Computer Security
[EN] securityvulns.ru no-pyccku


FreeBSD OpenSSH DoS
Published:10.11.2014
Source:
SecurityVulns ID:14078
Type:remote
Threat Level:
5/10
Description:Race condition because of invalid thread-safe library linking.
Affected:FREEBSD : FreeBSD 9.2
 FREEBSD : FreeBSD 10.0
CVE:CVE-2014-8475 (FreeBSD 9.1, 9.2, and 10.0, when compiling OpenSSH with Kerberos support, uses incorrect library ordering when linking sshd, which causes symbols to be resolved incorrectly and allows remote attackers to cause a denial of service (sshd deadlock and prevention of new connections) by ending multiple connections before authentication is completed.)
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-14:24.sshd [REVISED] (10.11.2014)

FreeBSD information leakage
Published:10.11.2014
Source:
SecurityVulns ID:14079
Type:local
Threat Level:
5/10
Description:Kernel information disclosure in setlogin/getlogin calls.
Affected:FREEBSD : FreeBSD 8.4
 FREEBSD : FreeBSD 9.3
 FREEBSD : FreeBSD 10.1
CVE:CVE-2014-8476 (The setlogin function in FreeBSD 8.4 through 10.1-RC4 does not initialize the buffer used to store the login name, which allows local users to obtain sensitive information from kernel memory via a call to getlogin, which returns the entire buffer.)
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-14:25.setlogin (10.11.2014)

FreeBSd ftp code execution
Published:10.11.2014
Source:
SecurityVulns ID:14080
Type:client
Threat Level:
6/10
Description:Shell characters vulnerability on server response parsing.
Affected:FREEBSD : FreeBSD 8.4
 FREEBSD : FreeBSD 9.3
 FREEBSD : FreeBSD 10.1
CVE:CVE-2014-8517 (The fetch_url function in usr.bin/ftp/fetch.c in tnftp, as used in NetBSD 5.1 through 5.1.4, 5.2 through 5.2.2, 6.0 through 6.0.6, and 6.1 through 6.1.5 allows remote attackers to execute arbitrary commands via a | (pipe) character at the end of an HTTP redirect.)
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-14:26.ftp (10.11.2014)

ZTE modems multiple security vulnereabilities
Published:10.11.2014
Source:
SecurityVulns ID:14081
Type:remote
Threat Level:
5/10
Description:Multiple vulnerabilities in Web interface.
Affected:ZTE : ZXDSL 831
Original documentdocumenthabte.yibelo_(at)_gmail.com, ZTE ZXDSL 831 Multiple Cross Site Scripting (10.11.2014)
 documenthabte.yibelo_(at)_gmail.com, ZTE 831CII Multiple Vulnerablities (10.11.2014)
 documenthabte.yibelo_(at)_gmail.com, ZTE ZXDSL 831CII Direct Object Reference (10.11.2014)

VMWare Workstation / Player DoS
updated since 05.05.2014
Published:10.11.2014
Source:
SecurityVulns ID:13731
Type:local
Threat Level:
5/10
Description:Uninitialized potiner dereference on IOCTL processing.
Affected:VMWARE : VMware Workstation 10.0
 VMWARE : VMware Player 6.0
CVE:CVE-2014-2384 (vmx86.sys in VMware Workstation 10.0.1 build 1379776 and VMware Player 6.0.1 build 1379776 on Windows might allow local users to cause a denial of service (read access violation and system crash) via a crafted buffer in an IOCTL call. NOTE: the researcher reports "Vendor rated issue as non-exploitable.")
Original documentdocumentdisclosures_(at)_korelogic.com, KL-001-2014-004 : VMWare vmx86.sys Arbitrary Kernel Read (10.11.2014)
 documentadvisories_(at)_portcullis-security.com, CVE-2014-2384 - Invalid Pointer Dereference in VMware Workstation and Player (05.05.2014)

Cisco RV multiple security vulnerabilities
Published:10.11.2014
Source:
SecurityVulns ID:14082
Type:remote
Threat Level:
6/10
Description:Files access, code execution, crossite scripting.
Affected:CISCO : Cisco RV220W
CVE:CVE-2014-2179 (The Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote attackers to upload files to arbitrary locations via a crafted HTTP request, aka Bug ID CSCuh86998.)
 CVE-2014-2178 (Cross-site request forgery (CSRF) vulnerability in the administrative web interface in the Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote attackers to hijack the authentication of administrators, aka Bug ID CSCuh87145.)
 CVE-2014-2177 (The network-diagnostics administration interface in the Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote authenticated users to execute arbitrary commands via a crafted HTTP request, aka Bug ID CSCuh87126.)
Original documentdocumentCISCO, Cisco Security Advisory: Multiple Vulnerabilities in Cisco Small Business RV Series Routers (10.11.2014)
 documentSecurify B.V., Cisco RV Series multiple vulnerabilities (10.11.2014)

Softing FG-100 security vulnerabilities
Published:10.11.2014
Source:
SecurityVulns ID:14083
Type:remote
Threat Level:
5/10
Description:Backdoor accounts, crossite scripting.
Affected:SOFTING : Softing FG-100
CVE:CVE-2014-6617
 CVE-2014-6616 (Cross-site scripting (XSS) vulnerability in Softing FG-100 PROFIBUS Single Channel (FG-100-PB) with firmware FG-x00-PB_V2.02.0.00 allows remote attackers to inject arbitrary web script or HTML via the DEVICE_NAME parameter to cgi-bin/CFGhttp/.)
Original documentdocumentIngmar Rosenhagen, CVE-2014-6617 Softing FG-100 Backdoor Account (10.11.2014)
 documentIngmar Rosenhagen, CVE-2014-6616 Softing FG-100 Webui XSS (10.11.2014)

Open-Xchange SQL injection
Published:10.11.2014
Source:
SecurityVulns ID:14085
Type:library
Threat Level:
6/10
Description:SQLi in jslob API.
Affected:OPENXCHANGE : Open-Xchange 7.6
CVE:CVE-2014-7871 (SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.)
Original documentdocumentOPENXCHANGE, Open-Xchange Security Advisory 2014-11-07 (10.11.2014)

CA Cloud Service Management multiple security vulnerabilities
Published:10.11.2014
Source:
SecurityVulns ID:14086
Type:remote
Threat Level:
5/10
Description:Replay-атаки, XSS, XXE, token validation vulnerability.
Affected:CA : CA Cloud Service Management 2014
CVE:CVE-2014-8474 (CA Cloud Service Management (CSM) before Summer 2014 allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.)
 CVE-2014-8473 (Cross-site request forgery (CSRF) vulnerability in CA Cloud Service Management (CSM) before Summer 2014 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.)
 CVE-2014-8472 (CA Cloud Service Management (CSM) before Summer 2014 does not properly verify authentication tokens from an Identity Provider, which allows user-assisted remote attackers to bypass intended access restrictions via unspecified vectors.)
 CVE-2014-8471 (CA Cloud Service Management (CSM) before Summer 2014 allows remote attackers to conduct replay attacks via unspecified vectors.)
Original documentdocumentCA, CA20141103-01: Security Notice for CA Cloud Service Management (10.11.2014)

Symantec Endpoint Protection multiple security vulnerabilities
Published:10.11.2014
Source:
SecurityVulns ID:14087
Type:remote
Threat Level:
5/10
Description:XSS, XXE, unauthroized files access.
Affected:SYMANTEC : Symantec Endpoint Protection 12.1
CVE:CVE-2014-3439 (ConsoleServlet in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU5 allows remote attackers to write to arbitrary files via unspecified vectors.)
 CVE-2014-3438 (Multiple cross-site scripting (XSS) vulnerabilities in console interface scripts in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU5 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.)
 CVE-2014-3437 (The management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU5 allows remote attackers to read arbitrary files or send TCP requests to intranet servers via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.)
Original documentdocumentSEC Consult Vulnerability Lab, SEC Consult SA-20141106-0 :: XXE & XSS & Arbitrary File Write vulnerabilities in Symantec Endpoint Protection (10.11.2014)

RSA Web Threat Detection SQL injection
Published:10.11.2014
Source:
SecurityVulns ID:14088
Type:remote
Threat Level:
6/10
Description:SQL injection by authenticated user.
Affected:EMC : RSA Web Threat Detection 4.6
CVE:CVE-2014-4627 (SQL injection vulnerability in EMC RSA Web Threat Detection 4.x before 4.6.1.1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.)
Original documentdocumentEMC, ESA-2014-135: RSA® Web Threat Detection SQL Injection Vulnerability (10.11.2014)

LibreOffice use-after-free vulnereability
updated since 10.11.2014
Published:24.11.2014
Source:
SecurityVulns ID:14084
Type:remote
Threat Level:
5/10
Description:Ingress remote control protocol use-after-free, memory corruption in OLE preview.
CVE:CVE-2014-3693 (Use-after-free vulnerability in the socket manager of Impress Remote in LibreOffice 4.x before 4.2.7 and 4.3.x before 4.3.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to TCP port 1599.)
 CVE-2014-3575 (The OLE preview generation in Apache OpenOffice before 4.1.1 and OpenOffice.org (OOo) might allow remote attackers to embed arbitrary data into documents via crafted OLE objects.)
Original documentdocumentUBUNTU, [USN-2400-1] LibreOffice vulnerability (24.11.2014)
Files:CVE-2014-3693 Use-After-Free in socket manager of Impress Remote

D-Link DAP-1360 multiple security vulnerabilities
updated since 10.11.2014
Published:02.12.2014
Source:
SecurityVulns ID:14089
Type:remote
Threat Level:
4/10
Description:Crossite request forgery, information leakage, crossite scripting in web interface.
Affected:DLINK : D-Link DAP-1360
Original documentdocumentMustLive, CSRF and XSS vulnerabilities in D-Link DAP-1360 (02.12.2014)
 documentMustLive, CSRF and XSS vulnerabilities in D-Link DAP-1360 (01.12.2014)
 documentMustLive, Vulnerabilities in D-Link DAP-1360 (10.11.2014)
 documentMustLive, IL and CSRF vulnerabilities in D-Link DAP-1360 (10.11.2014)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod