Computer Security
[EN] securityvulns.ru no-pyccku


ISC bind DoS
Published:06.12.2012
Source:
SecurityVulns ID:12742
Type:remote
Threat Level:
5/10
Description:Crash on malcrafted request processing if DNS64 option is enabled.
Affected:BIND : bind 9.8
CVE:CVE-2012-5688 (ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.)

libxml2 buffer overflow
Published:06.12.2012
Source:
SecurityVulns ID:12743
Type:library
Threat Level:
5/10
Description:Heap buffer overflow in xmlParseAttValueComplex
Affected:LIBXML : libxml2 2.9
CVE:CVE-2012-5134 (Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.)

CA XCOM code execution
Published:06.12.2012
Source:
SecurityVulns ID:12744
Type:remote
Threat Level:
5/10
Affected:CA : XCOM Data Transport 11.5
 CA : XCOM Data Transport 11.0
CVE:CVE-2012-5973 (CA XCOM Data Transport r11.0 and r11.5 on UNIX and Linux allows remote attackers to execute arbitrary commands via a crafted request.)
Original documentdocumentCA, CA20121205-01: Security Notice for CA XCOM Data Transport on Unix and Linux (06.12.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod