Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft Windows kernel UDP processing integer overflow
Published:09.11.2011
Source:
SecurityVulns ID:12025
Type:remote
Threat Level:
10/10
Description:Integer overflow leads to code execution via the flow of UDP packets to closed port.
Affected:MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
CVE:CVE-2011-2013 (Integer overflow in the TCP/IP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code by sending a sequence of crafted UDP packets to a closed port, aka "Reference Counter Overflow Vulnerability.")
Files:Microsoft Security Bulletin MS11-083 - Critical Vulnerability in TCP/IP Could Allow Remote Code Execution (2588516)

Microsoft Windows DoS
Published:09.11.2011
Source:
SecurityVulns ID:12026
Type:client
Threat Level:
5/10
Description:Crash on TTF fonts parsing.
Affected:MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
CVE:CVE-2011-2004 (Array index error in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows remote attackers to cause a denial of service (reboot) via a crafted TrueType font file, aka "TrueType Font Parsing Vulnerability," a different vulnerability than CVE-2011-3402.)
Files:Microsoft Security Bulletin MS11-084 - Moderate Vulnerability in Windows Kernel-Mode Drivers Could Allow Denial of Service (2617657)

Microsoft Windows active directory authentication bypass
Published:09.11.2011
Source:
SecurityVulns ID:12027
Type:remote
Threat Level:
4/10
Description:Certificate revocation list is not checked on LDAPs access.
Affected:MICROSOFT : Windows 2008 Server
CVE:CVE-2011-2014 (The LDAP over SSL (aka LDAPS) implementation in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS) in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not examine Certificate Revocation Lists (CRLs), which allows remote authenticated users to bypass intended certificate restrictions and access Active Directory resources by leveraging a revoked X.509 certificate for a domain account, aka "LDAPS Authentication Bypass Vulnerability.")

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod