Computer Security
[EN] securityvulns.ru no-pyccku


Apache Santuario library buffer overflow
Published:11.07.2011
Source:
SecurityVulns ID:11773
Type:library
Threat Level:
7/10
Description:Buffer overflow on oversized key.
Affected:APACHE : Santuario 1.6
CVE:CVE-2011-2516 (Off-by-one error in the XML signature feature in Apache XML Security for C++ 1.6.0, as used in Shibboleth before 2.4.3 and possibly other products, allows remote attackers to cause a denial of service (crash) via a signature using a large RSA key, which triggers a buffer overflow.)
Original documentdocumentCantor, Scott E., Security Advisory: CVE-2011-2516 (11.07.2011)

Cisco Content Services Gateway DoS
Published:11.07.2011
Source:
SecurityVulns ID:11774
Type:remote
Threat Level:
5/10
Description:Device may be crashed via ICMP packets.
Affected:CISCO : IOS 12.4
CVE:CVE-2011-2064 (Cisco IOS 12.4MDA before 12.4(24)MDA5 on the Cisco Content Services Gateway - Second Generation (CSG2) allows remote attackers to cause a denial of service (device reload) via crafted ICMP packets, aka Bug ID CSCtl79577.)
Original documentdocumentCISCO, Cisco Security Advisory: Cisco Content Services Gateway Denial of Service Vulnerability (11.07.2011)

Aruba Airwave / ArubaOS crossite scripting
Published:11.07.2011
Source:
SecurityVulns ID:11775
Type:remote
Threat Level:
5/10
Description:Crossite scripting with SSID.
Affected:ARUBANETWORKS : ArubaOS 2.4
 ARUBANETWORKS : ArubaOS 3.3
 ARUBANETWORKS : ArubaOS 3.4
 ARUBANETWORKS : AirWave 7.2
 ARUBANETWORKS : ArubaOS 5.0
 ARUBANETWORKS : ArubaOS 6.0
Original documentdocumentARUBANETWORKS, Aruba Advisory AID-070611 Cross Site Scripting vulnerability in ArubaOS and AirWave Administration Web Interfaces (11.07.2011)

IDrive Online Backup ActiveX unsafe method
Published:11.07.2011
Source:
SecurityVulns ID:11776
Type:client
Threat Level:
5/10
Description:Unsafe SaveToFile() method
Affected:IDRIVE : IDrive Online Backup 3.4
Original documentdocumentHigh-Tech Bridge Security Research, IDrive Online Backup ActiveX control Insecure Method (11.07.2011)

aTube Catcher ActiveX insecure method
Published:11.07.2011
Source:
SecurityVulns ID:11778
Type:client
Threat Level:
4/10
Description:Isnecure ChilkatCrypt2.ChilkatOmaDrm.1 method allows to corrupt files.
Affected:ATUBECATCHER : aTube Catcher 2.3
Original documentdocumentHigh-Tech Bridge Security Research, aTube Catcher ActiveX Control Insecure Method (11.07.2011)

HP-UX Dynamic Loader Privilege Escalation
Published:11.07.2011
Source:
SecurityVulns ID:11779
Type:local
Threat Level:
5/10
Affected:HP : HP-UX 11.11
 HP : HP-UX 11.23
 HP : HP-UX 11.31
CVE:CVE-2011-2398 (Unspecified vulnerability in the dynamic loader in HP HP-UX B.11.11, B.11.23, and B.11.31 allows local users to gain privileges or cause a denial of service via unknown vectors.)
Original documentdocumentHP, [security bulletin] HPSBUX02688 SSRT100513 rev.1 - HP-UX Dynamic Loader, Local Privilege Escalation, Denial of Service (DoS) (11.07.2011)

Blue Coat Authentication and Authorization Agent buffer overflow
Published:11.07.2011
Source:
SecurityVulns ID:11780
Type:remote
Threat Level:
6/10
Description:Buffer overflow during TCP/16102 authentication process.
Affected:BLUECOAT : ProxySG 4.2
 BLUECOAT : ProxySG 4.3
 BLUECOAT : ProxySG 5.2
 BLUECOAT : ProxySG 5.3
 BLUECOAT : ProxySG 5.4
 BLUECOAT : ProxySG 5.5
 BLUECOAT : ProxySG 6.1
Original documentdocumentResearch@NGSSecure, NGS00060 Technical Advisory: Blue Coat BCAAA Remote Code Execution Vulnerability (11.07.2011)

HP OpenView Communication Broker arbitrary files deletion
Published:11.07.2011
Source:
SecurityVulns ID:11781
Type:remote
Threat Level:
5/10
Description:Arbitrary files deletion via TCP/383 service.
Original documentdocumentLuigi Auriemma, Arbitrary files deletion in HP OpenView Communication Broker (11.07.2011)

MIT krb5 FTP server privilege escalation
updated since 11.07.2011
Published:24.10.2011
Source:
SecurityVulns ID:11777
Type:remote
Threat Level:
5/10
Description:Daemon group privileges are not dropped. DoS conditions in different backends.
Affected:MIT : krb5-appl 1.0
CVE:CVE-2011-1529 (The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger certain process_as_req errors.)
 CVE-2011-1528 (The krb5_ldap_lockout_audit function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the LDAP back end is used, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors, related to the locked_check_p function.)
 CVE-2011-1527 (The kdb_ldap plugin in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.1, when the LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a kinit operation with incorrect string case for the realm, related to the is_principal_in_realm, krb5_set_error_message, krb5_ldap_get_principal, and process_as_req functions.)
 CVE-2011-1526 (ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.)
Original documentdocumentMIT, MITKRB5-SA-2011-006 KDC denial of service vulnerabilities [CVE-2011-1527 CVE-2011-1528 CVE-2011-1529] (24.10.2011)
 documentMIT, MITKRB5-SA-2011-005 FTP daemon fails to set effective group ID [CVE-2011-1526] (11.07.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod