Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft Windows kernel integer overflow
Published:10.10.2012
Source:
SecurityVulns ID:12627
Type:local
Threat Level:
7/10
Description:Kernel integer overflow leads to privilege escalation.
Affected:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
CVE:CVE-2012-2529 (Integer overflow in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Windows Kernel Integer Overflow Vulnerability.")
Files:Microsoft Security Bulletin MS12-068 - Important Vulnerability in Windows Kernel Could Allow Elevation of Privilege (2724197)

Microsoft Windows kerberos server DoS
Published:10.10.2012
Source:
SecurityVulns ID:12628
Type:remote
Threat Level:
6/10
Description:NULL pointer dereference on authentication request.
Affected:MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
CVE:CVE-2012-2551 (The server in Kerberos in Microsoft Windows Server 2008 R2 and R2 SP1, and Windows 7 Gold and SP1, allows remote attackers to cause a denial of service (NULL pointer dereference and reboot) via a crafted session request, aka "Kerberos NULL Dereference Vulnerability.")

Microsoft SQL Server crossite scripting
Published:10.10.2012
Source:
SecurityVulns ID:12629
Type:local
Threat Level:
5/10
Description:SQL Server Report Manager crossite scripting.
Affected:MICROSOFT : SQL Server 2005
 MICROSOFT : SQL Server 2008
 MICROSOFT : SQL Server 2012
CVE:CVE-2012-2552 (Cross-site scripting (XSS) vulnerability in the SQL Server Report Manager in Microsoft SQL Server 2000 Reporting Services SP2 and SQL Server 2005 SP4, 2008 SP2 and SP3, 2008 R2 SP1, and 2012 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka "Reflected XSS Vulnerability.")
Files:Microsoft Security Bulletin MS12-070 - Important Vulnerability in SQL Server Could Allow Elevation of Privilege (2754849)

WingFTP DoS
Published:10.10.2012
Source:
SecurityVulns ID:12630
Type:remote
Threat Level:
5/10
Description:Crash on ZIP archive requests processing.
Affected:WINGFTP : WingFTP Server 4.1
CVE:CVE-2012-4729 (Wing FTP Server before 4.1.1 allows remote authenticated users to cause a denial of service (daemon crash) via two zip commands.)
Original documentdocumentAnil Pazvant, WingFTP Server Denial of Service Vulnerability (10.10.2012)

Logica HotScan buffer overflow
Published:10.10.2012
Source:
SecurityVulns ID:12631
Type:remote
Threat Level:
5/10
Description:Buffer overflow on SWIFT Alliance Access Interface request parsing.
CVE:CVE-2012-2624 (Stack-based buffer overflow in Logica HotScan allows remote attackers to cause a denial of service (crash) via a crafted packet.)
Original documentdocumentAnil Pazvant, BufferOverflow Vulnerability on Logica HotScan SWIFT Alliance Access Interface (10.10.2012)

soapbox protection bypass
Published:10.10.2012
Source:
SecurityVulns ID:12632
Type:local
Threat Level:
4/10
Description:It's possible to bypass protection by launching second application instance.
Affected:SOAPBOX : soapbox 0.3
Original documentdocumentpereira_(at)_secbiz.de, soapbox Local Root / Privilege Escalation Vulnerability (10.10.2012)

bacula restriction bypass
Published:10.10.2012
Source:
SecurityVulns ID:12633
Type:local
Threat Level:
5/10
Description:ACLs are not enforced properly.
Affected:BACULA : bacula 5.2
CVE:CVE-2012-4430 (The dump_resource function in dird/dird_conf.c in Bacula before 5.2.11 does not properly enforce ACL rules, which allows remote authenticated users to obtain resource dump information via unspecified vectors.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2558-1] bacula security update (10.10.2012)

Endpoint Protector multiple security vulnerabilities
Published:10.10.2012
Source:
SecurityVulns ID:12634
Type:remote
Threat Level:
5/10
Description:Multiple crossite scripting possibilities.
Affected:ENDPOINTPROTECTO : Endpoint Protector 4.0
Original documentdocumentVulnerability Lab, Endpoint Protector v4.0.4.0 - Multiple Web Vulnerabilities (10.10.2012)

GTA UTM Firewall multiple security vulnerabilities
Published:10.10.2012
Source:
SecurityVulns ID:12635
Type:remote
Threat Level:
4/10
Description:Multiple crossite scripting possibilities.
Affected:GTA : GTA UTM Firewall GB 6.0
Original documentdocument[email protected], GTA UTM Firewall GB 6.0.3 - Multiple Web Vulnerabilities (10.10.2012)
 document[email protected], GTA UTM Firewall GB 6.0.3 - Multiple Web Vulnerabilities (10.10.2012)

Fortigate UTM WAF Appliance multiple security vulnerabilities
Published:10.10.2012
Source:
SecurityVulns ID:12636
Type:remote
Threat Level:
4/10
Description:Privilege escalation, crossite scripting.
Original documentdocumentVulnerability Lab, Fortigate UTM WAF Appliance - Cross Site Vulnerabilities (10.10.2012)
 documentVulnerability Lab, Fortigate UTM WAF Appliance - Multiple Web Vulnerabilities (10.10.2012)
 documentVulnerability Lab, Fortigate UTM WAF Appliance - Multiple Web Vulnerabilities (10.10.2012)

Key Systems Electronic Key Lockers unauthorized access
Published:10.10.2012
Source:
SecurityVulns ID:12637
Type:remote
Threat Level:
5/10
Description:Unauthentication port TCP/1010 service access
Original documentdocumenteelsivart_(at)_gmail.com, Key Systems Electronic Key Lockers command injection and weak authentication vulnerabilities (10.10.2012)

hostapd buffer overflow
Published:10.10.2012
Source:
SecurityVulns ID:12638
Type:remote
Threat Level:
5/10
Description:Buffer overflow during EAP authentication.
Affected:HOSTAPD : hostapd 1.0
CVE:CVE-2012-4445 (Heap-based buffer overflow in the eap_server_tls_process_fragment function in eap_server_tls_common.c in the EAP authentication server in hostapd 0.6 through 1.0 allows remote attackers to cause a denial of service (crash or abort) via a small "TLS Message Length" value in an EAP-TLS message with the "More Fragments" flag set.)
Original documentdocumentTimo Warns, [PRE-SA-2012-07] hostapd: Missing EAP-TLS message length validation (10.10.2012)
 documentDEBIAN, [SECURITY] [DSA 2557-1] hostapd security update (10.10.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod