Computer Security
[EN] securityvulns.ru no-pyccku


Apache apr-util webDav DoS
updated since 02.06.2009
Published:05.06.2009
Source:
SecurityVulns ID:9954
Type:remote
Threat Level:
5/10
Description:Memory consuption on large number of Entity elements.
Affected:APACHE : Apr-util 1.2
CVE:CVE-2009-1956 (Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.)
 CVE-2009-1955 (The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.)
 CVE-2009-0023 (The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 1812-1] New apr-util packages fix several vulnerabilities (05.06.2009)
 documentKingcope Kingcope, The father of all bombs - another webdav fiasco (02.06.2009)
Files:Apache mod_dav / svn Remote Denial of Service Exploit

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:05.06.2009
Source:
SecurityVulns ID:9963
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:GEEKLOG : Geeklog 1.5
 OCSINVENTORY : OCS Inventory NG 1.02
 LIGHTOPENCMS : LightOpenCMS 0.1
 JOOMLA : Joomla! 1.5
 FLATNUX : Flatnux 2009-03-27
 SITECORE : SiteCore.NET 6.0
 LIGHTNEASY : LightNEasy 2.2
 MOZILOCMS : moziloCMS 1.11
CVE:CVE-2009-0667 (Untrusted search path vulnerability in Agent/Backend.pm in Ocsinventory-Agent before 0.0.9.3, and 1.x before 1.0.1, in OCS Inventory allows local users to gain privileges via a Trojan horse Perl module in an arbitrary directory.)
Original documentdocumentsecurity_(at)_intern0t.net, [InterN0T] moziloCMS 1.11.1 - XSS Vulnerability (05.06.2009)
 documentsecurity_(at)_intern0t.net, [InterN0T] LightNEasy 2.2.2 - HTML Injection Vulnerability (05.06.2009)
 documentsecurity_(at)_intern0t.net, [InterN0T] SiteCore.NET 6.0.0 - XSS Vulnerability (05.06.2009)
 documentsecurity_(at)_intern0t.net, [InterN0T] Geeklog 1.5 - Pre-Installation Vulnerabilities (05.06.2009)
 documentsecurity_(at)_intern0t.net, [InterN0T] Flatnux 2009-03-27 - XSS Vulnerabilities + More (05.06.2009)
 documenty3nh4ck3r_(at)_gmail.com, SQL INJECTION VULNERABILITY--LightOpen CMS Devel 0.1--> (05.06.2009)
 documentISecAuditors Security Advisories, [ISecAuditors Security Advisories] Joomla! 1.5.10 JA_Purity Multiple Persistent XSS (05.06.2009)
 documentSalvatore "drosophila" Fresta, LightOpenCMS 0.1 pre-alpha Remote SQL Injection (05.06.2009)

file utility buffer overflow
Published:05.06.2009
Source:
SecurityVulns ID:9964
Type:local
Threat Level:
4/10
Description:Buffer overflow on .msi, .doc, .mpp files analysis.
Affected:FILE : file 5.00
CVE:CVE-2009-1515 (Heap-based buffer overflow in the cdf_read_sat function in src/cdf.c in Christos Zoulas file 5.00 allows user-assisted remote attackers to execute arbitrary code via a crafted compound document file, as demonstrated by a .msi, .doc, or .mpp file. NOTE: some of these details are obtained from third party information.)
Original documentdocumentMANDRIVA, [ MDVSA-2009:129 ] file (05.06.2009)

XM Easy Personal FTP Server DoS
Published:05.06.2009
Source:
SecurityVulns ID:9966
Type:remote
Threat Level:
5/10
Description:Buffer overflow on HELP and TYPE commands.
Affected:DXMSOFT : XM Easy Personal FTP Server 5.7
Original documentdocumentneeraj.thakar_(at)_nevisnetworks.com, [Security] XM Easy Personal FTP Server Multiple DoS vulnerabilities (05.06.2009)
Files:XM Easy Personal FTP Server HELP and TYPE command Remote Denial of Service exploit

Apache Tomcat multiple security vulnerabilities
updated since 05.06.2009
Published:14.06.2009
Source:
SecurityVulns ID:9965
Type:remote
Threat Level:
6/10
Description:Information leak, user enumeration, DoS, directory traversal.
Affected:APACHE : Tomcat 4.1
 APACHE : Tomcat 5.5
 APACHE : Tomcat 6.0
CVE:CVE-2009-0783 (Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.)
 CVE-2009-0580 (Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.)
 CVE-2009-0033 (Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.)
 CVE-2008-5515 (Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.)
Original documentdocumentAPACHE, [SECURITY] UPDATED CVE-2008-5515 RequestDispatcher directory traversal vulnerability (14.06.2009)
 documentAPACHE, [SECURITY] CVE-2008-5515 RequestDispatcher directory traversal vulnerability (09.06.2009)
 documentAPACHE, [SECURITY] CVE-2009-0580 UPDATED Apache Tomcat User enumeration vulnerability with FORM authentication (05.06.2009)
 documentAPACHE, [SECURITY] CVE-2009-0783 Apache Tomcat Information disclosure (05.06.2009)
 documentAPACHE, [SECURITY] CVE-2009-0580 Apache Tomcat User enumeration vulnerability with FORM authentication (05.06.2009)
 documentAPACHE, [SECURITY] CVE-2009-0033 Apache Tomcat DoS when using Java AJP connector (05.06.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod