Computer Security
[EN] securityvulns.ru no-pyccku


Barracuda Spam Firewall multiple security vulnerabilities
updated since 02.08.2006
Published:09.08.2006
Source:
SecurityVulns ID:6430
Type:remote
Threat Level:
7/10
Description:Login.pm Web-interface hardcoded guest account password, /cgi-bin/preview_email.cgi directory traversal.
Affected:BARRACUDA : Barracuda Spam Firewall 3.3
Original documentdocumentMILW0RM, Barracuda Arbitrary File Disclosure + Command Execution (09.08.2006)
 documentMatthew Hall, [Full-disclosure] Barracuda Spam Firewall: Administrator Level Remote Command Execution [ID-20060804-01] (04.08.2006)
 documentgssincla_(at)_nnlsoftware.com, Barracuda Vulnerability: Arbitrary File Disclosure [NNL-20060801-02] (02.08.2006)
 documentgssincla_(at)_nnlsoftware.com, Barracuda Vulnerability: Hardcoded Password [NNL-20060801-01] (02.08.2006)

ClamAV antivirus buffer overflow
updated since 07.08.2006
Published:09.08.2006
Source:
SecurityVulns ID:6457
Type:remote
Threat Level:
7/10
Description:Buffer overflow on parsing UPX-compressed PE files.
Affected:CLAMAV : ClamAV 0.88
Original documentdocumentDamian Put, [Full-disclosure] [Overflow.pl] Clam AntiVirus Win32-UPX Heap Overflow (09.08.2006)
 documentSECUNIA, [SA21374] Clam AntiVirus pefromupx() Buffer Overflow Vulnerability (07.08.2006)
Files:Clam AntiVirus Win32-UPX Heap Overflow PoC

Microsoft Windows DNS client buffer overflows
updated since 08.08.2006
Published:09.08.2006
Source:
SecurityVulns ID:6464
Type:library
Threat Level:
9/10
Description:Buffer overflows in Winsock API and DNS client code.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
Original documentdocumentMICROSOFT, Microsoft Security Bulletin MS06-041 Vulnerability in DNS Resolution Could Allow Remote Code Execution (920683) (08.08.2006)
Files:POC for MS06-041
 Microsoft Security Bulletin MS06-041 Vulnerability in DNS Resolution Could Allow Remote Code Execution (920683)

Microsoft Windows crossite MMC access
updated since 08.08.2006
Published:09.08.2006
Source:
SecurityVulns ID:6466
Type:client
Threat Level:
7/10
Description:Script from Internet/Intranet zone site can access any Microsoft Management Console's object.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
Original documentdocumentMICROSOFT, Microsoft Security Bulletin MS06-044 Vulnerability in Microsoft Management Console Could Allow Remote Code Execution (917008) (08.08.2006)
Files:Microsoft Security Bulletin MS06-044 Vulnerability in Microsoft Management Console Could Allow Remote Code Execution (917008)

Microsoft Visual Basic for Applications buffer overflow
updated since 08.08.2006
Published:09.08.2006
Source:
SecurityVulns ID:6468
Type:library
Threat Level:
6/10
Description:Buffer oveflow on VBA script parsing.
Affected:MICROSOFT : Office 2000
 MICROSOFT : Office XP
 MICROSOFT : Works 2004
 MICROSOFT : Works 2005
 MICROSOFT : Works 2006
Original documentdocumentMICROSOFT, Microsoft Security Bulletin MS06-047 Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution (921645) (08.08.2006)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:09.08.2006
Source:
SecurityVulns ID:6470
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:ARCHANGELWEBLOG : Archangel Weblog 0.90
 SIMPLEGUESTBOOK : Simple one-file guestbook 1.0
 DOCPILEWE : docpile:we 0.2
 PHPNNTP : phNNTP 1.3
 SMARTSITECMS : SmartSiteCMS 1.0
 PHPCODECABINET : phpCodeCabinet 0.5
 CAKEPHP : CakePHP 1.1
 TORBSTOFF : Torbstoff News 4.0
 THEADDRESSBOOK : The Address Book 1.04
 THEADDRESSBOOK : The Address Book Reloaded 2.0
Original documentdocumentSECUNIA, [SA21432] Comet WebFileManager "Language" File Inclusion Vulnerability (09.08.2006)
 documentadmin_(at)_asianeagle.org, [SA21397] YenerTurk Haber Script "id" SQL Injection Vulnerability (09.08.2006)
 documentSECUNIA, [SA21379] The Address Book Reloaded Login SQL Injection Vulnerabilities (09.08.2006)
 documentSECUNIA, [SA21364] The Address Book Login SQL Injection Vulnerabilities (09.08.2006)
 documentSECUNIA, [SA21375] Torbstoff News "pfad" File Inclusion Vulnerability (09.08.2006)
 documentSECUNIA, [SA21383] CakePHP error.php Cross-Site Scripting Vulnerability (09.08.2006)
 documentSECUNIA, [SA21386] phpCodeCabinet "BEAUT_PATH" File Inclusion Vulnerability (09.08.2006)
 documentVicente Perez, [Full-disclosure] Latinchat Denial Of Service (09.08.2006)
 documentNah, [Full-disclosure] SmartSiteCMS v1.0 authentication bypass (09.08.2006)
 documenttugra_(at)_icqmail.com, MojoScripts' xss vulnerable (09.08.2006)
 documenttr_zindan_(at)_wolfsecurity.org, phNNTP <= 1.3 (article-raw.php) Remote File Include Vulnerability (09.08.2006)
 documentx0r0n_(at)_hotmail.com, docpile:we v0.2.2 (INIT_PATH) Remote File Inclusion Vulnerability (09.08.2006)
 documentpiiiiiii pppiiiiiiii, Archangel Weblog 0.90.02 and prior Multiple HTML injections (09.08.2006)
 documentomnipresent_(at)_email.it, Simple GuestBook Bug (09.08.2006)

Novell Groupwise Webaccess crossite scripting
Published:09.08.2006
Source:
SecurityVulns ID:6472
Type:remote
Threat Level:
5/10
Affected:NOVELL : GroupWise 6.5
 NOVELL : GroupWise 7
Original documentdocumentFrancisco Amato, [Full-disclosure] [ISR] - Novell Groupwise Webaccess (Cross-Site Scripting) (09.08.2006)

Linux Ext3 file system NFS DoS
Published:09.08.2006
Source:
SecurityVulns ID:6473
Type:remote
Threat Level:
6/10
Description:On malformed UDP packet filesystem is marked as corrupted and is switched to read-only mode.
Original documentdocumentJames McKenzie, Bad ext3/nfs DoS bug (09.08.2006)
Files:This program will generate fatal ext3 panics on any linux NFS server unfortunate enough to have it pointed at it

Multiple Microsoft Internet Explorer and Windows security vulnerabilities
updated since 28.06.2006
Published:09.08.2006
Source:
SecurityVulns ID:6314
Type:client
Threat Level:
7/10
Description:Cross-domain page content access, MSHTA code execution.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Internet Explorer 6.0
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 GOSURF : GoSuRF Browser 2.62
 FASTBROWSER : Fast Browser Pro 8.1
 ENIGMA : Enigma Browser 3.8
 NETCAPTOR : NetCaptor 4.5
 SLIMBROWSER : Slim Browser 4.07
 FINEBROWSER : FineBrowser 3.2
 PHASEOUT : PhaseOut 5.4
 MAXTHON : Maxthon 1.5
 GREENBROWSER : GreenBrowser 3.4
 MYWEB4NET : MYweb4net Browser 3.8
CVE:CVE-2006-6992 (Cross-domain vulnerability in GoSuRF Browser 2.62 allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object, a similar vulnerability to CVE-2006-3280.)
 CVE-2006-6991 (Cross-domain vulnerability in Fast Browser Pro 8.1 allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object, a similar vulnerability to CVE-2006-3280.)
 CVE-2006-6990 (Cross-domain vulnerability in Enigma Browser 3.8.8 allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object, a similar vulnerability to CVE-2006-3280.)
 CVE-2006-6989 (Cross-domain vulnerability in NetCaptor 4.5.7 Personal Edition allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object, a similar vulnerability to CVE-2006-3280.)
 CVE-2006-6988 (Cross-domain vulnerability in Slim Browser 4.07 build 100 allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object, a similar vulnerability to CVE-2006-3280.)
 CVE-2006-6987 (Cross-domain vulnerability in FineBrowser Freeware 3.2.2 allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object, a similar vulnerability to CVE-2006-3280.)
 CVE-2006-6986 (Cross-domain vulnerability in PhaseOut 5.4.4 allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object, a similar vulnerability to CVE-2006-3280.)
 CVE-2006-6985 (Cross-domain vulnerability in Maxthon 1.5.6 build 42 allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object, a similar vulnerability to CVE-2006-3280.)
 CVE-2006-6984 (Cross-domain vulnerability in GreenBrowser 3.4.0622 allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object, a similar vulnerability to CVE-2006-3280.)
 CVE-2006-6983 (Cross-domain vulnerability in MYweb4net Browser 3.8.8.0 allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object, a similar vulnerability to CVE-2006-3280.)
 CVE-2006-3280 (Cross-domain vulnerability in Microsoft Internet Explorer 6.0 allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object, aka "Redirect Cross-Domain Information Disclosure Vulnerability.")
Original documentdocumentMICROSOFT, Microsoft Security Bulletin MS06-045 Vulnerability in Windows Explorer Could Allow Remote Code Execution (921398) (08.08.2006)
 documentPlebo Aesdi Nael, IE_ONE_MINOR_ONE_MAJOR (28.06.2006)
Files:Microsoft Security Bulletin MS06-045 Vulnerability in Windows Explorer Could Allow Remote Code Execution (921398)

Internet Explorer HTML Help ActiveX buffer overflow
updated since 04.07.2006
Published:09.08.2006
Source:
SecurityVulns ID:6338
Type:client
Threat Level:
7/10
Description:Buffer overflow on oversized 'Image' property. Vulnerability can be used for hidden trojan installation.
Original documentdocumentMICROSOFT, Microsoft Security Bulletin MS06-046 Vulnerability in HTML Help Could Allow Remote Code Execution (922616) (08.08.2006)
 documentHDMOORE, MoBB #2: Internet.HHCtrl Image Property (04.07.2006)
Files:Internet Explorer HTML Help ActiveX Control Memory Corruption PoC
 Microsoft Security Bulletin MS06-046 Vulnerability in HTML Help Could Allow Remote Code Execution

MIT Kerberos / Heimdal privilege escalation
updated since 09.08.2006
Published:10.08.2006
Source:
SecurityVulns ID:6471
Type:local
Threat Level:
6/10
Description:setuid()/seteuid() return code is not checked, allowing user to bypass protection by exhausting user limits.
Affected:HEIMDAL : Heimdal 0.5
 MIT : krb5 1.4
 HEIMDAL : Heimdal 0.6
 HEIMDAL : Heimdal 0.7
 MIT : krb5 1.5
Original documentdocumentSECUNIA, [SA21436] Heimdal setuid Security Issue (10.08.2006)
 documentMIT, MITKRB-SA-2006-001: multiple local privilege escalation vulnerabilities (09.08.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod