Computer Security
[EN] securityvulns.ru no-pyccku


Cisco Firewall Services Module / Adaptive Security Appliances / Application Control Engine multiple DoS conditions
updated since 05.08.2010
Published:12.08.2010
Source:
SecurityVulns ID:11031
Type:remote
Threat Level:
6/10
Description:DoS on SunRPC and SIP protocols inspection, DoS on TCP, RTSP, TLS connections and IKE.
Affected:CISCO : ASA 7.0
 CISCO : ASA 7.1
 CISCO : FWSM 3.1
 CISCO : ASA 7.2
 CISCO : FWSM 3.2
 CISCO : ASA 8.0
 CISCO : FWSM 4.0
 CISCO : FWSM 4.1
 CISCO : ASA 8.1
 CISCO : ASA 8.2
 CISCO : ASA 8.3
CVE:CVE-2010-2821 (Unspecified vulnerability on the Cisco Firewall Services Module (FWSM) with software 3.2 before 3.2(17.2), 4.0 before 4.0(11.1), and 4.1 before 4.1(1.2) for Catalyst 6500 series switches and 7600 series routers, when multi-mode is enabled, allows remote attackers to cause a denial of service (device reload) via crafted (1) Telnet, (2) SSH, or (3) ASDM traffic over TCP, aka Bug ID CSCtg68694.)
 CVE-2010-2820 (Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61662.)
 CVE-2010-2819 (Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61622.)
 CVE-2010-2818 (Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61710.)
 CVE-2010-2817 (Unspecified vulnerability in the IKE implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.10), and 8.3 before 8.3(1.1) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a crafted IKE message, aka Bug ID CSCte46507.)
 CVE-2010-2816 (Unspecified vulnerability in the SIP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.17), 8.1 before 8.1(2.45), and 8.2 before 8.2(2.13) allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtd32106.)
 CVE-2010-2815 (Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf55259.)
 CVE-2010-2814 (Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf37506.)
 CVE-2010-1581 (Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtd32627.)
 CVE-2010-1580 (Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc85753.)
 CVE-2010-1579 (Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc79922.)
 CVE-2010-1578 (Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc77567.)
Original documentdocumentCISCO, Cisco Security Advisory: Multiple Vulnerabilities in the Cisco ACE Application Control Engine Module and Cisco ACE 4710 Application Control Engine (12.08.2010)
 documentCISCO, Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances (05.08.2010)
 documentCISCO, Cisco Security Advisory: Multiple Vulnerabilities in Cisco Firewall Services Module (05.08.2010)

SAP Crystal Reports 2008 integer overflow
Published:12.08.2010
Source:
SecurityVulns ID:11061
Type:remote
Threat Level:
6/10
Description:Integer overflow on GIOP message processing.
Affected:SAP : Crystal Reports 2008
Original documentdocumentZDI, TPTI-10-07: SAP Crystal Reports 2008 GIOP Message Size Integer Overflow Remote Code Execution Vulnerability (12.08.2010)

PDF documents signature spoofing
Published:12.08.2010
Source:
SecurityVulns ID:11062
Type:library
Threat Level:
6/10
Description:Document is hashed in a way it's possible to created 2 differently looging documents with same signature.
Original documentdocumentFlorian Zumbiehl, Collisions in PDF signatures (12.08.2010)

Adobe Coldfusion administration panel directory traversals
Published:12.08.2010
Source:
SecurityVulns ID:11063
Type:remote
Threat Level:
5/10
Description:Multiple directory traversal vulnerabilities.
Affected:ADOBE : ColdFusion MX 7.0
 ADOBE : ColdFusion MX 8.0
Original documentdocumentProCheckUp Research, PR10-07: Unauthenticated File Retrieval (traversal) within ColdFusion administration console (12.08.2010)

2Wire rotuers session hijacking
Published:12.08.2010
Source:
SecurityVulns ID:11064
Type:remote
Threat Level:
5/10
Description:Weak PRNG implementation allows to hijack web administration session by guessing session id.
Affected:2WIRE : 2Wire 2700HGV-2
Original documentdocumentYGN Ethical Hacker Group, 2Wire Broadband Router Session Hijacking Vulnerability (12.08.2010)

w3m browser certificate spoofing
Published:12.08.2010
Source:
SecurityVulns ID:11065
Type:remote
Threat Level:
5/10
Description:It's possible to spoof certificate CN by using null character.
Affected:W3M : w3m 0.5
CVE:CVE-2010-2074 (istream.c in w3m 0.5.2 and possibly other versions, when ssl_verify_server is enabled, does not properly handle a '\0' character in a domain name in the (1) subject's Common Name or (2) Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.)
Original documentdocumentUBUNTU, [USN-967-1] w3m vulnerability (12.08.2010)

Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:12.08.2010
Source:
SecurityVulns ID:11066
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:JOOMLA : Amblog 1.0
Original documentdocumentSalvatore "drosophila" Fresta, Amblog 1.0 Joomla Component Multiple SQL Injection Vulnerabilities (12.08.2010)
 documentSalvatore "drosophila" Fresta, Teams 1_1028_100809_1711 Joomla Component Multiple Blind SQL Injection Vulnerabilities (12.08.2010)
 documentMustLive, SQL Injection уязвимость в CMS WebManager-Pro (12.08.2010)

Novell ZENWorks Remote Management Agent code execution
Published:12.08.2010
Source:
SecurityVulns ID:11067
Type:remote
Threat Level:
5/10
Description:Weak authentication allows code execution.
Original documentdocumentZDI, ZDI-10-145: Novell ZENWorks Remote Management Agent Weak Authentication Remote Code Execution Vulnerability (12.08.2010)

Novell Sentinel Log Manager code execution
Published:12.08.2010
Source:
SecurityVulns ID:11068
Type:remote
Threat Level:
5/10
Description:fileDownload and reportPluginUpload servlets allow privileged operations to be executed without authentication.
Original documentdocumentZDI, ZDI-10-143: Novell Sentinel Log Manager Multiple Servlet Remote Code Execution Vulnerabilities (12.08.2010)

NetWordDLS Finger Server buffer overflow
Published:12.08.2010
Source:
SecurityVulns ID:11069
Type:remote
Threat Level:
5/10
Description:Oversized finger request buffer overflows.
Affected:NETWORLDLS : NetWordDLS Finger Server 1.0
Original documentdocumentEwerson Guimarгes (Crash) - Dclabs, [DCA-0009] - NetWordDLS Finger Server Denial of Service (12.08.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod