Computer Security
[EN] securityvulns.ru no-pyccku


Apache Tomcat multiple security vulnerabilities
updated since 21.01.2008
Published:10.02.2008
Source:
SecurityVulns ID:8591
Type:remote
Threat Level:
5/10
Description:Crossite scripting, information disclosure.
Affected:APACHE : Tomcat 4.0
 APACHE : Tomcat 4.1
 APACHE : Tomcat 5.0
 APACHE : Tomcat 5.5
 APACHE : Tomcat 6.0
CVE:CVE-2008-0128
 CVE-2008-0002 (Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting during this processing in order to trigger the exception.)
 CVE-2007-2450 (Multiple cross-site scripting (XSS) vulnerabilities in the (1) Manager and (2) Host Manager web applications in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote authenticated users to inject arbitrary web script or HTML via a parameter name to manager/html/upload, and other unspecified vectors.)
Original documentdocumentAPACHE, CVE-2008-0002: Tomcat information disclosure vulnerability (10.02.2008)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:10.02.2008
Source:
SecurityVulns ID:8649
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc. CMS SiteEdit: crossite scripting.
Affected:JOOMLA : Joomla 1.0
 HUSREV : Husrev Forums 2.0
 POWERSCRIPTS : PowerNews 2.5
 JOOVILI : Joovili 2.1
 PKS : PKs Movie Database 3.0
Original documentdocumenthoussamix_(at)_hotmail.fr, PKs Movie Database version 3.0.3 (SQL/XSS) (10.02.2008)
 documentcrazy_kinq_(at)_hotmail.co.uk, Joomla <= v1.0.14-RC1(Index.php) Remote File Inclusion Exploit (10.02.2008)
 documentcrazy_kinq_(at)_hotmail.co.uk, Joovili <= v.2.1 (members_help.php) Remote File İnclude Vulnerability (10.02.2008)
 documentcrazy_kinq_(at)_hotmail.co.uk, Blackboard (id) Remote SQL Injection (10.02.2008)
 documentcrazy_kinq_(at)_hotmail.co.uk, Husrev Forums v2.0.1:PoWerBoard (tr) (id) Remote SQL Injection (10.02.2008)
 documentDigital Security Research Group [DSecRG], [DSECRG-08-014] Multiple LFI in PowerNews (Newsscript) 2.5.6 (10.02.2008)
 documentMustLive, Vulnerabilities in CMS SiteEdit (10.02.2008)

Tk library buffer overflow
Published:10.02.2008
Source:
SecurityVulns ID:8650
Type:library
Threat Level:
6/10
Description:Buffer overflow in ReamImage function on GIF parsing.
Affected:TK : libtk 8.4
CVE:CVE-2008-0553 (Stack-based buffer overflow in the ReadImage function in tkImgGIF.c in Tk (Tcl/Tk) before 8.5.1 allows remote attackers to execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.)
Original documentdocumentMANDRIVA, [ MDVSA-2008:041 ] - Updated tk packages fix buffer overflow vulnerability (10.02.2008)

CheckPoint SecuRemote / Secure Client weak permissions
Published:10.02.2008
Source:
SecurityVulns ID:8652
Type:local
Threat Level:
5/10
Description:Cached logon credentials are stored in registry key accessed by everyone group.
Affected:CHECKPOINT : SecureClient NGX R60
 CHECKPOINT : SecuRemote R60
Original documentdocumentMichael Neal Vasquez, Checkpoint SecuRemote/Secure Client NGX Auto Local Logon Vulnerability (10.02.2008)

Ipswitch Instant Messaging multiple security vulnerabilities
Published:10.02.2008
Source:
SecurityVulns ID:8653
Type:remote
Threat Level:
5/10
Description:Format string vulnerability, multiple DoS conditions.
Affected:IPSWITCH : Ipswitch Instant Messaging 2.0
Original documentdocumentLuigi Auriemma, Multiple vulnerabilities in Ipswitch Instant Messaging 2.0.8.1 (10.02.2008)
Files:Exploits Ipswitch Instant Messaging <= 2.0.8.1 multiple vulnerabilities

Netpbm buffer overflow
Published:10.02.2008
Source:
SecurityVulns ID:8654
Type:local
Threat Level:
3/10
Description:giftopnm utility GIF parsing buffer overflow.
Affected:NETPBM : netpbm 9.24
CVE:CVE-2008-0554 (Buffer overflow in the readImageData function in giftopnm.c in netpbm before 10.27 in netpbm before 10.27 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.)
Original documentdocumentMANDRIVA, [ MDVSA-2008:039 ] - Updated netpbm packages fix buffer overflow vulnerability (10.02.2008)

Sony Imagestation ActiveX buffer overflow
Published:10.02.2008
Source:
SecurityVulns ID:8655
Type:client
Threat Level:
5/10
Description:Buffer overflow in SetLogging method.
Original documentdocumentdavid130490_(at)_hotmail.com, Buffer Overflow Vulnerability in AxRUploadServer.dll, Activex Method (SetLogging) (10.02.2008)

jetAudio buffer overflow
Published:10.02.2008
Source:
SecurityVulns ID:8656
Type:client
Threat Level:
5/10
Description:Buffer overflow on oversized ASX file URI.
Affected:JETAUDIO : JetAudio 7.0
Original documentdocumentlaurent gaffie, jetAudio <= 7.0.5 (.ASX) Remote Stack Overflow (10.02.2008)

IEA multiple network applications DoS
Published:10.02.2008
Source:
SecurityVulns ID:8657
Type:remote
Threat Level:
4/10
Description:Integrated web administration server multiple security vulnerabilities.
Affected:IEA : Emerald 5.0
 IEA : RadiusNT 5.1
 IEA : RadiusX 5.1
 IEA : Air Marshal 2.0
Original documentdocumentLuigi Auriemma, NULL byte writing in Emerald, RadiusNT/X and Air Marshal (10.02.2008)

IBM DB2 database server multiple security vulnerabilities
Published:10.02.2008
Source:
SecurityVulns ID:8658
Type:remote
Threat Level:
5/10
Description:TCP/523 remote administration service memory corruption. Dynamic livrary loading by relative path.
Affected:IBM : DB2 Universal Database 9.1
CVE:CVE-2007-5757
 CVE-2007-3676
Original documentdocumentIDEFENSE, iDefense Security Advisory 02.07.08: IBM DB2 Universal Database Administration Server Memory Corruption Vulnerability (10.02.2008)
 documentIDEFENSE, iDefense Security Advisory 02.07.08: IBM DB2 Universal Database db2pd Arbitrary Library Loading Vulnerability (10.02.2008)

Mozilla Firefox / Thunderbird / Seamonkey multiple security vulonerabilities
updated since 10.02.2008
Published:11.02.2008
Source:
SecurityVulns ID:8648
Type:client
Threat Level:
9/10
Description:Multiple memory corruptions, input focus stealing, code execution, stored information corruption, directory traversal, information leaks, dialog spoffing.
Affected:MOZILLA : Firefox 2.0
 MOZILLA : Thunderbird 2.0
 MOZILLA : SeaMonkey 1.1
CVE:CVE-2008-0594 (Mozilla Firefox before 2.0.0.12 does not always display a web forgery warning dialog if the entire contents of a web page are in a DIV tag that uses absolute positioning, which makes it easier for remote attackers to conduct phishing attacks.)
 CVE-2008-0593 (Gecko-based browsers, including Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8, modify the .href property of stylesheet DOM nodes to the final URI of a 302 redirect, which might allow remote attackers to bypass the Same Origin Policy and read sensitive information from the original URL, such as with Single-Signon systems.)
 CVE-2008-0592 (Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to cause a denial of service via a plain .txt file with a "Content-Disposition: attachment" and an invalid "Content-Type: plain/text," which prevents Firefox from rendering future plain text files within the browser.)
 CVE-2008-0591 (Mozilla Firefox before 2.0.0.12 and Thunderbird before 2.0.0.12 allows user-assisted remote attackers to cause users to confirm a timer-enabled security dialog by using a timer to change the window focus.)
 CVE-2008-0419
 CVE-2008-0418 (Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using "flat" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js.)
 CVE-2008-0417
 CVE-2008-0415
 CVE-2008-0414 (Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to trick the user into uploading arbitrary files via label tags that shift focus to a file input field, aka "focus spoofing.")
 CVE-2008-0413
 CVE-2008-0412 (The browser engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to the (1) nsTableFrame::GetFrameAtOrBefore, (2) nsAccessibilityService::GetAccessible, (3) nsBindingManager::GetNestedInsertionPoint, (4) nsXBLPrototypeBinding::AttributeChanged, (5) nsColumnSetFrame::GetContentInsertionFrame, and (6) nsLineLayout::TrimTrailingWhiteSpaceIn methods, and other vectors.)
Original documentdocumentcarl hardwick, [Full-disclosure] Firefox 2.0.0.12 information leak vulnerability (11.02.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-11 (10.02.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-10 (10.02.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-09 (10.02.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-08 (10.02.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-06 (10.02.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-05 (10.02.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-04 (10.02.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-03 (10.02.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-02 (10.02.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-01 (10.02.2008)
Files:Firefox 2.0.0.12 information leak vulnerability PoC

Adobe Acrobat / Reader multiple security vulnerabilities
updated since 10.02.2008
Published:12.02.2008
Source:
SecurityVulns ID:8651
Type:client
Threat Level:
8/10
Description:Multiple buffer overflows and integer overflows, unsafe methods, unsafe dynamic library loading.
Affected:ADOBE : Adobe Reader 8.1
 ADOBE : Adobe Acrobat 8.1
CVE:CVE-2008-0726 (Integer overflow in Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via crafted arguments to the printSepsWithParams, which triggers memory corruption.)
 CVE-2008-0667 (The DOC.print function in the Adobe JavaScript API, as used by Adobe Acrobat and Reader before 8.1.2, allows remote attackers to configure silent non-interactive printing, and trigger the printing of an arbitrary number of copies of a document. NOTE: this issue might be subsumed by CVE-2008-0655.)
 CVE-2007-5666
 CVE-2007-5663
 CVE-2007-5659
 CVE-2007-5609
Original documentdocumentZDI, ZDI-08-004: Adobe AcrobatReader Javascript for PDF Integer Overflow Vulnerability (12.02.2008)
 documentCERT, US-CERT Technical Cyber Security Alert TA08-043A -- Adobe Reader and Acrobat Vulnerabilities (12.02.2008)
 documentcocoruder, Adobe Reader/Acrobat Remote PDF Print Silently Vulnerability (10.02.2008)
 documentIDEFENSE, iDefense Security Advisory 02.08.08: Adobe Reader and Acrobat Multiple Stack-based Buffer Overflow Vulnerabilities (10.02.2008)
 documentIDEFENSE, iDefense Security Advisory 02.08.08: Adobe Reader Security Provider Unsafe Libary Path Vulnerability (10.02.2008)
 documentIDEFENSE, iDefense Security Advisory 02.08.08: Adobe Reader and Acrobat JavaScript Insecure Method Exposure Vulnerability (10.02.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod