Computer Security
[EN] securityvulns.ru no-pyccku


QEMU sumbolic links vulnerability
Published:06.08.2012
Source:
SecurityVulns ID:12498
Type:local
Threat Level:
5/10
Description:Symbolic links vulnerability on snapshot creation.
Affected:QEMU : qemu 0.14
CVE:CVE-2012-2652 (The bdrv_open function in Qemu 1.0 does not properly handle the failure of the mkstemp function, when in snapshot node, which allows local users to overwrite or read arbitrary files via a symlink attack on an unspecified temporary file.)
Original documentdocumentUBUNTU, [USN-1522-1] QEMU vulnerability (06.08.2012)

libjpeg-turbo
Published:06.08.2012
Source:
SecurityVulns ID:12499
Type:library
Threat Level:
5/10
Description:Buffer overflow on JPEG decoding.
Affected:LIBJPEGTURBO : libjpeg-turbo 1.1
CVE:CVE-2012-2806 (Heap-based buffer overflow in the get_sos function in jdmarker.c in libjpeg-turbo 1.2.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large component count in the header of a JPEG image.)
Original documentdocumentMANDRIVA, [ MDVSA-2012:121 ] libjpeg-turbo (06.08.2012)

MIT Kerberos 5 security vulnerabilities
Published:06.08.2012
Source:
SecurityVulns ID:12500
Type:remote
Threat Level:
6/10
Description:Uninitialized pointer free, DoS.
Affected:MIT : krb5 1.9
 MIT : krb5 1.10
CVE:CVE-2012-1015 (The kdc_handle_protected_negotiation function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x before 1.9.5, and 1.10.x before 1.10.3 attempts to calculate a checksum before verifying that the key type is appropriate for a checksum, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free, heap memory corruption, and daemon crash) via a crafted AS-REQ request.)
 CVE-2012-1014 (The process_as_req function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.10.x before 1.10.3 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a malformed AS-REQ request.)
Original documentdocumentMIT, MITKRB5-SA-2012-001: KDC heap corruption and crash [CVE-2012-1014 CVE-2012-1015] (06.08.2012)

OpenOffice security vulnerabilities
updated since 06.08.2012
Published:29.08.2012
Source:
SecurityVulns ID:12497
Type:local
Threat Level:
5/10
Description:Multiple buffer overflows.
Affected:OPENOFFICE : OpenOffice 3.5
CVE:CVE-2012-2665 (Multiple heap-based buffer overflows in the XML manifest encryption tag parsing functionality in OpenOffice.org and LibreOffice before 3.5.5 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Open Document Text (.odt) file with (1) a child tag within an incorrect parent tag, (2) duplicate tags, or (3) a Base64 ChecksumAttribute whose length is not evenly divisible by four.)
Original documentdocumentAPACHE, CVE-2012-2665 Manifest-processing errors in Apache OpenOffice 3.4.0 (29.08.2012)
 documentTimo Warns, [PRE-SA-2012-05] Multiple heap-based buffer overflows in LibreOffice / OpenOffice (13.08.2012)
 documentDEBIAN, [SECURITY] [DSA 2520-1] openoffice.org security update (06.08.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod