Computer Security
[EN] securityvulns.ru no-pyccku


FreeBSD zfs weak permissions
updated since 07.01.2010
Published:08.04.2015
Source:
SecurityVulns ID:10502
Type:local
Threat Level:
3/10
Description:Weak file permissions may be set during transaction replay.
Affected:FREEBSD : FreeBSD 7.1
 FREEBSD : FreeBSD 7.2
 FREEBSD : FreeBSD 8.0
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-10:03.zfs (07.01.2010)

Mozilla Firefox / Thunderbird / Seamonkey multiple security vulnerabilities
Published:08.04.2015
Source:
SecurityVulns ID:14355
Type:client
Threat Level:
8/10
Description:Certificate check bypass, code execution, restrictions bypass, memory corruptions.
Affected:MOZILLA : Thunderbird 31.5
 MOZILLA : Firefox 36
 MOZILLA : Firefox ESR 31.5
CVE:CVE-2015-2706 (Race condition in the AsyncPaintWaitEvent::AsyncPaintWaitEvent function in Mozilla Firefox before 37.0.2 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted plugin that does not properly complete initialization.)
 CVE-2015-0816 (Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 do not properly restrict resource: URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy, as demonstrated by the resource: URL associated with PDF.js.)
 CVE-2015-0815 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2015-0814 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2015-0813 (Use-after-free vulnerability in the AppendElements function in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 on Linux, when the Fluendo MP3 plugin for GStreamer is used, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted MP3 file.)
 CVE-2015-0812 (Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.)
 CVE-2015-0811 (The QCMS implementation in Mozilla Firefox before 37.0 allows remote attackers to obtain sensitive information from process heap memory or cause a denial of service (out-of-bounds read) via an image that is improperly handled during transformation.)
 CVE-2015-0810 (Mozilla Firefox before 37.0 on OS X does not ensure that the cursor is visible, which allows remote attackers to conduct clickjacking attacks via a Flash object in conjunction with DIV elements associated with layered presentation, and crafted JavaScript code that interacts with an IMG element.)
 CVE-2015-0808 (The webrtc::VPMContentAnalysis::Release function in the WebRTC implementation in Mozilla Firefox before 37.0 uses incompatible approaches to the deallocation of memory for simple-type arrays, which might allow remote attackers to cause a denial of service (memory corruption) via unspecified vectors.)
 CVE-2015-0807 (The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.)
 CVE-2015-0806 (The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 attempts to use memset for a memory region of negative length during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors that trigger rendering of 2D graphics content.)
 CVE-2015-0804 (The HTMLSourceElement::BindToTree function in Mozilla Firefox before 37.0 does not properly constrain a data type after omitting namespace validation during certain tree-binding operations, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document containing a SOURCE element.)
 CVE-2015-0803 (The HTMLSourceElement::AfterSetAttr function in Mozilla Firefox before 37.0 does not properly constrain the original data type of a casted value during the setting of a SOURCE element's attributes, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document.)
 CVE-2015-0802 (Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods.)
 CVE-2015-0801 (Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.)
 CVE-2015-0800 (The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2012-2808.)
 CVE-2015-0799 (The HTTP Alternative Services feature in Mozilla Firefox before 37.0.1 allows man-in-the-middle attackers to bypass an intended X.509 certificate-verification step for an SSL server by specifying that server in the uri-host field of an Alt-Svc HTTP/2 response header.)
 CVE-2015-0798 (The Reader mode feature in Mozilla Firefox before 37.0.1 on Android, and Desktop Firefox pre-release, does not properly handle privileged URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy.)
 CVE-2012-2808 (The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2015-0800.)
Files: Mozilla Foundation Security Advisory 2015-30 Miscellaneous memory safety hazards (rv:37.0 / rv:31.6)
  Mozilla Foundation Security Advisory 2015-31 Use-after-free when using the Fluendo MP3 GStreamer plugin
  Mozilla Foundation Security Advisory 2015-32 Add-on lightweight theme installation approval bypassed through MITM attack
  Mozilla Foundation Security Advisory 2015-33 resource:// documents can load privileged pages
  Mozilla Foundation Security Advisory 2015-34 Out of bounds read in QCMS library
  Mozilla Foundation Security Advisory 2015-35 Cursor clickjacking with flash and images
  Mozilla Foundation Security Advisory 2015-36 Incorrect memory management for simple-type arrays in WebRTC
  Mozilla Foundation Security Advisory 2015-37 CORS requests should not follow 30x redirections after preflight
  Mozilla Foundation Security Advisory 2015-38 Memory corruption crashes in Off Main Thread Compositing
  Mozilla Foundation Security Advisory 2015-39 Use-after-free due to type confusion flaws
  Mozilla Foundation Security Advisory 2015-40 Same-origin bypass through anchor navigation
  Mozilla Foundation Security Advisory 2015-41 PRNG weakness allows for DNS poisoning on Android
  Mozilla Foundation Security Advisory 2015-42 Windows can retain access to privileged content on navigation to unprivileged pages
  Mozilla Foundation Security Advisory 2015-43 Loading privileged content through Reader mode
  Mozilla Foundation Security Advisory 2015-44 Certificate verification bypass through the HTTP/2 Alt-Svc header
  Mozilla Foundation Security Advisory 2015-45 Memory corruption during failed plugin initialization

libtasn1 memory corruption
Published:08.04.2015
Source:
SecurityVulns ID:14357
Type:library
Threat Level:
7/10
Description:Memory corruption on ASN.1 parsing.
Affected:LIBTASN1 : libtasn1 4.0
CVE:CVE-2015-2806 (Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.)
Original documentdocumentUBUNTU, [USN-2559-1] Libtasn1 vulnerability (08.04.2015)

FreeBSD weak permissions
Published:08.04.2015
Source:
SecurityVulns ID:14358
Type:local
Threat Level:
6/10
Description:Weak ZFS and GELI key files permissions.
Affected:FREEBSD : FreeBSD 10.1
CVE:CVE-2015-1415 (The bsdinstall installer in FreeBSD 10.x before 10.1 p9, when configuring full disk encrypted ZFS, uses world-readable permissions for the GELI keyfile (/boot/encryption.key), which allows local users to obtain sensitive key information by reading the file.)
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-15:08.bsdinstall (08.04.2015)
 documentFREEBSD, FreeBSD 10.x ZFS encryption.key disclosure (CVE-2015-1415) (08.04.2015)

FreeBSD IPv6 DoS
Published:08.04.2015
Source:
SecurityVulns ID:14359
Type:remote
Threat Level:
6/10
Description:It's possible to set low current hope limit via Neighbor Discover Protocol
Affected:FREEBSD : FreeBSD 10.1
 FREEBSD : FreeBSD 9.3
 FREEBSD : FreeBSD 8.4
CVE:CVE-2015-2923
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-15:09.ipv6 (08.04.2015)

ntpd restrictions bypass
Published:08.04.2015
Source:
SecurityVulns ID:14360
Type:remote
Threat Level:
6/10
Description:message authentication code implementation is invalid and can be bypasses.
Affected:FREEBSD : FreeBSD 10.1
 FREEBSD : FreeBSD 9.3
 FREEBSD : FreeBSD 8.4
CVE:CVE-2015-1799 (The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.)
 CVE-2015-1798 (The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC.)
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-15:07.ntp (08.04.2015)

tor DoS
Published:08.04.2015
Source:
SecurityVulns ID:14361
Type:remote
Threat Level:
5/10
Description:Multiple DoS conditions.
CVE:CVE-2015-2929
 CVE-2015-2928
Original documentdocumentDEBIAN, [SECURITY] [DSA 3216-1] tor security update (08.04.2015)
 documentDEBIAN, [SECURITY] [DSA 3203-1] tor security update (08.04.2015)

Apple Safari / Webkit multiple security vulnerabilities
updated since 08.04.2015
Published:19.04.2015
Source:
SecurityVulns ID:14356
Type:library
Threat Level:
8/10
Description:Invalid SSL validation, information leakage, crossite access, memory corruptions.
Affected:APPLE : Safari 8.0
 APPLE : Safari 6.2
 APPLE : Safari 7.1
CVE:CVE-2015-1129 (Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 does not properly select X.509 client certificates, which makes it easier for remote attackers to track users via a crafted web site.)
 CVE-2015-1128 (The private-browsing implementation in Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 allows attackers to obtain sensitive browsing-history information via vectors involving push-notification requests.)
 CVE-2015-1127 (The private-browsing implementation in WebKit in Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 places browsing history into an index, which might allow local users to obtain sensitive information by reading index entries.)
 CVE-2015-1126 (WebKit, as used in Apple iOS before 8.3 and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, does not properly handle the userinfo field in FTP URLs, which allows remote attackers to trigger incorrect resource access via unspecified vectors.)
 CVE-2015-1124 (WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.)
 CVE-2015-1122 (WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.)
 CVE-2015-1121 (WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.)
 CVE-2015-1120 (WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.)
 CVE-2015-1119 (WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.)
 CVE-2015-1112 (Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, as used on iOS before 8.3 and other platforms, does not properly delete browsing-history data from the history.plist file, which allows attackers to obtain sensitive information by reading this file.)
Original documentdocumentJouko Pynnonen, Safari iOS/OS X/Windows cookie access vulnerability (19.04.2015)
 documentAPPLE, APPLE-SA-2015-04-08-1 Safari 8.0.5, Safari 7.1.5, and Safari 6.2.5 (08.04.2015)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod