Computer Security
[EN] securityvulns.ru no-pyccku


Anon Proxy Server buffer overflow
Published:05.02.2008
Source:
SecurityVulns ID:8629
Type:remote
Threat Level:
5/10
Description:Buffer overflow on oversized username with double quote characters.
Affected:ANONPROXYSERVER : Anon Proxy Server 0.102
Original documentdocumentL4teral, Anon Proxy Server <= 0.102 remote buffer overflow (05.02.2008)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:05.02.2008
Source:
SecurityVulns ID:8630
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:XOOPS : xoops 2.0
 VHDWEBPACK : VHD Web Pack 2.0
 OPENADS : Openads 2.4
 TEXTPATTERN : Txp CMS 4,0
Original documentdocumentDigital Security Research Group [DSecRG], [DSECRG-08-008] Textpattern 4.0.5 Multiple Security Vulnerabilities (05.02.2008)
 documentDigital Security Research Group [DSecRG], [DSECRG-08-011] Astrosoft HelpDesk Multiple XSS (05.02.2008)
 documentOPENADS, [OPENADS-SA-2008-001] Openads 2.4.2 vulnerability fixed (05.02.2008)
 documentDigital Security Research Group [DSecRG], [OPEN[DSECRG-08-010] VHD Web Pack 2.0 Local File Include (05.02.2008)
 documentDigital Security Research Group [DSecRG], [DSECRG-08-009] xoops 2.0.18 Local File Include (05.02.2008)

Mplayer / Xine multiple security vulnerabilities
updated since 05.02.2008
Published:16.02.2008
Source:
SecurityVulns ID:8631
Type:remote
Threat Level:
5/10
Description:Buffer overflow on FLAC data parsing, uninitilized pointer dereference on MOV parsing.
Affected:MPLAYER : MPlayer 1.0
 XINE : xine 1.1
 XINE : xinelib 1.1
CVE:CVE-2008-0486 (Array index vulnerability in libmpdemux/demux_audio.c in MPlayer 1.0rc2 and SVN before r25917, and possibly earlier versions, as used in Xine-lib 1.1.10, might allow remote attackers to execute arbitrary code via a crafted FLAC tag, which triggers a buffer overflow.)
 CVE-2008-0485 (Array index error in libmpdemux/demux_mov.c in MPlayer 1.0 rc2 and earlier might allow remote attackers to execute arbitrary code via a QuickTime MOV file with a crafted stsc atom tag.)
 CVE-2008-0238 (Multiple heap-based buffer overflows in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 allow remote attackers to execute arbitrary code via the SDP (1) Title, (2) Author, or (3) Copyright attribute, related to the rmff_dump_header function, different vectors than CVE-2008-0225. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.)
 CVE-2008-0225 (Heap-based buffer overflow in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote attackers to execute arbitrary code via the SDP Abstract attribute, related to the rmff_dump_header function and related to disregarding the max field. NOTE: some of these details are obtained from third party information.)
Original documentdocumentMANDRIVA, [ MDVSA-2008:046 ] - Updated xine-lib package fixes arbitrary code execution vulnerability (16.02.2008)
 documentCORE SECURITY TECHNOLOGIES ADVISORIES, CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability (05.02.2008)
 documentCORE SECURITY TECHNOLOGIES ADVISORIES, CORE-2008-0122: MPlayer arbitrary pointer dereference (05.02.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod