Computer Security
[EN] securityvulns.ru no-pyccku


ACDSee applications buffer overflow
Published:12.01.2010
Source:
SecurityVulns ID:10509
Type:client
Threat Level:
5/10
Description:Buffer overflow on XBM files parsing.
Affected:ACDSYSTEMS : ACDSee Photo Editor 2008
 ACDSYSTEMS : ACDSee Photo Manager 9.0
Original documentdocumentnoreply_(at)_telus.com, TELUS Security Labs VR - ACDSee Systems ACDSee Products XBM File Handling Buffer Overflow (12.01.2010)

Audiotran media player buffer overflow
Published:12.01.2010
Source:
SecurityVulns ID:10510
Type:client
Threat Level:
5/10
Description:Buffer overflow on playlists parsing.
Affected:ESOFT : Audiotran 1.4
Original documentdocumentSecurity, [CORELAN-10-001] Audiotran 1.4.1 buffer overflow (12.01.2010)

Multiple applications log files terminal control characters injections
Published:12.01.2010
Source:
SecurityVulns ID:10511
Type:remote
Threat Level:
3/10
Description:ESC-sequences filtering is not performed.
Affected:THTTPD : thttpd 2.25
 NGINX : nginx 0.7
 REDPILLLINPRO : Varnish 2.0
 CHEROKEE : Cherokee 0.99
 MINIHTTPD : mini_httpd 1.19
 WEBRICK : WEBrick 1.3
 ORION : Orion 2.0
 AOLSERVER : AOLserver 4.5
 YAWS : Yaws 1.85
 BOA : Boa 0.94
CVE:CVE-2009-4496 (Boa 0.94.14rc21 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.)
 CVE-2009-4495 (Yaws 1.85 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.)
 CVE-2009-4494 (AOLserver 4.5.1 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.)
 CVE-2009-4493 (Orion Application Server 2.0.7 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.)
 CVE-2009-4492 (WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.)
 CVE-2009-4491 (thttpd 2.25b0 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.)
 CVE-2009-4490 (mini_httpd 1.19 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.)
 CVE-2009-4489 (header.c in Cherokee before 0.99.32 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.)
 CVE-2009-4488 (** DISPUTED ** Varnish 2.0.6 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator. NOTE: the vendor disputes the significance of this report, stating that "This is not a security problem in Varnish or any other piece of software which writes a logfile. The real problem is the mistaken belief that you can cat(1) a random logfile to your terminal safely.")
 CVE-2009-4487 (nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.)
Original documentdocumentascii, Nginx, Varnish, Cherokee, thttpd, mini-httpd, WEBrick, Orion, AOLserver, Yaws and Boa log escape sequence injection (12.01.2010)

Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:12.01.2010
Source:
SecurityVulns ID:10512
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:JOOMLA : JVClouds3D 1.0
 MICRONETWORK : Active Calendar 1.2
Original documentdocumentMustLive, Cross-Site Scripting vulnerability in Blogumus (12.01.2010)
 documentMarty Barbella, XSS Vulnerability in Active Calendar 1.2.0 (12.01.2010)
 documentMustLive, Cross-Site Scripting vulnerability in JVClouds3D for Joomla (12.01.2010)

Panda Global Protection / Panda Internet Security weak security permissions
updated since 02.11.2009
Published:12.01.2010
Source:
SecurityVulns ID:10368
Type:local
Threat Level:
5/10
Description:Weak permissions for executable files.
Affected:PANDA : Panda Global Protection 2010
 PANDA : Panda Internet Security 2010
 PANDA : Panda Antivirus 2010
 PANDA : Panda Security for Business 4.04
 PANDA : Panda Security for Enterprise 4.04
 PANDA : Panda Security for Desktops 4.05
 PANDA : Panda Security for File Servers 8.04
Original documentdocumentNSO Research, NSOADV-2010-001: Panda Security Local Privilege Escalation (12.01.2010)
 documentShineShadow, Panda Security Software Local Privilege Escalation (12.11.2009)
 documentProtek Research Lab, {PRL} Multiple Panda Security Products Local Privilege Escalation Vulnerability (02.11.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod