.10.2011)
 documentCISCO, Cisco Security Advisory: Cisco IOS Software Network Address Translation Vulnerabilities (02.10.2011)
 documentCISCO, Cisco Security Advisory: Cisco IOS Software IPv6 over MPLS Vulnerabilities (02.10.2011)
 documentCISCO, Cisco Security Advisory: Cisco IOS Software IPv6 Denial of Service Vulnerability (02.10.2011)
 documentCISCO, Cisco Security Advisory: Cisco IOS Software Data-Link Switching Vulnerability (02.10.2011)
 documentCISCO, Cisco Security Advisory: Cisco IOS Software Smart Install Remote Code Execution Vulnerability (02.10.2011)
 documentCISCO, Cisco Security Advisory: Cisco IOS Software IPS and Zone-Based Firewall Vulnerabilities (02.10.2011)
 documentCISCO, Cisco Security Advisory: Cisco IOS Software IP Service Level Agreement Vulnerability (02.10.2011)

Cisco Jabber Extensible Communications Platform / Cisco Unified Presence
Published:02.10.2011
Source:
SecurityVulns ID:11938
Type:local
Threat Level:
6/10
Description:Resources exhaustion on XML parsing.
CVE:CVE-2011-3288 (Cisco Unified Presence before 8.5(4) does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption, and process crash) via a crafted XML document containing a large number of nested entity references, aka Bug IDs CSCtq89842 and CSCtq88547, a similar issue to CVE-2003-1564.)
 CVE-2011-3287 (Cisco Jabber Extensible Communications Platform (aka Jabber XCP) 2.x through 5.4.x before 5.4.0.27581 and 5.8.x before 5.8.1.27561 does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption, and process crash) via a crafted XML document containing a large number of nested entity references, aka Bug ID CSCtq78106, a similar issue to CVE-2003-1564.)
Original documentdocumentCISCO, Cisco Security Advisory: Jabber Extensible Communications Platform and Cisco Unified Presence XML Denial of Service Vulnerability (02.10.2011)

Cisco Unified Communications Manager memory leak
Published:02.10.2011
Source:
SecurityVulns ID:11939
Type:remote
Threat Level:
5/10
Description:Memory leaks in SIP implementation.
Affected:CISCO : Unified Communications Manager versions 8.6
 CISCO : Unified Communications Manager versions 8.5
 CISCO : Unified Communications Manager versions 7.1
CVE:CVE-2011-2072 (Memory leak in Cisco IOS 12.4, 15.0, and 15.1, Cisco IOS XE 2.5.x through 3.2.x, and Cisco Unified Communications Manager (CUCM) 6.x and 7.x before 7.1(5b)su4, 8.x before 8.5(1)su2, and 8.6 before 8.6(1) allows remote attackers to cause a denial of service (memory consumption and device reload or process failure) via a malformed SIP message, aka Bug IDs CSCtl86047 and CSCto88686.)
Original documentdocumentCISCO, Cisco Security Advisory: Cisco Unified Communications Manager Session Initiation Protocol Memory Leak Vulnerabilities (02.10.2011)

Novell Groupwise multiple security vulnerabilities
Published:02.10.2011
Source:
SecurityVulns ID:11940
Type:remote
Threat Level:
8/10
Description:Multiple memory corruptions, buffer overflows, integer overflows, heap array overflow.
Affected:NOVELL : GroupWise 8.02
CVE:CVE-2011-2663 (Array index error in GroupWise Internet Agent (GWIA) in Novell GroupWise 8.0 before HP3 allows remote attackers to execute arbitrary code via a crafted yearly RRULE variable in a VCALENDAR attachment in an e-mail message.)
 CVE-2011-2662 (Integer signedness error in GroupWise Internet Agent (GWIA) in Novell GroupWise 8.0 before HP3 allows remote attackers to execute arbitrary code via a negative BYWEEKNO property in a weekly RRULE variable in a VCALENDAR attachment in an e-mail message.)
 CVE-2011-0334 (Stack-based buffer overflow in gwia.exe in GroupWise Internet Agent (GWIA) in Novell GroupWise 8.0 before HP3 allows remote attackers to execute arbitrary code via a long HTTP request for a .css file.)
 CVE-2011-0333 (Heap-based buffer overflow in the NgwiCalVTimeZoneBody::ParseSelf function in gwwww1.dll in GroupWise Internet Agent (GWIA) in Novell GroupWise 8.0 before HP3 allows remote attackers to execute arbitrary code via a crafted TZNAME variable in a VCALENDAR attachment in an e-mail message, related to an "integer truncation error.")
 CVE-2010-4325 (Buffer overflow in gwwww1.dll in GroupWise Internet Agent (GWIA) in Novell GroupWise before 8.02HP2 allows remote attackers to execute arbitrary code via a crafted TZID variable in a VCALENDAR message.)
Original documentdocumentSECUNIA, Secunia Research: Novell GroupWise Internet Agent HTTP Interface Buffer Overflow (02.10.2011)
 documentSECUNIA, Secunia Research: Novell GroupWise Internet Agent "TZNAME" Parsing Vulnerability (02.10.2011)
 documentIDEFENSE, iDefense Security Advisory 09.26.11: Novell GroupWise iCal TZNAME Heap Overflow Vulnerability (02.10.2011)
 documentVUPEN Security Research, VUPEN Security Research - Novell GroupWise "TZNAME" Remote Buffer Overflow Vulnerability (02.10.2011)
 documentVUPEN Security Research, VUPEN Security Research - Novell GroupWise "BYWEEKNO" Remote Memory Corruption Vulnerability (02.10.2011)
 documentVUPEN Security Research, VUPEN Security Research - Novell GroupWise "integerList" Remote Buffer Overflow Vulnerability (02.10.2011)
 documentVUPEN Security Research, VUPEN Security Research - Novell GroupWise "RRULE" Remote Buffer Overflow Vulnerability (02.10.2011)
 documentIDEFENSE, iDefense Security Advisory 09.26.11: Novell GroupWise iCal RRULE Weekday Recurrence Heap Overflow Vulnerability (02.10.2011)
 documentIDEFENSE, iDefense Security Advisory 09.26.11: Novell GroupWise iCal Date Invalid Array Indexing Vulnerability (02.10.2011)
 documentIDEFENSE, iDefense Security Advisory 09.26.11: Novell GroupWise iCal RRULE ByWeekNo Memory Corruption Vulnerability (02.10.2011)

FreeBSD domain socket name buffer overflow
Published:02.10.2011
Source:
SecurityVulns ID:11941
Type:local
Threat Level:
5/10
Description:bind() buffer overflow on local (domain) sockets.
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-11:05.unix (02.10.2011)

PcVue ActiveX multiple security vulnerabilities
Published:02.10.2011
Source:
SecurityVulns ID:11942
Type:client
Threat Level:
5/10
Description:Unsafe methods, array index overflow, code execution.
Affected:ARCINFO : PcVue 10.0
Original documentdocumentLuigi Auriemma, Vulnerabilities in PcVue 10 (SCADA) (02.10.2011)

EViews memory corruptions
Published:02.10.2011
Source:
SecurityVulns ID:11943
Type:local
Threat Level:
3/10
Description:Memory corruption on WF1 files parsing, buffer overflow on PRG parsing.
Affected:EVIEWS : EViews 7.2
Original documentdocumentLuigi Auriemma, Vulnerabilities in EViews 7.2 (02.10.2011)

Sterling Trader integer overflow
updated since 02.10.2011
Published:19.12.2011
Source:
SecurityVulns ID:11944
Type:remote
Threat Level:
5/10
Description:Interger overflow on network request parsing.
Affected:STERLINGTRADER : Sterling Trader 7.0
CVE:CVE-2011-3842
Original documentdocumentSECUNIA, Secunia Research: Sterling Trader Data Processing Buffer Overflow Vulnerability (19.12.2011)
 documentLuigi Auriemma, Integer overflow in Sterling Trader 7.0.2 (02.10.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod