Computer Security
[EN] securityvulns.ru no-pyccku


Artofdefence Hyperguard Web Application Firewall DoS
Published:03.07.2009
Source:
SecurityVulns ID:10030
Type:remote
Threat Level:
5/10
Description:Denial of service via memory exhaustion.
Affected:ARTOFDEFENCE : Hyperguard 3.1
 ARTOFDEFENCE : Hyperguard 3.0
 ARTOFDEFENCE : Hyperguard 2.5
Original documentdocumentKirchner Michael, Artofdefence Hyperguard Web Application Firewall: Remote Denial of Service (03.07.2009)

phion airlock Web Application Firewall multiple security vulnerabilities
Published:03.07.2009
Source:
SecurityVulns ID:10031
Type:remote
Threat Level:
6/10
Description:DoS, code execution.
Affected:PHION : airlock 10.41
Original documentdocumentKirchner Michael, phion airlock Web Application Firewall: Remote Denial of Service via Management Interface (unauthenticated) and Command Execution (03.07.2009)

Multiple Axesstel MV 410R wireless router security vulnerabilities
Published:03.07.2009
Source:
SecurityVulns ID:10032
Type:remote
Threat Level:
5/10
Description:Crossite scripting, devica access from WAN, default account.
Affected:AXESSTEL : Axesstel MV 410R
Original documentdocumentfilip.palian_(at)_pjwstk.edu.pl, Multiple Flaws in Axesstel MV 410R (03.07.2009)

ModSecurity multiple security vulnerabilities
Published:03.07.2009
Source:
SecurityVulns ID:10033
Type:remote
Threat Level:
5/10
Description:Few denial of service conditions.
CVE:CVE-2009-1903 (The PDF XSS protection feature in ModSecurity before 2.5.8 allows remote attackers to cause a denial of service (Apache httpd crash) via a request for a PDF file that does not use the GET method.)
 CVE-2009-1902 (The multipart processor in ModSecurity before 2.5.9 allows remote attackers to cause a denial of service (crash) via a multipart form datapost request with a missing part header name, which triggers a NULL pointer dereference.)
Original documentdocumentGENTOO, [ GLSA 200907-02 ] ModSecurity: Denial of Service (03.07.2009)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:03.07.2009
Source:
SecurityVulns ID:10034
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:FCKEDITOR : FCKeditor 2.6
 JOOMLA : Joomla! 1.5
 NAGIOS : Nagios 3.1
CVE:CVE-2009-2288 (statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.)
 CVE-2009-2265 (Multiple directory traversal vulnerabilities in FCKeditor before 2.6.4.1 allow remote attackers to create executable files in arbitrary directories via directory traversal sequences in the input to unspecified connector modules, as exploited in the wild for remote code execution in July 2009, related to the file browser and the editor/filemanager/connectors/ directory.)
Original documentdocumentAndrea Barisani, [oCERT-2009-007] FCKeditor input sanitization errors (03.07.2009)
 documentlinuxrootkit2008_(at)_gmail.com, eAccelerator encoder files backup Vulnerability (03.07.2009)
 documentISecAuditors Security Advisories, [ISecAuditors Security Advisories] Joomla! < 1.5.12 Multiple XSS vulnerabilities in HTTP Headers (03.07.2009)
 documentUBUNTU, [USN-795-1] Nagios vulnerability (03.07.2009)

FreeBSD multiple security vulnerabilities
updated since 07.09.2008
Published:03.07.2009
Source:
SecurityVulns ID:9267
Type:remote
Threat Level:
7/10
Description:mount / nmount syscall implementcation buffer overflow. amd64 CPU registers privilege escalation. DoS через ICMPv6.
Affected:FREEBSD : FreeBSD 7.0
 FREEBSD : FreeBSD 6.3
 FREEBSD : FreeBSD 7.1
 FREEBSD : FreeBSD 6.4
CVE:CVE-2008-3890 (The kernel in FreeBSD 6.3 through 7.0 on amd64 platforms can make an extra swapgs call after a General Protection Fault (GPF), which allows local users to gain privileges by triggering a GPF during the kernel's return from (1) an interrupt, (2) a trap, or (3) a system call.)
 CVE-2008-3531 (Stack-based buffer overflow in sys/kern/vfs_mount.c in the kernel in FreeBSD 7.0 and 7.1, when vfs.usermount is enabled, allows local users to gain privileges via a crafted (1) mount or (2) nmount system call, related to copying of "user defined data" in "certain error conditions.")
 CVE-2008-3530 (sys/netinet6/icmp6.c in the kernel in FreeBSD 6.3 through 7.1, NetBSD 3.0 through 4.0, and possibly other operating systems does not properly check the proposed new MTU in an ICMPv6 Packet Too Big Message, which allows remote attackers to cause a denial of service (panic) via a crafted Packet Too Big Message.)
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-08:08.nmount (07.09.2008)
Files:Privilege escalation exploit for the FreeBSD-SA-08:08.nmount

Sourcefire 3D Sensor / Sourcefire Defense Center privilege escalation
Published:03.07.2009
Source:
SecurityVulns ID:10037
Type:local
Threat Level:
5/10
Description:Web interface privilege escalation.
Affected:SOURCEFIRE : Sourcefire 3D Sensor 2500
 SOURCEFIRE : Sourcefire Defense Center 1000
Original documentdocumentc3rb3r_(at)_videotron.ca, Sourcefire 3D Sensor and DC, privilege escalation vulnerability (03.07.2009)

HP-UX nfs utilities DoS
Published:03.07.2009
Source:
SecurityVulns ID:10038
Type:local
Threat Level:
5/10
CVE:CVE-2009-1421 (Unspecified vulnerability in NFS / ONCplus B.11.31_06 and B.11.31_07 on HP HP-UX B.11.31 allows local users to cause a denial of service via unknown attack vectors.)
Original documentdocumentHP, [security bulletin] HPSBUX02440 SSRT090106 rev.1 - HP-UX Running NFS/ONCplus, Local Denial of Service (DoS) (03.07.2009)

Soulseek buffer overflow
Published:03.07.2009
Source:
SecurityVulns ID:10039
Type:remote
Threat Level:
6/10
Description:Buffer overflow on file search functionality.
Affected:SOULSEEK : Soulseek 157
Original documentdocumentlaurent gaffie, [Full-disclosure] Soulseek 157 NS < 13e & 156.* Remote Direct Peer Search Code Execution (03.07.2009)
Files:Soulseek 157 NS < 13e & 156.* Remote Direct Peer Search Code Execution

perl DoS
updated since 03.07.2009
Published:20.08.2009
Source:
SecurityVulns ID:10035
Type:library
Threat Level:
5/10
Description:Crash on processing zlib stream via Compress::Raw::Zlib and bzip2 stream in Compress-Raw-Bzip2.
Affected:PERL : perl 5.10
CVE:CVE-2009-1884 (Off-by-one error in the bzinflate function in Bzip2.xs in the Compress-Raw-Bzip2 module before 2.018 for Perl allows context-dependent attackers to cause a denial of service (application hang or crash) via a crafted bzip2 compressed stream that triggers a buffer overflow, a related issue to CVE-2009-1391.)
 CVE-2009-1391 (Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009.)
Original documentdocumentMANDRIVA, [ MDVSA-2009:207 ] perl-Compress-Raw-Bzip2 (20.08.2009)
 documentUBUNTU, [USN-794-1] Perl vulnerability (03.07.2009)

CamlImages library integer overflows
updated since 03.07.2009
Published:26.10.2009
Source:
SecurityVulns ID:10036
Type:library
Threat Level:
6/10
Description:Multiple overflows on PNG, TIFF, GIF, JPEG processing.
Affected:CAMLIMAGES : CamlImages 2.2
 ADVI : advi 1.6
CVE:CVE-2009-3296 (Multiple integer overflows in tiffread.c in CamlImages 2.2 might allow remote attackers to execute arbitrary code via TIFF images containing large width and height values that trigger heap-based buffer overflows.)
 CVE-2009-2660 (Multiple integer overflows in CamlImages 2.2 might allow context-dependent attackers to execute arbitrary code via images containing large width and height values that trigger a heap-based buffer overflow, related to (1) crafted GIF files (gifread.c) and (2) crafted JPEG files (jpegread.c), a different vulnerability than CVE-2009-2295.)
 CVE-2009-2295 (Multiple integer overflows in CamlImages 2.2 and earlier might allow context-dependent attackers to execute arbitrary code via a crafted PNG image with large width and height values that trigger a heap-based buffer overflow in the (1) read_png_file or (2) read_png_file_as_rgb24 function.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 1912-2] New advi packages fix arbitrary code execution (26.10.2009)
 documentAndrea Barisani, [oCERT-2009-009] CamlImages integer overflows (03.07.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod