Computer Security
[EN] securityvulns.ru no-pyccku


Aruba Mobility Controller security vulnerabilities
Published:03.02.2011
Source:
SecurityVulns ID:11399
Type:remote
Threat Level:
6/10
Description:DoS and authentication bypass.
Affected:ARUBANETWORKS : ArubaOS 3.3
 ARUBANETWORKS : ArubaOS 3.4
Original documentdocumentARUBANETWORKS, Aruba Mobility Controller - multiple advisories: DoS and authentication bypass (03.02.2011)

Cisco Tandberg C Series default account
Published:03.02.2011
Source:
SecurityVulns ID:11398
Type:remote
Threat Level:
5/10
Description:Device is shipped via empty root password.
CVE:CVE-2011-0354 (The default configuration of Cisco Tandberg C Series Endpoints, and Tandberg E and EX Personal Video units, with software before TC4.0.0 has a blank password for the root account, which makes it easier for remote attackers to obtain access via an unspecified login method.)
Original documentdocumentCISCO, Cisco Security Advisory: Default Credentials for Root Account on Tandberg E, EX and C Series Endpoints (03.02.2011)

Exim memory corruption and remote code execution
updated since 12.12.2010
Published:03.02.2011
Source:
SecurityVulns ID:11287
Type:remote
Threat Level:
9/10
Affected:EXIM : exim 4.69
 EXIM : exim 4.72
CVE:CVE-2011-0017 (The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.)
 CVE-2010-4345 (Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.)
 CVE-2010-4344 (Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.)
Original documentdocumentDEBIAN, [SECURITY] [DSA-2154-1] exim4 security update (03.02.2011)
 documentEXIM, Exim security issue in historical release (13.12.2010)
 documentDEBIAN, [SECURITY] [DSA-2131-1] New exim4 packages fix remote code execution (12.12.2010)

Majordomo2 directory traversal
updated since 03.02.2011
Published:10.03.2011
Source:
SecurityVulns ID:11397
Type:remote
Threat Level:
6/10
Description:Directory traversal on help command processing via e-mail or Web.
CVE:CVE-2011-0049 (Directory traversal vulnerability in the _list_file_get function in lib/Majordomo.pm in Majordomo 2 before 20110131 allows remote attackers to read arbitrary files via .. (dot dot) sequences in the help command, as demonstrated using (1) a crafted email and (2) cgi-bin/mj_wwwusr in the web interface.)
Original documentdocumentNSO Research, NSOADV-2011-003: Majordomo2 'help' Command Directory Traversal (Patch Bypass) (10.03.2011)
 documentmike_(at)_sitewat.ch, Majordomo2 - Directory Traversal (SMTP/HTTP) (03.02.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod