Computer Security
[EN] securityvulns.ru no-pyccku


HP Systems Insight Manager unauthorized access
Published:12.03.2009
Source:
SecurityVulns ID:9730
Type:remote
Threat Level:
6/10
Description:Unaurhorized access via WMI interface (WMI Mapper).
Affected:HP : Systems Insight Manager 2.5
CVE:CVE-2009-0713 (Unspecified vulnerability in WMI Mapper for HP Systems Insight Manager before 2.5.2.0 allows remote attackers to obtain sensitive information via unknown vectors.)
 CVE-2009-0712 (Unspecified vulnerability in WMI Mapper for HP Systems Insight Manager before 2.5.2.0 allows local users to gain privileges via unknown vectors.)
Original documentdocumentHP, [security bulletin] HPSBMA02412 SSRT080040 rev.1 - WMI Mapper for HP Systems Insight Manager Running on Windows, Remote Unauthorized Access to Data, Local Unauthorized Access (12.03.2009)

Linux kernel multiple security vulnerabilities
Published:12.03.2009
Source:
SecurityVulns ID:9731
Type:local
Threat Level:
5/10
Description:Unauthorized skfp_ioctl statistics reset, getsockopt() information leak.
Affected:LINUX : kernel 2.6
CVE:CVE-2009-0676 (The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request.)
 CVE-2009-0675 (The skfp_ioctl function in drivers/net/skfp/skfddi.c in the Linux kernel before 2.6.28.6 permits SKFP_CLR_STATS requests only when the CAP_NET_ADMIN capability is absent, instead of when this capability is present, which allows local users to reset the driver statistics, related to an "inverted logic" issue.)
Original documentdocumentMANDRIVA, [ MDVSA-2009:071 ] kernel (12.03.2009)

Adonics NAS Adapter DoS
Published:12.03.2009
Source:
SecurityVulns ID:9732
Type:remote
Threat Level:
4/10
Description:Multiple DoS conditions on HTTP requests processing after authentication.
Original documentdocumentmcyr2_(at)_csc.com, Addonics NAS Adapter Post-Auth DoS (12.03.2009)

PCTools iAntivirus multiple security vulnerabilities
Published:12.03.2009
Source:
SecurityVulns ID:9733
Type:remote
Threat Level:
4/10
Description:Protection bypass, invalid behaviour in multiuser environment.
Affected:PCTOOLS : iAntiVirus for Mac OS X 1.35
Original documentdocumentCarsten Eilers, CTM PowerMail 4.2.1 de Carbon <http://www.ctmdev.com> (12.03.2009)

IBM Director CIM Server multiple security vulnerabilities
Published:12.03.2009
Source:
SecurityVulns ID:9734
Type:remote
Threat Level:
5/10
Description:DoS, privilege escalation.
Affected:IBM : IBM Director 5.20
Original documentdocumentSEC Consult Vulnerability Lab, SEC Consult SA-20090305-2 :: IBM Director CIM Server Local Privilege Escalation Vulnerability (12.03.2009)
 documentSEC Consult Vulnerability Lab, SEC Consult SA-20090305-1 :: IBM Director CIM Server Remote Denial of Service Vulnerability (12.03.2009)

Belkin Bulldog UPS management software buffer overflow
Published:12.03.2009
Source:
SecurityVulns ID:9735
Type:remote
Threat Level:
4/10
Description:Buffer overflow in built-in web server.
Original documentdocumentElazar Broad, Belkin BullDog Plus UPS-Service Buffer Overflow Vulnerability (12.03.2009)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:12.03.2009
Source:
SecurityVulns ID:9736
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc. PHPSlideshow: crossite scripting. Athree CMS: information leak, SQL injection, DoS.
Affected:WEBSVN : WebSVN 2.1
 ARYANIC : HighPortal 10
 ARYANIC : HighCMS 10
 WEBID : WeBid 0.7
 WORDPRESS : WordPress MU 2.6
 MAHARA : mahara 1.0
 NEXTAPP : NextApp Echo 2.1
 TRELLISDESK : Trellis Desk 1.0
 TIKIWIKI : TikiWiki 2.2
CVE:CVE-2009-0660 (Multiple cross-site scripting (XSS) vulnerabilities in Mahara 1.0 before 1.0.10 and 1.1 before 1.1.2 allow remote attackers to inject arbitrary web script or HTML via a (1) profile and (2) blog, a different vulnerability than CVE-2009-0487.)
 CVE-2009-0240 (listing.php in WebSVN 2.0 and possibly 1.7 beta, when using an SVN authz file, allows remote authenticated users to read changelogs or diffs for restricted projects via a modified repname parameter.)
 CVE-2008-5919 (Directory traversal vulnerability in rss.php in WebSVN 2.0 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to overwrite arbitrary files via directory traversal sequences in the rev parameter.)
 CVE-2008-5919 (Directory traversal vulnerability in rss.php in WebSVN 2.0 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to overwrite arbitrary files via directory traversal sequences in the rev parameter.)
 CVE-2008-5918 (Cross-site scripting (XSS) vulnerability in the getParameterisedSelfUrl function in index.php in WebSVN 2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.)
 CVE-2008-5918 (Cross-site scripting (XSS) vulnerability in the getParameterisedSelfUrl function in index.php in WebSVN 2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.)
Original documentdocumentiliz-z_(at)_yandex.ru, TikiWiki 2.2 XSS Vulnerability in URI (12.03.2009)
 documentlarry_(at)_jlogica.com, Trellis Desk v1.0 XSS Vulnerability (12.03.2009)
 documentMustLive, Multiple vulnerabilities in Athree CMS (12.03.2009)
 documentSEC Consult Vulnerability Lab, SEC Consult SA-20090305-0 :: NextApp Echo XML Injection Vulnerability (12.03.2009)
 documentsosoblood_(at)_hotmail.com, Sun Java System Communications Express [HTML Injection] (12.03.2009)
 documentDEBIAN, [SECURITY] [DSA 1736-1] New mahara packages fix cross-site scripting (12.03.2009)
 documentISecAuditors Security Advisories, [ISecAuditors Security Advisories] WordPress MU HTTP Header XSS Vulnerability (12.03.2009)
 documentvuln_(at)_e-rdc.org, [ECHO_ADV_104$2009] WeBid <= 0.7.3 RC9 Multiple Remote File Inclution Vulnerabilities (12.03.2009)
 documentmr.faghani_(at)_gmail.com, Aryanic HighCMS and HighPortal multiple Vulnerabilities (12.03.2009)
 documentGENTOO, [ GLSA 200903-20 ] WebSVN: Multiple vulnerabilities (12.03.2009)

dash privilege esclation
Published:12.03.2009
Source:
SecurityVulns ID:9737
Type:local
Threat Level:
5/10
Description:privilege esccalation with .profile
Affected:DASH : dash 0.5
CVE:CVE-2009-0854 (Untrusted search path vulnerability in dash 0.5.4, when used as a login shell, allows local users to execute arbitrary code via a Trojan horse .profile file in the current working directory.)
Original documentdocumentUBUNTU, [USN-732-1] dash vulnerability (12.03.2009)

POP Peeper buffer overflow
Published:12.03.2009
Source:
SecurityVulns ID:9738
Type:remote
Threat Level:
5/10
Description:Buffer overflow with Date: header.
Affected:POPPEEPER : POP Peeper 3.4
Original documentdocumentKrakow Labs, POP Peeper 3.4.0.0 Date Remote Buffer Overflow Exploit (12.03.2009)
Files:POP Peeper 3.4.0.0 UIDL Remote Buffer Overflow Exploit

Cisco CallManager / Unified Communications Manager privilege escalation
Published:12.03.2009
Source:
SecurityVulns ID:9739
Type:remote
Threat Level:
6/10
Description:During authentication process for address book synchronization, full access account credentials are leaked to client.
Affected:CISCO : Unified CallManager 4.1
 CISCO : Unified Communications Manager 4.2
 CISCO : Unified Communications Manager 4.3
 CISCO : Unified Communications Manager 5.1
 CISCO : Unified Communications Manager 6.1
 CISCO : Unified Communications Manager 7.0
CVE:CVE-2009-0632 (The IP Phone Personal Address Book (PAB) Synchronizer feature in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.1, 4.2 before 4.2(3)SR4b, 4.3 before 4.3(2)SR1b, 5.x before 5.1(3e), 6.x before 6.1(3), and 7.0 before 7.0(2) sends privileged directory-service account credentials to the client in cleartext, which allows remote attackers to modify the CUCM configuration and perform other privileged actions by intercepting these credentials, and then using them in requests unrelated to the intended synchronization task, as demonstrated by (1) DC Directory account credentials in CUCM 4.x and (2) TabSyncSysUser account credentials in CUCM 5.x through 7.x.)
Original documentdocumentCISCO, Cisco Security Advisory: Cisco Unified Communications Manager IP Phone Personal Address Book Synchronizer Privilege Escalation Vulnerability (12.03.2009)

wesnoth game multiple security vulnerabilities
Published:12.03.2009
Source:
SecurityVulns ID:9740
Type:remote
Threat Level:
5/10
Description:DoS, code execution.
Affected:WESNOTH : Wesnoth 1.4
 WESNOTH : Wesnoth 1.5
CVE:CVE-2009-0367 (The Python AI module in Wesnoth 1.4.x and 1.5 before 1.5.11 allows remote attackers to escape the sandbox and execute arbitrary code by using a whitelisted module that imports an unsafe module, then using a hierarchical module name to access the unsafe module through the whitelisted module.)
 CVE-2009-0366 (The uncompress_buffer function in src/server/simple_wml.cpp in Wesnoth before r33069 allows remote attackers to cause a denial of service via a large compressed WML document.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 1737-1] New wesnoth packages fix several vulnerabilities (12.03.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod