Computer Security
[EN] securityvulns.ru no-pyccku


FreeSSHD / FreeFTPD authentication bypass
Published:09.12.2012
Source:
SecurityVulns ID:12755
Type:remote
Threat Level:
6/10
Description:Authentication results are not checked then client starts ssh session.
Affected:WEONLYDO : FreeSSHD 2.1
 WEONLYDO : FreeFTPD 2.3
Files:FreeSSHD all version Remote Authentication Bypass ZERODAY
 FreeFTPD all versions Remote System Level Exploit Zero-Day

IBM Director code execution
Published:09.12.2012
Source:
SecurityVulns ID:12756
Type:remote
Threat Level:
6/10
Description:It's possible to load DLL from any location.
Affected:IBM : IBM Director 5.20
CVE:CVE-2009-0880 (Directory traversal vulnerability in the CIM server in IBM Director before 5.20.3 Service Update 2 on Windows allows remote attackers to load and execute arbitrary local DLL code via a .. (dot dot) in a /CIMListener/ URI in an M-POST request.)
Original documentdocumentHI-TECH ., IBM System Director Remote System Level Exploit (CVE-2009-0880 extended zeroday) (09.12.2012)
Files:IBM System Director Remote System Level Exploit (CVE-2009-0880 extended zeroday)

Nagios XI security vulnerabilities
Published:09.12.2012
Source:
SecurityVulns ID:12757
Type:remote
Threat Level:
6/10
Description:Commands injection, SQL injection.
Affected:NAGIOS : Nagios XI Network Monitor 2011 1.9
Original documentdocumentNCC Group Research, NGS000194 Technical Advisory: Nagios XI Network Monitor Blind SQL Injection (09.12.2012)
 documentNCC Group Research, NGS000196 Technical Advisory: Nagios XI Network Monitor OS Command Injection (09.12.2012)

TVMOBiLi media server buffer overflow
Published:09.12.2012
Source:
SecurityVulns ID:12751
Type:remote
Threat Level:
6/10
Description:Buffer overflow while processing TCP/30888 GET request, multiple DoS conditions.
Affected:TVMOBILI : TVMOBiLi media server 2.1
CVE:CVE-2012-5451 (Multiple stack-based buffer overflows in HttpUtils.dll in TVMOBiLi before 2.1.0.3974 allow remote attackers to cause a denial of service (tvMobiliService service crash) via a long string in a (1) GET or (2) HEAD request to TCP port 30888.)
Original documentdocumentHigh-Tech Bridge Security Research, TVMOBiLi Media Server Multiple Remote DoS Vulnerabilities (09.12.2012)
 documentHigh-Tech Bridge Security Research, TVMOBiLi Media Server Multiple Remote DoS Vulnerabilities (09.12.2012)

HP Integrated Lights-Out information leakage
Published:09.12.2012
Source:
SecurityVulns ID:12758
Type:remote
Threat Level:
4/10
Affected:HP : iLO3
 HP : iLO4
CVE:CVE-2012-3271 (Unspecified vulnerability on the HP Integrated Lights-Out 3 (aka iLO3) with firmware before 1.50 and Integrated Lights-Out 4 (aka iLO4) with firmware before 1.13 allows remote attackers to obtain sensitive information via unknown vectors.)
Original documentdocumentHP, [security bulletin] HPSBHF02821 SSRT100934 rev.1 - HP Integrated Lights-Out iLO3 and iLO4, Remote Disclosure of Information (09.12.2012)

splunk DoS
Published:09.12.2012
Source:
SecurityVulns ID:12759
Type:remote
Threat Level:
5/10
Description:Crash on malcrafted packet.
Affected:SPLUNK : Splunk 4.3
Original documentdocumentsecurity_(at)_nruns.com, n.runs-SA-2012.004 - SPLUNK Unauthenticated remote DoS (09.12.2012)

SonicWALL Continues Data Protection multiple security vulnerabilities
Published:09.12.2012
Source:
SecurityVulns ID:12760
Type:remote
Threat Level:
5/10
Description:Multiple web interface vulnerabilities.
Affected:SONICWALL : Continues Data Protection 5040
Original documentdocumentVulnerability Lab, SonicWALL CDP 5040 v6.x - Multiple Web Vulnerabilities (09.12.2012)

python keyring weak cryptography
Published:09.12.2012
Source:
SecurityVulns ID:12761
Type:local
Threat Level:
4/10
Description:Insecure cipher initializaton
CVE:CVE-2012-4571 (Python Keyring 0.9.1 does not securely initialize the cipher when encrypting passwords for CryptedFileKeyring files, which makes it easier for local users to obtain passwords via a brute-force attack.)

xen multiple security vulnerabilities
Published:09.12.2012
Source:
SecurityVulns ID:12748
Type:local
Threat Level:
5/10
Description:Multiple DoS conditions.
Affected:XEN : Xen 4.1
CVE:CVE-2012-5515 (The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.)
 CVE-2012-5514 (The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.)
 CVE-2012-5513 (The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.)
 CVE-2012-5510 (Xen 4.x, when downgrading the grant table version, does not properly remove the status page from the tracking list when freeing the page, which allows local guest OS administrators to cause a denial of service (hypervisor crash) via unspecified vectors.)
 CVE-2012-4539 (Xen 4.0 through 4.2, when running 32-bit x86 PV guests on 64-bit hypervisors, allows local guest OS administrators to cause a denial of service (infinite loop and hang or crash) via invalid arguments to GNTTABOP_get_status_frames, aka "Grant table hypercall infinite loop DoS vulnerability.")
 CVE-2012-4538 (The HVMOP_pagetable_dying hypercall in Xen 4.0, 4.1, and 4.2 does not properly check the pagetable state when running on shadow pagetables, which allows a local HVM guest OS to cause a denial of service (hypervisor crash) via unspecified vectors.)
 CVE-2012-4537 (Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability.")
 CVE-2012-4535 (Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline.")
 CVE-2011-3131 (Xen 4.1.1 and earlier allows local guest OS kernels with control of a PCI[E] device to cause a denial of service (CPU consumption and host hang) via many crafted DMA requests that are denied by the IOMMU, which triggers a livelock.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2582-1] xen security update (09.12.2012)

HP Network Node Manager I unauthorized access
Published:09.12.2012
Source:
SecurityVulns ID:12749
Type:remote
Threat Level:
5/10
Affected:HP : Network Node Manager I 9.20
CVE:CVE-2012-3275 (Unspecified vulnerability in HP Network Node Manager i (NNMi) 9.1x and 9.20 allows remote attackers to execute arbitrary code via unknown vectors.)
Original documentdocumentHP, [security bulletin] HPSBMU02816 SSRT100949 rev.1 - HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Unauthorized Access (09.12.2012)

HP Intelligent Management Center User Access Manager unauthorized access
Published:09.12.2012
Source:
SecurityVulns ID:12750
Type:remote
Threat Level:
6/10
Description:uam.exe buffer overflow
Affected:HP : HP Intelligent Management Center 5.1
CVE:CVE-2012-3274 (Stack-based buffer overflow in uam.exe in the User Access Manager (UAM) component in HP Intelligent Management Center (IMC) before 5.1 E0101P01 allows remote attackers to execute arbitrary code via vectors related to log data.)
Original documentdocumentHP, [security bulletin] HPSB3C02831 SSRT100661 rev.1 - HP Intelligent Management Center User Access Manager (UAM), Remote Execution of Arbitrary Code (09.12.2012)

HP LaserJet Pro 400 MFP unauthorized access
Published:09.12.2012
Source:
SecurityVulns ID:12752
Type:remote
Threat Level:
5/10
Affected:HP : LaserJet Pro 400
CVE:CVE-2012-3273 (Multiple unspecified vulnerabilities on the HP LaserJet Pro 400 MFP M425 with firmware 20120625 and LaserJet 400 M401 with firmware 20120621 allow remote attackers to obtain sensitive information via unknown vectors.)
Original documentdocumentHP, [security bulletin] HPSBPI02807 SSRT100928 rev.1 - HP LaserJet Pro 400 Multi Function Printers, Remote Unauthorized Access (09.12.2012)

HP LaserJet printers crossite scripting
Published:09.12.2012
Source:
SecurityVulns ID:12753
Type:remote
Threat Level:
4/10
Affected:HP : Color LaserJet CP3525
 HP : LaserJet P3015
 HP : Color LaserJet CM3530
 HP : Color LaserJet CM6030
 HP : Color LaserJet CM6040
 HP : Color LaserJet CP4025
 HP : Color LaserJet CP4525
 HP : Color LaserJet CP6015
 HP : LaserJet P4014
 HP : LaserJet P4015
 HP : LaserJet P4515
CVE:CVE-2012-3272 (Cross-site scripting (XSS) vulnerability on the HP Color LaserJet CM3530 with firmware before 53.190.9, Color LaserJet CM60xx with firmware before 52.210.9, Color LaserJet CP3525 with firmware before 06.140.3 18, Color LaserJet CP4xxx with firmware before 07.120.6, Color LaserJet CP6015 with firmware before 04.160.3, LaserJet P3015 with firmware before 07.140.3, and LaserJet P4xxx with firmware before 04.170.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.)
Original documentdocumentHP, [security bulletin] HPSBPI02828 SSRT100778 rev.1 - HP LaserJet and Color LaserJet, Cross-Site Scripting (XSS) (09.12.2012)

F5 FirePass SSL VPN information leakage
Published:09.12.2012
Source:
SecurityVulns ID:12754
Type:local
Threat Level:
5/10
Description:CitrixAuth.php local files inclusion.
Affected:F5 : FirePass SSL VPN 7.0
Original documentdocumentSEC Consult Vulnerability Lab, SEC Consult SA-20121203-0 :: F5 FirePass SSL VPN Unauthenticated local file inclusion (09.12.2012)

Centrify Deployment Manager symbolic links vulnerability
updated since 09.12.2012
Published:02.01.2013
Source:
SecurityVulns ID:12762
Type:local
Threat Level:
5/10
Description:Insecure temporary files creation.
Affected:CENTRIFY : Centrify Deployment Manager 2.1
CVE:CVE-2012-6348 (Centrify Deployment Manager 2.1.0.283, as distributed in Centrify Suite before 2012.5, allows local users to (1) overwrite arbitrary files via a symlink attack on the adcheckDMoutput temporary file, or (2) overwrite arbitrary files and consequently gain privileges via a symlink attack on the centrify.cmd.0 temporary file.)
Original documentdocumentlarry0_(at)_me.com, Local root exploit for Centrify Deployment Manager < v2.1.0.283 local root (02.01.2013)
 documentlarry0_(at)_me.com, Centrify Deployment Manager v2.1.0.283 local root (11.12.2012)
 documentlarry0_(at)_me.com, Centrify Deployment Manager v2.1.0.283 (09.12.2012)
Files:Local root exploit for Centrify Deployment Manager

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod