Computer Security
[EN] securityvulns.ru no-pyccku


ElasticSearch double free
Published:08.07.2013
Source:
SecurityVulns ID:13149
Type:remote
Threat Level:
5/10
Description:ElasticSearch rsyslog plugin doble free().
Affected:RSYSLOG : ElasticSearch 7.4
 RSYSLOG : ElasticSearch 7.5
CVE:CVE-2013-4758 (Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response.)
Original documentdocumentLSE Leading Security Experts GmbH (Security Advisories), LSE Leading Security Experts GmbH - LSE-2013-07-03 - rsyslog ElasticSearch Plugin (08.07.2013)

Avast antiviral products multiple security vulnerabilities
Published:08.07.2013
Source:
SecurityVulns ID:13150
Type:local
Threat Level:
4/10
Description:Privilege escalations.
Affected:AVAST : Avast! Internet Security 8.0
 AVAST : Avast! Antivirus 8.0
Original documentdocumentVulnerability Lab, AVAST Antivirus v8.0.1489 - Multiple Core Vulnerabilities (08.07.2013)
 documentVulnerability Lab, AVAST Universal Core Installer - Multiple Vulnerabilities (08.07.2013)
 documentVulnerability Lab, AVAST Internet Security Suite - Persistent Vulnerabilities (08.07.2013)

perl Module::Signature privilege escalation
Published:08.07.2013
Source:
SecurityVulns ID:13151
Type:library
Threat Level:
5/10
Description:Relative path is used to execute external application.
Affected:PERL : Module::Signature 0.68
CVE:CVE-2013-2145 (The cpansign verify functionality in the Module::Signature module before 0.72 for Perl allows attackers to bypass the signature check and execute arbitrary code via a SIGNATURE file with a "special unknown cipher" that references an untrusted module in Digest/.)
Original documentdocumentUBUNTU, [USN-1896-1] Module::Signature perl module vulnerability (08.07.2013)

libvirt DoS
Published:08.07.2013
Source:
SecurityVulns ID:13152
Type:library
Threat Level:
5/10
Description:Resources exhaustion.
Affected:LIBVIRT : libvirt 1.0
CVE:CVE-2013-1962 (The remoteDispatchStoragePoolListAllVolumes function in the storage pool manager in libvirt 1.0.5 allows remote attackers to cause a denial of service (file descriptor consumption) via a large number of requests "to list all volumes for the particular pool.")
Original documentdocumentUBUNTU, [USN-1895-1] libvirt vulnerability (08.07.2013)

php-radius buffer overflow
Published:08.07.2013
Source:
SecurityVulns ID:13153
Type:library
Threat Level:
5/10
Description:Buffer overflow in radius_get_vendor_attr()
Affected:PHP : php-radius 1.2
CVE:CVE-2013-2220 (Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.)
Original documentdocumentMANDRIVA, [ MDVSA-2013:192 ] php-radius (08.07.2013)

autotrace buffer overflow
Published:08.07.2013
Source:
SecurityVulns ID:13155
Type:library
Threat Level:
5/10
Description:Buffer overflow on BMP processing.
Affected:AUTOTRACE : autotrace 0.31
CVE:CVE-2013-1953 (Integer underflow in the input_bmp_reader function in input-bmp.c in AutoTrace 0.31.1 allows context-dependent attackers to cause have an unspecified impact via a small value in the biSize field in the header of a BMP file, which triggers a buffer overflow.)
Original documentdocumentMANDRIVA, [ MDVSA-2013:190 ] autotrace (08.07.2013)

WinAmp security vulnerabilities
Published:08.07.2013
Source:
SecurityVulns ID:13157
Type:client
Threat Level:
5/10
Description:Buffer overflow, uninitialized pointer dereference.
Affected:WINAMP : WinAmp 5.63
CVE:CVE-2013-4695
 CVE-2013-4694 (Stack-based buffer overflow in gen_jumpex.dll in Winamp before 5.64 Build 3418 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a package with a long Skin directory name. NOTE: a second buffer overflow involving a long GUI Search field to ml_local.dll was also reported. However, since it is only exploitable by the user of the application, this issue would not cross privilege boundaries unless Winamp is running under a highly restricted environment such as a kiosk.)
Original documentdocumentInshell Security, [CVE-2013-4695] WinAmp v5.63 gen_ff.dll links.xml Value Parsing Invalid Pointer Dereference (08.07.2013)
 documentInshell Security, [CVE-2013-4694] WinAmp v5.63 gen_jumpex.dll and ml_local.dll Multiple Buffer Overflows (08.07.2013)

Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:08.07.2013
Source:
SecurityVulns ID:13158
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:TINYMCE : TinyMCE 3.4
 WORDPRESS : WordPress 3.5
 TINYMCE : TinyMCE 4.0
 WORDPRESS : AntiVirus for WordPress 1.3
 WORDPRESS : Exploit Scanner for WordPress 1.3
 MCIMAGEMANAGER : Moxiecode Image Manager 3.1
 MOXIECODE : Moxiecode File Manager 3.1
 VIDEOJS : VideoJS Flash Component 3.0
 WORDPRESS : Spider Catalog 1.4
 WORDPRESS : Spider Event Calendar 1.3
CVE:CVE-2013-2205 (The default configuration of SWFUpload in WordPress before 3.5.2 has an unrestrictive security.allowDomain setting, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted web site.)
 CVE-2013-2204 (moxieplayer.as in Moxiecode moxieplayer, as used in the TinyMCE Media plugin in WordPress before 3.5.2 and other products, does not consider the presence of a # (pound sign) character during extraction of the QUERY_STRING, which allows remote attackers to pass arbitrary parameters to a Flash application, and conduct content-spoofing attacks, via a crafted string after a ? (question mark) character.)
 CVE-2013-2203 (WordPress before 3.5.2, when the uploads directory forbids write access, allows remote attackers to obtain sensitive information via an invalid upload request, which reveals the absolute path in an XMLHttpRequest error message.)
 CVE-2013-2202 (WordPress before 3.5.2 allows remote attackers to read arbitrary files via an oEmbed XML provider response containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.)
 CVE-2013-2201 (Multiple cross-site scripting (XSS) vulnerabilities in WordPress before 3.5.2 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) uploads of media files, (2) editing of media files, (3) installation of plugins, (4) updates to plugins, (5) installation of themes, or (6) updates to themes.)
 CVE-2013-2200 (WordPress before 3.5.2 does not properly check the capabilities of roles, which allows remote authenticated users to bypass intended restrictions on publishing and authorship reassignment via unspecified vectors.)
 CVE-2013-2199 (The HTTP API in WordPress before 3.5.2 allows remote attackers to send HTTP requests to intranet servers via unspecified vectors, related to a Server-Side Request Forgery (SSRF) issue, a similar vulnerability to CVE-2013-0235.)
 CVE-2013-2173 (wp-includes/class-phpass.php in WordPress 3.5.1, when a password-protected post exists, allows remote attackers to cause a denial of service (CPU consumption) via a crafted value of a certain wp-postpass cookie.)
Original documentdocumentiedb.team_(at)_gmail.com, WordPress category-grid-view-galler plugin Cross-Site Scripting Vulnerabilities (08.07.2013)
 documentiedb.team_(at)_gmail.com, WordPress feed plugin Sql Injection (08.07.2013)
 documentiedb.team_(at)_gmail.com, Wordpress wp-private-messages Plugin Sql Injection vulnerability (08.07.2013)
 documentJanek Vind, [waraxe-2013-SA#104] - Multiple Vulnerabilities in Spider Event Calendar Wordpress Plugin (08.07.2013)
 documentJanek Vind, [waraxe-2013-SA#105] - Multiple Vulnerabilities in Spider Catalog Wordpress Plugin (08.07.2013)
 documentKrzysztof Katowicz-Kowalewski, WordPress 3.5.1, Denial of Service (08.07.2013)
 documentDEBIAN, [SECURITY] [DSA 2718-1] wordpress security update (08.07.2013)
 documentMustLive, XSS and FPD vulnerabilities in Search and Share for WordPress (08.07.2013)
 documentMustLive, Vulnerabilities in multiple plugins for WordPress with VideoJS (08.07.2013)
 documentMustLive, Multiple vulnerabilities in multiple themes for WordPress with VideoJS (08.07.2013)
 documentMustLive, AFU vulnerabilities in MCFileManager for TinyMCE (08.07.2013)
 documentMustLive, AFU vulnerabilities in MCImageManager for TinyMCE (08.07.2013)
 documentMustLive, XSS and FPD vulnerabilities in I Love It New theme for WordPress (08.07.2013)
 documentMustLive, FPD and Security bypass vulnerabilities in Exploit Scanner for WordPress (08.07.2013)
 documentMustLive, FPD and Security bypass vulnerabilities in AntiVirus for WordPress (08.07.2013)
 documentMustLive, FPD, XSS and CS vulnerabilities in Slash WP theme for WordPress (08.07.2013)
 documentMustLive, XSS and FPD vulnerabilities in Search 'N Save for WordPress (08.07.2013)
 documentMustLive, WordPress Denial of Service exploit (08.07.2013)
 documentMustLive, Content Spoofing vulnerabilities in TinyMCE and WordPress (08.07.2013)
 documentMustLive, Denial of Service in WordPress (08.07.2013)
 documentMustLive, Cross-Site Scripting vulnerabilities in WordPress (08.07.2013)

perl-Dancer headers injection
Published:08.07.2013
Source:
SecurityVulns ID:13159
Type:library
Threat Level:
5/10
Description:headers injection in cookie handling methods.
Affected:PERL : perl-Dancer 1.311
CVE:CVE-2012-5572 (CRLF injection vulnerability in the cookie method (lib/Dancer/Cookie.pm) in Dancer before 1.3114 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a cookie name, a different vulnerability than CVE-2012-5526.)
Original documentdocumentMANDRIVA, [ MDVSA-2013:184 ] perl-Dancer (08.07.2013)

fail2ban DoS
updated since 08.07.2013
Published:15.07.2013
Source:
SecurityVulns ID:13154
Type:remote
Threat Level:
5/10
Description:It's possible to trigger a block for arbitrary client.
Affected:FAIL2BAN : fail2ban 0.8
CVE:CVE-2013-2178 (The apache-auth.conf, apache-nohome.conf, apache-noscript.conf, and apache-overflows.conf files in Fail2ban before 0.8.10 do not properly validate log messages, which allows remote attackers to block arbitrary IP addresses via certain messages in a request.)
Original documentdocumentKrzysztof Katowicz-Kowalewski, Fail2ban 0.8.9, Denial of Service (Apache rules only) (15.07.2013)
 documentMANDRIVA, [ MDVSA-2013:191 ] fail2ban (08.07.2013)

Linksys EA access points authentication bypass
updated since 08.07.2013
Published:20.08.2013
Source:
SecurityVulns ID:13156
Type:remote
Threat Level:
6/10
Description:It's possible to access web administration without authentication.
Affected:CISCO : Linksys EA2700
 CISCO : Linksys EA3500
 CISCO : Linksys EA4200
 CISCO : Linksys EA4500
CVE:CVE-2013-5122
Original documentdocumentkyle Lovett, Update: Linksys EA2700, EA3500, E4200v2, EA4500 Unspecified unauthenticated remote access (20.08.2013)
 documentkyle Lovett, Linksys EA - 2700, 3500, 4200, 4500 w/ Lighttpd 1.4.28 Unauthenticated Remote Administration Access (08.07.2013)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod