Computer Security
[EN] securityvulns.ru no-pyccku


LibTiff security vulnerabilities
Published:04.06.2013
Source:
SecurityVulns ID:13102
Type:remote
Threat Level:
5/10
Description:tiff2pdf vulnerabilities
Affected:LIBTIFF : libtiff 4.0
CVE:CVE-2013-1961 (Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file.)
 CVE-2013-1960 (Heap-based buffer overflow in the tp_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file.)
Original documentdocumentUBUNTU, [USN-1832-1] LibTIFF vulnerabilities (04.06.2013)

Sony PlayStation 3 code execution
Published:04.06.2013
Source:
SecurityVulns ID:13103
Type:local
Threat Level:
5/10
Affected:SONY : PlayStation 3
Original documentdocumentVulnerability Lab, Sony PS3 Firmware v4.31 - Code Execution Vulnerability (04.06.2013)

socat security vulnerabilities
Published:04.06.2013
Source:
SecurityVulns ID:13104
Type:local
Threat Level:
5/10
Description:Buffer overflow, file descriptor leakage.
CVE:CVE-2013-3571 (socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.)
 CVE-2012-0219 (Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.)
Original documentdocumentMANDRIVA, [ MDVSA-2013:169 ] socat (04.06.2013)

kde4libs information leakage
Published:04.06.2013
Source:
SecurityVulns ID:13105
Type:library
Threat Level:
5/10
Description:User's credentials are incorrectly requested under some conditions.
Affected:KDE : kde4libs 4.10
CVE:CVE-2013-2074 (kioslave/http/http.cpp in KIO in kdelibs 4.10.3 and earlier allows attackers to discover credentials via a crafted request that triggers an "internal server error," which includes the username and password in an error message.)
Original documentdocumentUBUNTU, [USN-1842-1] KDE-Libs vulnerability (04.06.2013)

KDE Paste applet weak password generation
Published:04.06.2013
Source:
SecurityVulns ID:13106
Type:local
Threat Level:
5/10
Description:Weak PRNG.
CVE:CVE-2013-2120
Original documentdocumentMichael Samuel, KDE Paste Applet (04.06.2013)

Monkey HTTPD security vulnerabilities
Published:04.06.2013
Source:
SecurityVulns ID:13107
Type:remote
Threat Level:
5/10
Description:Crash on NULL byte in request. Buffer overflow on oversized header.
Affected:MONKEYPROJECT : Monkey HTTPD 1.1
CVE:CVE-2013-3843 (Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header.)
 CVE-2013-3724 (The mk_request_header_process function in mk_request.c in Monkey 1.1.1 allows remote attackers to cause a denial of service (thread crash and service outage) via a '\0' character in an HTTP request.)
Original documentdocumentdougtko_(at)_gmail.com, CVE-2013-3843 Monkey HTTPD 1.2.0 - Buffer Overflow DoS Vulnerability With Possible Arbitrary Code Execution (04.06.2013)
 documentdougtko_(at)_gmail.com, Monkey HTTPD 1.1.1 - Denial of Service Vulnerability (04.06.2013)

ModSecurity DoS
Published:04.06.2013
Source:
SecurityVulns ID:13109
Type:remote
Threat Level:
6/10
Description:NULL pointer dereference under some conditions.
Affected:MODSECURITY : ModSecurity 2.7
CVE:CVE-2013-2765 (The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.)
Original documentdocumentyjaaidi_(at)_shookalabs.com, [SECURITY][CVE-2013-2765][ModSecurity] Remote Null Pointer Dereference (04.06.2013)

FreeBSD NFS server memory corruption
updated since 04.05.2013
Published:04.06.2013
Source:
SecurityVulns ID:13045
Type:remote
Threat Level:
6/10
Description:It's possible to call readdir on plain file.
Affected:FREEBSD : FreeBSD 9.1
 FREEBSD : FreeBSD 8.4
CVE:CVE-2013-3266 (The nfsrvd_readdir function in sys/fs/nfsserver/nfs_nfsdport.c in the new NFS server in FreeBSD 8.0 through 9.1-RELEASE-p3 does not verify that a READDIR request is for a directory node, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by specifying a plain file instead of a directory.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2672-1] kfreebsd-9 security update (04.06.2013)
 documentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-13:05.nfsserver [REVISED] (04.05.2013)

EMC RSA Authentication Manager security vulnerabilities
updated since 04.06.2013
Published:15.07.2013
Source:
SecurityVulns ID:13108
Type:remote
Threat Level:
6/10
Description:Information leakage, SQL injection.
Affected:EMC : RSA Authentication Manager 8.0
CVE:CVE-2013-3273 (EMC RSA Authentication Manager 8.0 before P2 and 7.1 before SP4 P26, as used in Appliance 3.0, does not omit the cleartext administrative password from trace logging in custom SDK applications, which allows local users to obtain sensitive information by reading the trace log file.)
 CVE-2013-1899 (Argument injection vulnerability in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13 allows remote attackers to cause a denial of service (file corruption), and allows remote authenticated users to modify configuration settings and execute arbitrary code, via a connection request using a database name that begins with a "-" (hyphen).)
 CVE-2013-0947 (EMC RSA Authentication Manager 8.0 before P1 allows local users to discover cleartext operating-system passwords, HTTP plug-in proxy passwords, and SNMP communities by reading a (1) log file or (2) configuration file.)
Original documentdocumentEMC, ESA-2013-052: RSA(r) Authentication Manager Sensitive Information Disclosure Vulnerability (15.07.2013)
 documentEMC, ESA-2013-040: RSA┬« Authentication Manager 8.0 Multiple Vulnerabilities (04.06.2013)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod