Computer Security
[EN] securityvulns.ru no-pyccku


Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:10.08.2011
Source:
SecurityVulns ID:11838
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:WORDPRESS : Register Plus Redux 3.7
 SOCIALSLIDER : Social Slider 5.6
 WORDPRESS : eShop for Wordpress 6.2
Original documentdocumentHigh-Tech Bridge Security Research, Multiple XSS in eShop for Wordpress (10.08.2011)
 documentHigh-Tech Bridge Security Research, SQL injection in Social Slider (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, XWeavers (page.asp?id) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, Synchrony Infotech (product_details.php?id) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, Kimia Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, XWeavers (sysMsg.php?errMsg) Cross Site Scripting Vulnerabilities (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, Arte Dude (collections.php?id) (property.php?id) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, Web Design Sydney (news-item.php?id) (news-item.php?newsid) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, Avant-Garde Technologies (display-section.php?id) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, Liberating IT (picture.php?gid) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, Amigot Corp (story.php?id) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, 6House Design (product_details.php?id) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, Webdesigns-studio (sysMsg.php?errMsg) Cross Site Scripting Vulnerabilities (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, THE STUDIO (prod.php?id) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, SEO New York (prod.php?id) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, Chezola Systems (display-section.php?id) Remote SQL injection Vulnerability (10.08.2011)
 documentEhsan_Hp200_(at)_hotmail.com, EasyContent CMS (participant.php?id) Remote SQL injection Vulnerability (10.08.2011)
 documentMustLive, Многичесленные уязвимости в Register Plus Redux для WordPress (10.08.2011)

Microsoft Internet Explorer multiple security vulnerabilities
Published:10.08.2011
Source:
SecurityVulns ID:11839
Type:client
Threat Level:
9/10
Description:Multiple memory corruptions, crossite data access, code execution.
Affected:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
CVE:CVE-2011-2383 (Microsoft Internet Explorer 9 and earlier does not properly restrict cross-zone drag-and-drop actions, which allows user-assisted remote attackers to read cookie files via vectors involving an IFRAME element with a SRC attribute containing an http: URL that redirects to a file: URL, as demonstrated by a Facebook game, related to a "cookiejacking" issue, aka "Drag and Drop Information Disclosure Vulnerability." NOTE: this vulnerability exists because of an incomplete fix in the Internet Explorer 9 release.)
 CVE-2011-1964 (Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Style Object Memory Corruption Vulnerability.")
 CVE-2011-1963 (Microsoft Internet Explorer 7 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "XSLT Memory Corruption Vulnerability.")
 CVE-2011-1962 (Microsoft Internet Explorer 6 through 9 does not properly handle unspecified character sequences, which allows remote attackers to read content from a different (1) domain or (2) zone via a crafted web site that triggers "inactive filtering," aka "Shift JIS Character Encoding Vulnerability.")
 CVE-2011-1961 (The telnet URI handler in Microsoft Internet Explorer 6 through 9 does not properly launch the handler application, which allows remote attackers to execute arbitrary programs via a crafted web site, aka "Telnet Handler Remote Code Execution Vulnerability.")
 CVE-2011-1960 (Microsoft Internet Explorer 6 through 9 does not properly implement JavaScript event handlers, which allows remote attackers to access content from a different (1) domain or (2) zone via unspecified script code, aka "Event Handlers Information Disclosure Vulnerability.")
 CVE-2011-1257 (Race condition in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors involving access to an object, aka "Window Open Race Condition Vulnerability.")
Original documentdocumentLostmon lords, Fwd: {Lostmonґs Group} Internet Explorer 6, 7 and 8 Window.open race condition Vulnerability (10.08.2011)
 documentZDI, ZDI-11-247: Microsoft Internet Explorer XSLT SetViewSlave Remote Code Execution Vulnerability (10.08.2011)
 documentZDI, ZDI-11-249: (Pwn2Own) Microsoft Internet Explorer Protected Mode Bypass Vulnerability (10.08.2011)
 documentZDI, ZDI-11-248: Microsoft Internet Explorer 9 STYLE Object Parsing Remote Code Execution Vulnerability (10.08.2011)
Files:Microsoft Security Bulletin MS11-057 - Critical Cumulative Security Update for Internet Explorer (2559049)

Microsoft Windows DNS server security vulnerabilities
Published:10.08.2011
Source:
SecurityVulns ID:11840
Type:remote
Threat Level:
7/10
Description:Memory corruption on NAPTR record handling, uninitialized memory access on non-existent domain lookup.
Affected:MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows 2008 Server
CVE:CVE-2011-1970 (The DNS server in Microsoft Windows Server 2003 SP2 and Windows Server 2008 SP2, R2, and R2 SP1 does not properly initialize memory, which allows remote attackers to cause a denial of service (service outage) via a query for a nonexistent domain, aka "DNS Uninitialized Memory Corruption Vulnerability.")
 CVE-2011-1966 (The DNS server in Microsoft Windows Server 2008 SP2, R2, and R2 SP1 does not properly handle NAPTR queries that trigger recursive processing, which allows remote attackers to execute arbitrary code via a crafted query, aka "DNS NAPTR Query Vulnerability.")
Files:Microsoft Security Bulletin MS11-058 - Critical Vulnerabilities in DNS Server Could Allow Remote Code Execution (2562485)

Microsoft Office Visio security vulnerabilities
Published:10.08.2011
Source:
SecurityVulns ID:11841
Type:client
Threat Level:
6/10
Description:Memory corruption on Visio files parsing.
Affected:MICROSOFT : Visio 2003
 MICROSOFT : Visio 2007
 MICROSOFT : Visio 2010
CVE:CVE-2011-1979 (Microsoft Visio 2003 SP3 and 2007 SP2 does not properly validate objects in memory during Visio file parsing, which allows remote attackers to execute arbitrary code via a crafted file, aka "Move Around the Block RCE Vulnerability.")
 CVE-2011-1972 (Microsoft Visio 2003 SP3, 2007 SP2, and 2010 Gold and SP1 does not properly validate objects in memory during Visio file parsing, which allows remote attackers to execute arbitrary code via a crafted file, aka "pStream Release RCE Vulnerability.")
Files:Microsoft Security Bulletin MS11-060 - Important Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (2560978)

Microsoft Windows Remote Desktop Web Access crossite scripting
Published:10.08.2011
Source:
SecurityVulns ID:11842
Type:remote
Threat Level:
5/10
Description:Crossite scripting on the logon page.
CVE:CVE-2011-1263 (Cross-site scripting (XSS) vulnerability in the logon page in Remote Desktop Web Access (RD Web Access) in Microsoft Windows Server 2008 R2 and R2 SP1 allows remote attackers to inject arbitrary web script or HTML via the URI, aka "Remote Desktop Web Access Vulnerability.")
Files:Microsoft Security Bulletin MS11-061 - Important Vulnerability in Remote Desktop Web Access Could Allow Elevation of Privilege (2546250)

Microsoft Windows multiple security vulnerabilities
Published:10.08.2011
Source:
SecurityVulns ID:11843
Type:remote
Threat Level:
8/10
Description:NDISTAPI service and CSRSS privilege escalations, kernel DoS, TCP/IP DoS, RDP DoS, .Net information disclosure.
Affected:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
CVE:CVE-2011-1978 (Microsoft .NET Framework 2.0 SP2, 3.5.1, and 4 does not properly validate the System.Net.Sockets trust level, which allows remote attackers to obtain sensitive information or trigger arbitrary outbound network traffic via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Socket Restriction Bypass Vulnerability.")
 CVE-2011-1977 (The ASP.NET Chart controls in Microsoft .NET Framework 4, and Chart Control for Microsoft .NET Framework 3.5 SP1, do not properly verify functions in URIs, which allows remote attackers to read arbitrary files via special characters in a URI in an HTTP request, aka "Chart Control Information Disclosure Vulnerability.")
 CVE-2011-1974 (NDISTAPI.sys in the NDISTAPI driver in Remote Access Service (RAS) in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP2 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "NDISTAPI Elevation of Privilege Vulnerability.")
 CVE-2011-1971 (The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly parse file metadata, which allows local users to cause a denial of service (reboot) via a crafted file, aka "Windows Kernel Metadata Parsing DOS Vulnerability.")
 CVE-2011-1968 (The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP2 does not properly process packets in memory, which allows remote attackers to cause a denial of service (reboot) by sending crafted RDP packets triggering access to an object that (1) was not properly initialized or (2) is deleted, as exploited in the wild in 2011, aka "Remote Desktop Protocol Vulnerability.")
 CVE-2011-1967 (Winsrv.dll in the Client/Server Run-time Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly check permissions for sending inter-process device-event messages from low-integrity processes to high-integrity processes, which allows local users to gain privileges via a crafted application, aka "CSRSS Vulnerability.")
 CVE-2011-1965 (Tcpip.sys in the TCP/IP stack in Microsoft Windows 7 Gold and SP1 and Windows Server 2008 R2 and R2 SP1 does not properly implement URL-based QoS, which allows remote attackers to cause a denial of service (reboot) via a crafted URL to a web server, aka "TCP/IP QOS Denial of Service Vulnerability.")
 CVE-2011-1871 (Tcpip.sys in the TCP/IP stack in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to cause a denial of service (reboot) via a series of crafted ICMP messages, aka "ICMP Denial of Service Vulnerability.")
Files:Microsoft Security Bulletin MS11-062 - Important Vulnerability in Remote Access Service NDISTAPI Driver Could Allow Elevation of Privilege (2566454)
 Microsoft Security Bulletin MS11-063 - Important Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2567680)
 Microsoft Security Bulletin MS11-064 - Important Vulnerabilities in TCP/IP Stack Could Allow Denial of Service (2563894)
 Microsoft Security Bulletin MS11-065 - Important Vulnerability in Remote Desktop Protocol Could Allow Denial of Service (2570222)
 Microsoft Security Bulletin MS11-066 - Important Vulnerability in Microsoft Chart Control Could Allow Information Disclosure (2567943)
 Microsoft Security Bulletin MS11-068 - Moderate Vulnerability in Windows Kernel Could Allow Denial of Service (2556532)
 Microsoft Security Bulletin MS11-069 - Moderate Vulnerability in .NET Framework Could Allow Information Disclosure (2567951)

HP OpenView Performance Insight security vulnerabilities
Published:10.08.2011
Source:
SecurityVulns ID:11846
Type:remote
Threat Level:
5/10
Description:Crossite scripting, unauthorized access.
Affected:HP : OpenView Performance Insight 5.41
CVE:CVE-2011-2410 (Cross-site scripting (XSS) vulnerability in HP OpenView Performance Insight 5.3, 5.31, 5.4, 5.41, 5.41.001, and 5.41.002 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.)
 CVE-2011-2407 (Unspecified vulnerability in HP OpenView Performance Insight 5.3, 5.31, 5.4, 5.41, 5.41.001, and 5.41.002 allows remote attackers to obtain access via unknown vectors.)
 CVE-2011-2406 (Cross-site scripting (XSS) vulnerability in HP OpenView Performance Insight 5.3, 5.31, 5.4, 5.41, 5.41.001, and 5.41.002 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.)
Original documentdocumentHP, [security bulletin] HPSBMU02695 SSRT100480 rev.1 - HP OpenView Performance Insight, Remote HTML Injection, Unauthorized Access (10.08.2011)

Android application spoofing
Published:10.08.2011
Source:
SecurityVulns ID:11847
Type:local
Threat Level:
3/10
Description:Application can emulate logon window of different application.
Affected:GOOGLE : Android 2.3
Original documentdocumentTrustwave Advisories, TWSL2011-008: Focus Stealing Vulnerability in Android (10.08.2011)

McAfee Security-as-a-Service ActiveX code execution
Published:10.08.2011
Source:
SecurityVulns ID:11845
Type:client
Threat Level:
5/10
Description:Insecure methods in MyAsUtil5.2.0.603.dll, myCIOScn.dll
Original documentdocumentZDI, TPTI-11-13: McAfee SaaS myCIOScn.dll Scan Method Script Injection Remote Code Execution Vulnerability (10.08.2011)
 documentZDI, TPTI-11-12: McAfee SaaS MyAsUtil5.2.0.603.dll SecureObjectFactory Instantiation Design Flaw Remote Code Execution Vulnerability (10.08.2011)

Microsoft Report Viewer crossite scripting
updated since 10.08.2011
Published:30.08.2011
Source:
SecurityVulns ID:11844
Type:client
Threat Level:
5/10
Description:ActiveX crossite scripting.
Affected:MICROSOFT : Visual Studio 2005
 MICROSOFT : Report Viewer 2005
CVE:CVE-2011-1976 (Cross-site scripting (XSS) vulnerability in the Report Viewer Control in Microsoft Visual Studio 2005 SP1 and Report Viewer 2005 SP1 allows remote attackers to inject arbitrary web script or HTML via a parameter in a data source, aka "Report Viewer Controls XSS Vulnerability.")
Original documentdocumentinfo_(at)_gdssecurity.com, Cross-Site Scripting (XSS) in Microsoft ReportViewer Controls (30.08.2011)
Files:Microsoft Security Bulletin MS11-067 - Important Vulnerability in Microsoft Report Viewer Could Allow Information Disclosure (2578230)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod