Computer Security
[EN] securityvulns.ru no-pyccku


X.org / XFree68 multiple integer overflows
updated since 09.01.2007
Published:10.01.2007
Source:
SecurityVulns ID:7024
Type:local
Threat Level:
6/10
Description:Integer overflow in DBE and Renderer extensions.
Affected:XFREE : XFree86 4.3
 XFREE : XFree86 4.6
 X.ORG : X.org 6.8
 XFREE : XFree86 4.5
 XFREE : XFree86 4.4
CVE:CVE-2006-6103 (Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.)
 CVE-2006-6102 (Integer overflow in the ProcDbeGetVisualInfo function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.)
 CVE-2006-6101 (Integer overflow in the ProcRenderAddGlyphs function in the Render extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of glyph management data structures.)
Original documentdocumentIDEFENSE, iDefense Security Advisory 01.09.07: Multiple Vendor X Server DBE Extension ProcDbeSwapBuffers Memory Corruption Vulnerability (10.01.2007)
 documentIDEFENSE, iDefense Security Advisory 01.09.07: Multiple Vendor X Server DBE Extension ProcDbeGetVisualInfo Memory Corruption Vulnerability (10.01.2007)
 documentIDEFENSE, iDefense Security Advisory 01.09.07: Multiple Vendor X Server Render Extension ProcRenderAddGlyphs Memory Corruption Vulnerability (10.01.2007)
 documentUBUNTU, [USN-403-1] X.org vulnerabilities (09.01.2007)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:10.01.2007
Source:
SecurityVulns ID:7032
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:EASYBANNER : Easy Banner Pro 2.8
CVE:CVE-2007-0190 (PHP remote file inclusion vulnerability in edit_address.php in edit-x ecommerce allows remote attackers to execute arbitrary PHP code via a URL in the include_dir parameter.)
 CVE-2007-0178 (PHP remote file inclusion vulnerability in info.php in Easy Banner Pro 2.8 allows remote attackers to execute arbitrary PHP code via a URL in the s[phppath] parameter.)
Original documentdocumentstormhacker_(at)_hotmail.com, edit-x ecommerce (include_dir) Remote File include (10.01.2007)
 documentstormhacker_(at)_hotmail.com, Easy Banner Pro Version 2.8 <= Remote File Inclusion (10.01.2007)

Adobe Reader buffer overflow
Published:10.01.2007
Source:
SecurityVulns ID:7033
Type:client
Threat Level:
7/10
Description:Heap buffer overflow on PDF parsing.
Affected:ADOBE : Acrobat Reader 7.0
CVE:CVE-2006-5857 (Adobe Reader and Acrobat 7.0.8 and earlier allows user-assisted remote attackers to execute code via a crafted PDF file that triggers memory corruption and overwrites a subroutine pointer during rendering.)
Original documentdocumentPiotr Bania, [Full-disclosure] Adobe Reader Remote Heap Memory Corruption - Subroutine Pointer Overwrite (10.01.2007)

Cisco UCC / IPCC JTapi DoS
Published:10.01.2007
Source:
SecurityVulns ID:7034
Type:remote
Threat Level:
5/10
Description:Service restart on invalid data received through TCP port.
CVE:CVE-2007-0198 (The JTapi Gateway process in Cisco Unified Contact Center Enterprise, Unified Contact Center Hosted, IP Contact Center Enterprise, and Cisco IP Contact Center Hosted 5.0 through 7.1 allows remote attackers to cause a denial of service (repeated process restart) via a certain TCP session on the JTapi server port.)
Original documentdocumentCISCO, [Full-disclosure] Cisco Security Advisory: Cisco Unified Contact Center and IP Contact Center JTapi Gateway Vulnerability (10.01.2007)

Adobe Macromedia ColdFusion source code leak
Published:10.01.2007
Source:
SecurityVulns ID:7035
Type:remote
Threat Level:
6/10
Description:Adding twice encoded NULL byte to path allows .CFM file content disclosure.
Affected:ADOBE : Macromedia ColdFusion MX 7.02
CVE:CVE-2006-5858 (Adobe ColdFusion MX 7 through 7.0.2, and JRun 4, when run on Microsoft IIS, allows remote attackers to read arbitrary files, list directories, or read source code via a double URL-encoded NULL byte in a ColdFusion filename, such as a CFM file.)
Original documentdocumentIDEFENSE, iDefense Security Advisory 01.09.07: Adobe Macromedia ColdFusion Source Code Disclosure Vulnerability (10.01.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod