Computer Security
[EN] securityvulns.ru no-pyccku


PCRE and perl regular expression handling multiple security vulnerabilities
Published:07.11.2007
Source:
SecurityVulns ID:8321
Type:library
Threat Level:
7/10
Description:Buffer overflows and memory corruptions on different regexps.
Affected:PERL : perl 5.8
 PCRE : pcre 7.3
CVE:CVE-2007-5116
 CVE-2007-4768 (Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.)
 CVE-2007-4767
 CVE-2007-4766
 CVE-2007-1662
 CVE-2007-1661 (Perl-Compatible Regular Expression (PCRE) library before 7.3 backtracks too far when matching certain input bytes against some regex patterns in non-UTF-8 mode, which allows context-dependent attackers to obtain sensitive information or cause a denial of service (crash), as demonstrated by the "\X?\d" and "\P{L}?\d" patterns.)
 CVE-2007-1660 (Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.)
 CVE-2007-1659 (Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via regex patterns containing unmatched "\Q\E" sequences with orphan "\E" codes.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 1399-1] New pcre3 packages fix arbitrary code execution (07.11.2007)
 documentMANDRIVA, [ MDKSA-2007:207 ] - Updated perl packages fix vulnerability (07.11.2007)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
updated since 07.11.2007
Published:07.11.2007
Source:
SecurityVulns ID:8322
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc. WordPress Peter’s Custom Anti-Spam Image: CAPTCHA protection bypass.
Affected:IDMOS : IDMOS 1.0
 CYPBX : Cyp/bx 1.0
 SFSHOUTBOX : SF-Shoutbox 1.4
 PLONE : Plone 2.5
CVE:CVE-2007-5741 (Plone 2.5 through 2.5.4 and 3.0 through 3.0.2 allows remote attackers to execute arbitrary Python code via network data containing pickled objects for the (1) statusmessages or (2) linkintegrity module, which the module unpickles and executes.)
Original documentdocumentmj_(at)_jarn.com, [CVE-2007-5741] Plone: statusmessages and linkintegrity unsafe network data hotfix (07.11.2007)
 documentAdvisory_(at)_Aria-Security.net, MyWebFTP Password Disclosure (07.11.2007)
 documentSkyOut, [Full-disclosure] SF-Shoutbox 1.2.1 <= 1.4 HTML/JS Injection Vulnerability (07.11.2007)
 documentGuns_(at)_0x90.com.ar, PhpNuke (add-on) MS TopSites Edit Exploit And Html Injection (07.11.2007)
 documentChris, Cypress BX script backdoored? (07.11.2007)
 documentGuns_(at)_0x90.com.ar, IDMOS v1.0 Alpha Multiple RFI Vulnerability (07.11.2007)
 documenth3llcode_(at)_hotmail.it, SMF .htaccess bypass (07.11.2007)
Files:Exploits PhpNuke (add-on) MS TopSites Edit And Html Injection

Symantec Norton AntiVirus for Mac privilege escalation
Published:07.11.2007
Source:
SecurityVulns ID:8323
Type:local
Threat Level:
5/10
Description:External application is executed by relative path.
Original documentdocumentWilliam A. Carrel, [Full-disclosure] Local Privilege Escalation in Norton AntiVirus for Mac (07.11.2007)

Microsoft Sysinternals DebugView privilege escalation
Published:07.11.2007
Source:
SecurityVulns ID:8324
Type:local
Threat Level:
4/10
Description:Dbgv.sys Driver allows any user to copy any data in kernel memory.
Affected:SYSINTERNALS : DebugView 4.64
CVE:CVE-2007-4223
Original documentdocumentIDEFENSE, iDefense Security Advisory 11.06.07: Microsoft DebugView Privilege Escalation Vulnerability (07.11.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod