Computer Security
[EN] securityvulns.ru no-pyccku


Akamai Download Manager ActiveX code execution
updated since 01.05.2008
Published:05.06.2008
Source:
SecurityVulns ID:8962
Type:client
Threat Level:
6/10
Description:Undocumented properties allow code download and execute.
Affected:AKAMAI : Akamai Download Manager 2.2
CVE:CVE-2008-1770 (CRLF injection vulnerability in Akamai Download Manager ActiveX control before 2.2.3.6 allows remote attackers to force the download and execution of arbitrary files via a URL parameter containing an encoded LF followed by a malicious target line.)
Original documentdocumentcocoruder, Akamai Download Manager File Downloaded To Arbitrary Location Vulnerability (05.06.2008)
 documentAKAMAI, Akamai Technologies Security Advisory 2008-0001 (Download Manager) (05.06.2008)
 documentIDEFENSE, iDefense Security Advisory 04.30.08: Akamai Download Manager Arbitrary Program Execution Vulnerability (01.05.2008)

HP StorageWorks Storage Mirroring buffer overflow
Published:05.06.2008
Source:
SecurityVulns ID:9049
Type:remote
Threat Level:
6/10
Description:TCP/1100, TCP/1106, UDP/1105 authentication buffer overflow.
Affected:HP : StorageWorks Storage Mirroring 4.5
CVE:CVE-2008-1661
Original documentdocumentZDI, ZDI-08-034: HP StorageWorks Storage Mirroring Authentication Processing Stack Overflow Vulnerability (05.06.2008)
 documentHP, [security bulletin] HPSBST02312 SSRT071428 rev.1 - HP StorageWorks Storage Mirroring Software, Remote Execution of Arbitrary Code (05.06.2008)

Sun Java System Active Server Pages multiple security vulnerabilities
Published:05.06.2008
Source:
SecurityVulns ID:9051
Type:remote
Threat Level:
8/10
Description:Information leaks, commands injection, directory traversals, buffer overflows, authentication bypass.
Affected:SUN : Java System Active Server Pages 4.0
CVE:CVE-2008-2406 (The administration application server in Sun Java Active Server Pages (ASP) Server before 4.0.3 allows remote attackers to bypass authentication via direct requests on TCP port 5102.)
 CVE-2008-2405 (Sun Java Active Server Pages (ASP) Server before 4.0.3 allows remote attackers to execute arbitrary commands via shell metacharacters in HTTP requests to unspecified ASP applications.)
 CVE-2008-2404 (Stack-based buffer overflow in the request handling implementation in Sun Java Active Server Pages (ASP) Server before 4.0.3 allows remote attackers to execute arbitrary code via an unspecified string field.)
 CVE-2008-2403 (Multiple directory traversal vulnerabilities in unspecified ASP applications in Sun Java Active Server Pages (ASP) Server before 4.0.3 allow remote attackers to read or delete arbitrary files via a .. (dot dot) in the Path parameter to the MapPath method.)
 CVE-2008-2402 (The Admin Server in Sun Java Active Server Pages (ASP) Server before 4.0.3 stores sensitive information under the web root with insufficient access control, which allows remote attackers to read password hashes and configuration data via direct requests for unspecified documents.)
 CVE-2008-2401 (The Admin Server in Sun Java Active Server Pages (ASP) Server before 4.0.3 allows remote attackers to append to arbitrary new or existing files via the first argument to a certain file that is included by multiple unspecified ASP applications.)
Original documentdocumentIDEFENSE, iDefense Security Advisory 06.03.08: Sun Java System Active Server Pages File Creation Vulnerability (05.06.2008)
 documentIDEFENSE, iDefense Security Advisory 06.03.08: Sun Java System Active Server Pages Buffer Overflow Vulnerability (05.06.2008)
 documentIDEFENSE, iDefense Security Advisory 06.03.08: Sun Java System Active Server Pages Authorization Bypass Vulnerability (05.06.2008)
 documentIDEFENSE, iDefense Security Advisory 06.03.08: Sun Java System Active Server Pages Multiple Directory Traversal Vulnerabilities (05.06.2008)
 documentIDEFENSE, iDefense Security Advisory 06.03.08: Sun Java System Active Server Pages Multiple Command Injection Vulnerabilities (05.06.2008)
 documentIDEFENSE, iDefense Security Advisory 06.03.08: Sun Java System Active Server Pages Information Disclosure Vulnerability (05.06.2008)

CA ETrust Secure Content Manager Gateway multiple security vulnerabilities
Published:05.06.2008
Source:
SecurityVulns ID:9052
Type:remote
Threat Level:
7/10
Description:Buffer overflow on FTP PASV and LIST commands.
CVE:CVE-2008-2541 (Multiple stack-based buffer overflows in the HTTP Gateway Service (icihttp.exe) in CA eTrust Secure Content Manager 8.0 allow remote attackers to execute arbitrary code or cause a denial of service via long FTP responses, related to (1) the file month field in a LIST command; (2) the PASV command; and (3) directories, files, and links in a LIST command.)
Original documentdocumentCA, CA Secure Content Manager HTTP Gateway Service FTP Request Vulnerabilities (05.06.2008)
 documentDVLabs, TPTI-08-05: CA ETrust Secure Content Manager Gateway FTP LIST Stack Overflow Vulnerability (05.06.2008)
 documentZDI, TPTI-08-05: CA ETrust Secure Content Manager Gateway FTP LIST Stack Overflow Vulnerability (05.06.2008)
 documentZDI, ZDI-08-036: CA ETrust Secure Content Manager Gateway FTP LIST Stack Overflow (05.06.2008)
 documentZDI, ZDI-08-035: CA ETrust Secure Content Manager Gateway FTP PASV Stack Overflow Vulnerability (05.06.2008)

Skype protection bypass
Published:05.06.2008
Source:
SecurityVulns ID:9053
Type:client
Threat Level:
4/10
Description:Dangerous file protection dialog bypass.
Affected:SKYPE : Skype 3.6
CVE:CVE-2008-1805
Original documentdocumentIDEFENSE, iDefense Security Advisory 06.04.08: Skype File URI Security Bypass Code Execution Vulnerability (05.06.2008)

Kaspersky Antivirus IOCTL privilege escalation
Published:05.06.2008
Source:
SecurityVulns ID:9054
Type:local
Threat Level:
6/10
Description:IOCTL 0x800520e8 buffer overflow.
Affected:KASPERSKY : Kaspersky Internet Security 7.0
CVE:CVE-2008-1518
Original documentdocumentIDEFENSE, iDefense Security Advisory 06.04.08: Kaspersky Internet Security IOCTL Stack Based Buffer Overflow Vulnerability (05.06.2008)

Cisco PIX / ASA multiple security vulnerabilities
Published:05.06.2008
Source:
SecurityVulns ID:9057
Type:remote
Threat Level:
8/10
Description:TCP ACKs DoS, TLS DoS, instant messenger DoS, HTTPs request parsing DoS, Control-plane ACLs feature bypass.
Affected:CISCO : PIX 7.0
 CISCO : PIX 7.1
 CISCO : PIX 7.2
 CISCO : PIX 8.0
 CISCO : PIX 8.1
CVE:CVE-2008-2058
 CVE-2008-2057
 CVE-2008-2056
 CVE-2008-2055
Original documentdocumentCISCO, Cisco Security Advisory: Multiple Vulnerabilities in Cisco PIX and Cisco ASA (05.06.2008)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:05.06.2008
Source:
SecurityVulns ID:9058
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:QUICKERSITE : QuickerSite 1.8
 SMEWEB : SMEweb 1.4
Original documentdocumenttan_prathan_(at)_hotmail.com, SMEweb 1.4b (SQL/XSS) Multiple Remote Vulnerabilities (05.06.2008)
 documenthadihadi_zedehal_2006_(at)_yahoo.com, e107 Plugin echat MENU Blind SQL Injection Vulnerability (05.06.2008)
 documentadmin_(at)_bugreport.ir, QuickerSite Multiple Vulnerabilities (05.06.2008)

Linksys WRH54G wireless router DoS
Published:05.06.2008
Source:
SecurityVulns ID:9059
Type:remote
Threat Level:
5/10
Description:Web-interface crash on invalid HTTP request.
Affected:LINKSYS : WRH54G
Original documentdocumentdubingyao_(at)_gmail.com, Remote DoS vulnerability in Linksys WRH54G (05.06.2008)

VMWare multiple security vulnerabilities
updated since 05.06.2008
Published:06.06.2008
Source:
SecurityVulns ID:9055
Type:local
Threat Level:
5/10
Description:Multiple privilege escalation in guest OS.
Affected:VMWARE : VMware Workstation 5.5
 VMWARE : VMware Player 1.0
 VMWARE : VMware Server 1.0
 VMWARE : VMware ACE 1.0
 VMWARE : VMWare Workstation 6.0
 VMWARE : VMware Player 2.0
 VMWARE : VMWare ACE 2.0
 VMWARE : VMware Fusion 1.1
 VMWARE : VMware ESXi 3.5
 VMWARE : VMware ESXi 3.0
 VMWARE : VMware ESXi 2.5
CVE:CVE-2008-2097 (Buffer overflow in the openwsman management service in VMware ESXi 3.5 and ESX 3.5 allows remote authenticated users to gain privileges via an "invalid Content-Length.")
 CVE-2008-0967 (Untrusted search path vulnerability in vmware-authd in VMware Workstation 5.x before 5.5.7 build 91707 and 6.x before 6.0.4 build 93057, VMware Player 1.x before 1.0.7 build 91707 and 2.x before 2.0.4 build 93057, and VMware Server before 1.0.6 build 91891 on Linux, and VMware ESXi 3.5 and VMware ESX 2.5.4 through 3.5, allows local users to gain privileges via a library path option in a configuration file.)
 CVE-2007-5671 (HGFS.sys in the VMware Tools package in VMware Workstation 5.x before 5.5.6 build 80404, VMware Player before 1.0.6 build 80404, VMware ACE before 1.0.5 build 79846, VMware Server before 1.0.5 build 80187, and VMware ESX 2.5.4 through 3.0.2 does not properly validate arguments in user-mode METHOD_NEITHER IOCTLs to the \\.\hgfs device, which allows guest OS users to modify arbitrary memory locations in guest kernel memory and gain privileges.)
Original documentdocumentVMWARE, iDefense Security Advisory 06.04.08: VMware Multiple Products vmware-authd Untrusted Library Loading Vulnerability (05.06.2008)
 documentIDEFENSE, iDefense Security Advisory 06.04.08: VMware Tools HGFS Local Privilege Escalation Vulnerability (05.06.2008)
 documentVMWARE, VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues (05.06.2008)

Asterisk voice server DoS
updated since 05.06.2008
Published:07.06.2008
Source:
SecurityVulns ID:9050
Type:remote
Threat Level:
5/10
Description:SIP protocol parsing NULL pointer dereference in pedantic mode. Uninitialized memory reference on in ooh323 channel driver.
Affected:ASTERISK : Asterisk 1.2
 ASTERISK : Asterisk s800i
 ASTERISK : AsteriskNOW 1.0
CVE:CVE-2008-2543 (The ooh323 channel driver in Asterisk Addons 1.2.x before 1.2.9 and Asterisk-Addons 1.4.x before 1.4.7 creates a remotely accessible TCP port that is intended solely for localhost communication, and interprets some TCP application-data fields as addresses of memory to free, which allows remote attackers to cause a denial of service (daemon crash) via crafted TCP packets.)
 CVE-2008-2119
Original documentdocumentASTERISK, AST-2008-009: (Corrected subject) Remote crash vulnerability in ooh323 channel driver (07.06.2008)
 documentASTERISK, AST-2008-008: Remote Crash Vulnerability in SIP channel driver when run in pedantic mode (05.06.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod