Computer Security
[EN] securityvulns.ru no-pyccku


libmodplug library multiple security vulnerabilities
Published:07.05.2009
Source:
SecurityVulns ID:9897
Type:library
Threat Level:
5/10
Description:Buffer overflow on .PAT and .MED files parsing.
Affected:LIBMODPLUG : libmodplug 0.8
 LIBMODPLUG : libmodplug 0.7
CVE:CVE-2009-1438 (Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow.)
Original documentdocumentUBUNTU, [USN-771-1] libmodplug vulnerabilities (07.05.2009)

Pango library integer overflow
Published:07.05.2009
Source:
SecurityVulns ID:9896
Type:library
Threat Level:
6/10
Description:Integer overflow leading to heap buffer overflow.
Affected:PANGO : Pango 1.23
CVE:CVE-2009-1194 (Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox.)
Original documentdocumentWill Drewry, [oCERT-2009-001] Pango integer overflow in heap allocation size calculations (07.05.2009)

Garmin GPS navigator ActiveX unauthorized access
Published:07.05.2009
Source:
SecurityVulns ID:9898
Type:client
Threat Level:
5/10
Description:GARMINAXCONTROL.GarminAxControl_t.1 ActiveX allows device access without user's confirmation.
CVE:CVE-2009-0194 (The domain-locking implementation in the GARMINAXCONTROL.GarminAxControl_t.1 ActiveX control in npGarmin.dll in the Garmin Communicator Plug-In 2.6.4.0 does not properly enforce the restrictions that (1) download and (2) upload requests come from a web site specified by the user, which allows remote attackers to obtain sensitive information or reconfigure Garmin GPS devices via unspecified vectors related to a "synchronisation error.")
Original documentdocumentSECUNIA, Secunia Research: Garmin Communicator Plug-In Domain Locking Security Bypass (07.05.2009)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:07.05.2009
Source:
SecurityVulns ID:9900
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:KAYAKO : Kayako SupportSuite 3.04
 DRUPAL : Drupal 6.6
 DRUPAL : Drupal 6.11
 STGALLERY : ST-Gallery 0.1
Original documentdocumentDEBIAN, [SECURITY] [DSA 1792-1] New drupal6 packages fix multiple vulnerabilities (07.05.2009)
 documenty3nh4ck3r_(at)_gmail.com, SQL INJECTION VULNERABILITIES--ST-Gallery version 0.1 alpha--> (07.05.2009)
 documentpen-test_(at)_comodo.com, Persistent XSS in Kayako Support Suite (07.05.2009)

HP OpenView Network Node Manager code execution
updated since 28.04.2009
Published:07.05.2009
Source:
SecurityVulns ID:9878
Type:remote
Threat Level:
5/10
Description:ovalarmsrv integer overflow
CVE:CVE-2009-0720 (Unspecified vulnerability in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via unknown vectors.)
 CVE-2008-2438 (Integer overflow in ovalarmsrv.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via a crafted command to TCP port 2954, which triggers a heap-based buffer overflow.)
Original documentdocumentHP, [security bulletin] HPSBMA02425 SSRT080091 rev.1 - HP OpenView Network Node Manager (OV NNM), Remote Execution of Arbitrary Code (07.05.2009)
 documentSECUNIA, Secunia Research: HP OpenView Network Node Manager "ovalarmsrv" Integer Overflow (29.04.2009)
 documentHP, [security bulletin] HPSBMA02424 SSRT080125 rev.1 - HP OpenView Network Node Manager (OV NNM), Remote Execution of Arbitrary Code (28.04.2009)

ldns buffer overflow
updated since 07.05.2009
Published:27.11.2011
Source:
SecurityVulns ID:9899
Type:remote
Threat Level:
6/10
Description:Buffer overflow on records parsing.
Affected:LDNS : ldns 1.5
 LDNS : ldns 1.4
 LDNS : ldns 1.6
CVE:CVE-2011-3581 (Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns before 1.6.11 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Resource Record (RR) with an unknown type containing input that is longer than a specified length.)
 CVE-2009-1086 (Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns 1.4.x allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a DNS resource record (RR) with a long (1) class field (clas variable) and possibly (2) TTL field.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2353-1] ldns security update (27.11.2011)
 documentDEBIAN, [SECURITY] [DSA 1795-1] New ldns packages fix arbitrary code execution (07.05.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod