Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft WINS multiple security vulnerabilities
updated since 11.08.2009
Published:12.08.2009
Source:
SecurityVulns ID:10142
Type:remote
Threat Level:
7/10
Description:Integer overflow, heap buffer overflow.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2003 Server
CVE:CVE-2009-1924 (Integer overflow in the Windows Internet Name Service (WINS) component for Microsoft Windows 2000 SP4 allows remote WINS replication partners to execute arbitrary code via crafted data structures in a packet, aka "WINS Integer Overflow Vulnerability.")
 CVE-2009-1923 (Heap-based buffer overflow in the Windows Internet Name Service (WINS) component for Microsoft Windows 2000 SP4 and Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted WINS replication packet that triggers an incorrect buffer-length calculation, aka "WINS Heap Overflow Vulnerability.")
Original documentdocumentZDI, ZDI-09-053: Microsoft Windows WINS Service Heap Overflow Vulnerability (12.08.2009)
 documentMICROSOFT, Microsoft Security Bulletin MS09-039 - Critical Vulnerabilities in WINS Could Allow Remote Code Execution (969883) (11.08.2009)
Files:Microsoft Security Bulletin MS09-039 - Critical Vulnerabilities in WINS Could Allow Remote Code Execution (969883)

Microsoft Windows Workstation service memory corruption
updated since 11.08.2009
Published:12.08.2009
Source:
SecurityVulns ID:10144
Type:local
Threat Level:
6/10
Description:Memory corruption on RPC message parsing.
Affected:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
CVE:CVE-2009-1544 (Double free vulnerability in the Workstation service in Microsoft Windows allows remote authenticated users to gain privileges via a crafted RPC message to a Windows XP SP2 or SP3 or Server 2003 SP2 system, or cause a denial of service via a crafted RPC message to a Vista Gold, SP1, or SP2 or Server 2008 Gold or SP2 system, aka "Workstation Service Memory Corruption Vulnerability.")
Original documentdocumentDVLabs, TPTI-09-06: Microsoft Windows Workstation Service NetrGetJoinInformation Heap Corruption Vulnerability (12.08.2009)
 documentMICROSOFT, Microsoft Security Bulletin MS09-041 - Important Vulnerability in Workstation Service Could Allow Elevation of Privilege (971657) (11.08.2009)
Files:Microsoft Security Bulletin MS09-041 - Important Vulnerability in Workstation Service Could Allow Elevation of Privilege (971657)

Microsoft RDP client multiple security vulnerabilities
updated since 11.08.2009
Published:12.08.2009
Source:
SecurityVulns ID:10146
Type:client
Threat Level:
7/10
Description:Memory corruption in ActiveX control, memory corruption on server reply processing.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Remote Desktop Connection Client for Mac 2.0
CVE:CVE-2009-1929 (Heap-based buffer overflow in the Microsoft Terminal Services Client ActiveX control running RDP 6.1 on Windows XP SP2, Vista SP1 or SP2, or Server 2008 Gold or SP2; or 5.2 or 6.1 on Windows XP SP3; allows remote attackers to execute arbitrary code via unspecified parameters to unknown methods, aka "Remote Desktop Connection ActiveX Control Heap Overflow Vulnerability.")
 CVE-2009-1133 (Heap-based buffer overflow in Microsoft Remote Desktop Connection (formerly Terminal Services Client) running RDP 5.0 through 6.1 on Windows, and Remote Desktop Connection Client for Mac 2.0, allows remote attackers to execute arbitrary code via unspecified parameters, aka "Remote Desktop Connection Heap Overflow Vulnerability.")
Original documentdocumentZDI, ZDI-09-057: Microsoft Remote Desktop Client Arbitrary Code Execution Vulnerability (12.08.2009)
 documentMICROSOFT, Microsoft Security Bulletin MS09-044 - Critical Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution (970927) (11.08.2009)
Files:Microsoft Security Bulletin MS09-044 - Critical Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution (970927)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:12.08.2009
Source:
SecurityVulns ID:10147
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:SAP : NetWeaver 7.0
 OCS : OCS Inventory NG Server 1.2
 Plume : Plume CMS 1.2
 JIBBERBOOK : JibberBook 2.3
Original documentdocumentAlexandr Polyakov, [DSECRG-09-033] SAP Netweaver UDDI - XSS Security Vulnerability (12.08.2009)
 documentfaghani_(at)_nsec.ir, Chavoosh CMS SQL Injection Vulnerability (12.08.2009)
 documentcontact_(at)_onuryilmaz.info, JibberBook GuestBook 2.3 Multiple Vulnerabilities (12.08.2009)
 documentSense of Security, [Full-disclosure] Plume CMS Multiple SQL Injection Vulnerabilities - Security Advisory - SOS-09-006 (12.08.2009)
 documentgmcbr0 gmcbr0, Sql injection in OCS Inventory NG Server 1.2.1 (12.08.2009)

2Wire routers unauthorized access
Published:12.08.2009
Source:
SecurityVulns ID:10148
Type:remote
Threat Level:
5/10
Description:It's possible to reset password without knowledge of old one.
Affected:2WIRE : 2wire 1701HG
 2WIRE : 2wire 2071
 2WIRE : 2wire 1800HW
Original documentdocumenthkm_(at)_hakim.ws, 2WIRE Gateway Authentication Bypass & Password Reset (12.08.2009)

Microsoft Windows MSMQ (message queuing) privilege escalation
updated since 11.08.2009
Published:12.08.2009
Source:
SecurityVulns ID:10143
Type:local
Threat Level:
6/10
Description:DoS conditions in the service lead to named channel spoofing possibility.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
CVE:CVE-2009-1922 (The Message Queuing (aka MSMQ) service for Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP2, and Vista Gold does not properly validate unspecified IOCTL request data from user mode before passing this data to kernel mode, which allows local users to gain privileges via a crafted request, aka "MSMQ Null Pointer Vulnerability.")
Original documentdocumentValery Marchuk, [PT-2008-09] Microsoft Windows MSMQ Privilege Escalation Vulnerability (12.08.2009)
 documentMICROSOFT, Microsoft Security Bulletin MS09-040 - Important Vulnerability in Message Queuing Could Allow Elevation of Privilege (971032) (11.08.2009)
Files:Microsoft Security Bulletin MS09-040 - Important Vulnerability in Message Queuing Could Allow Elevation of Privilege (971032)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod