Computer Security
[EN] securityvulns.ru no-pyccku


HP OpenView Storage Data Protector privilege escalation
Published:09.02.2007
Source:
SecurityVulns ID:7205
Type:local
Threat Level:
5/10
Affected:HP : openView Storage Data Protector 5.50
CVE:CVE-2007-0866 (Unspecified vulnerability in HP OpenView Storage Data Protector on HP-UX B.11.00, B.11.11, or B.11.23 allows local users to execute arbitrary code via unknown vectors.)
Original documentdocumentHP, [security bulletin] HPSBMA02190 SSRT071300 rev.1 - HP OpenView Storage Data Protector, Local Execution of Arbitrary Code (09.02.2007)

HP Mercury LoadRunner Agent buffer overflow
Published:09.02.2007
Source:
SecurityVulns ID:7206
Type:remote
Threat Level:
6/10
Description:magentproc.exe (TCP/54345) stack buffer overrun on oversized server_ip_name paramter.
Affected:HP : Mercury LoadRunner Agent 8.1
 HP : Mercury LoadRunner Agent 8.0
 HP : Mercury Performance Center Agent 8.1
 HP : Mercury Performance Center Agent 8.0
 HP : Mercury Monitor over Firewall 8.1
CVE:CVE-2007-0446 (Stack-based buffer overflow in magentproc.exe for Hewlett-Packard Mercury LoadRunner Agent 8.0 and 8.1, Performance Center Agent 8.0 and 8.1, and Monitor over Firewall 8.1 allows remote attackers to execute arbitrary code via a packet with a long server_ip_name field to TCP port 54345, which triggers the overflow in mchan.dll.)
Original documentdocumentHP, [security bulletin] HPSBGN02187 SSRT061280 rev.1 - Mercury LoadRunner, Performance Center, Monitor over Firewall, Remote Unauthenticated Arbitrary Code Execution (09.02.2007)
 documentZDI, ZDI-07-007: HP Mercury LoadRunner Agent Stack Overflow Vulnerability (09.02.2007)

SAP Web Application Server multiple security vulnerabilities
Published:09.02.2007
Source:
SecurityVulns ID:7207
Type:remote
Threat Level:
6/10
Description:Directory traversal, local privilege escalation, DoS.
Affected:SAP : WebAS 6.40
 SAP : WebAS 7.00
Original documentdocumentnicob_(at)_nicob.net, Multiple vulnerabilities in SAP WebAS 6.40 and 7.00 (technical details) (09.02.2007)
Files:SAP 'enserver.exe' file downloader

Kiwi CatTools TFTO directory traversal
updated since 09.02.2007
Published:27.02.2007
Source:
SecurityVulns ID:7208
Type:remote
Threat Level:
5/10
Description:Built-in TFTP server directory traversal.
Affected:KIWI : CatTools 3.2
CVE:CVE-2007-0889 (Kiwi CatTools before 3.2.0 beta uses weak encryption ("reversible encoding") for passwords, account names, and IP addresses in kiwidb-cattools.kdb, which might allow local users to gain sensitive information by decrypting the file. NOTE: this issue could be leveraged with a directory traversal vulnerability for a remote attack vector.)
 CVE-2007-0888 (Directory traversal vulnerability in the TFTP server in Kiwi CatTools before 3.2.0 beta allows remote attackers to read arbitrary files, and upload files to arbitrary locations, via ..// (dot dot) sequences in the pathname argument to an FTP (1) GET or (2) PUT command.)
Original documentdocumentnoreply_(at)_ptsecurity.ru, [Full-disclosure] Kiwi CatTools TFTP server path traversal (27.02.2007)
 documentnicob_(at)_nicob.net, TFTP directory traversal in Kiwi CatTools (09.02.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod