Computer Security
[EN] securityvulns.ru no-pyccku


Apache mod_python information leak
Published:07.03.2007
Source:
SecurityVulns ID:7358
Type:remote
Threat Level:
5/10
Description:If used in output filter mode, large output can lead to content of freed memory is leaked.
Affected:APACHE : mod_python 3.1
CVE:CVE-2004-2680 (mod_python (libapache2-mod-python) 3.1.4 and earlier does not properly handle when output filters process more than 16384 bytes, which can cause filter.read to return portions of previously freed memory.)
 CVE-2004-2680 (mod_python (libapache2-mod-python) 3.1.4 and earlier does not properly handle when output filters process more than 16384 bytes, which can cause filter.read to return portions of previously freed memory.)
Original documentdocumentUBUNTU, [USN-430-1] mod_python vulnerability (07.03.2007)

Multiple gzip security vulnerabilities
updated since 19.09.2006
Published:07.03.2007
Source:
SecurityVulns ID:6626
Type:library
Threat Level:
7/10
Description:Buffer overflow, NULL pointer dereference, inifnite loop.
Affected:gzip : gzip 1.3
CVE:CVE-2006-4338 (unlzh.c in the LHZ component in gzip 1.3.5 allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted GZIP archive.)
 CVE-2006-4337 (Buffer overflow in the make_table function in the LHZ component in gzip 1.3.5 allows context-dependent attackers to execute arbitrary code via a crafted decoding table in a GZIP archive.)
 CVE-2006-4336 (Buffer underflow in the build_tree function in unpack.c in gzip 1.3.5 allows context-dependent attackers to execute arbitrary code via a crafted leaf count table that causes a write to a negative index.)
 CVE-2006-4335 (Array index error in the make_table function in unlzh.c in the LZH decompression component in gzip 1.3.5, when running on certain platforms, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GZIP archive that triggers an out-of-bounds write, aka a "stack modification vulnerability.")
 CVE-2006-4334 (Unspecified vulnerability in gzip 1.3.5 allows context-dependent attackers to cause a denial of service (crash) via a crafted GZIP (gz) archive, which results in a NULL dereference.)
Original documentdocumentHP, [security bulletin] HPSBUX02195 SSRT061237 rev.1 - HP-UX Running Software Distributor (SD), Remote Denial of Service (DoS) (07.03.2007)
 documentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-06:21.gzip (19.09.2006)

silce-server router DoS
Published:07.03.2007
Source:
SecurityVulns ID:7359
Type:remote
Threat Level:
5/10
Description:Invalid authentication hash algorithm with empty cipher causes NULL pointer crash.
Affected:SILC : silc-server 1.0
CVE:CVE-2007-1327 (The SILC_SERVER_CMD_FUNC function in apps/silcd/command.c in silc-server 1.0.2 allows remote attackers to cause a denial of service (NULL dereference and daemon crash) via a request without a cipher algorithm and an invalid HMAC algorithm.)
Original documentdocumentAlexander Heidenreich, [Full-disclosure] silc-server 1.0.2 denial-of-service vulnerability (07.03.2007)

Microsoft Windows files and folders management problems
updated since 07.03.2007
Published:10.03.2007
Source:
SecurityVulns ID:7357
Type:local
Threat Level:
6/10
Description:During file operations conditions exist for attacker to gain access to content of protected or locked files. It's also possible to create unmanageble file.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
Original documentdocument3APA3A, Pre-open files attack agains locked file (10.03.2007)
 document3APA3A, Microsoft Windows Vista/2003/XP/2000 file management security issues (07.03.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod