Computer Security
[EN] securityvulns.ru no-pyccku


Adobe Acrobat / Reader multiple security vulnerabilities
updated since 21.01.2012
Published:13.02.2012
Source:
SecurityVulns ID:12154
Type:client
Threat Level:
8/10
Description:Code execution, multiple memory corruptions.
Affected:ADOBE : Reader 10.1
 ADOBE : Acrobat 10.1
CVE:CVE-2011-4373 (Adobe Reader and Acrobat before 9.5, and 10.x before 10.1.2, on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-4370 and CVE-2011-4372.)
 CVE-2011-4372 (Adobe Reader and Acrobat before 9.5, and 10.x before 10.1.2, on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-4370 and CVE-2011-4373.)
 CVE-2011-4371 (Adobe Reader and Acrobat before 9.5, and 10.x before 10.1.2, on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.)
 CVE-2011-4370 (Adobe Reader and Acrobat before 9.5, and 10.x before 10.1.2, on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-4372 and CVE-2011-4373.)
 CVE-2011-4369 (Unspecified vulnerability in the PRC component in Adobe Reader and Acrobat 9.x before 9.4.7 on Windows, Adobe Reader and Acrobat 9.x through 9.4.6 on Mac OS X, Adobe Reader and Acrobat 10.x through 10.1.1 on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.)
 CVE-2011-2462 (Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.)
Original documentdocumentZDI, ZDI-12-021 : Adobe Reader BMP Resource Signedness Remote Code Execution Vulnerability (13.02.2012)
 documentVUPEN Security Research, VUPEN Security Research - Adobe Acrobat and Reader Image Processing Integer Overflow (APSB12-01) (21.01.2012)
 documentADOBE, Security updates available for Adobe Reader and Acrobat (21.01.2012)

Novell iPrint buffer overflow
Published:13.02.2012
Source:
SecurityVulns ID:12178
Type:remote
Threat Level:
5/10
Description:Buffer overflow on TCP/631 request parsing.
Affected:NOVELL : Novell Open Enterprise Server 2
CVE:CVE-2011-4194 (Buffer overflow in Novell iPrint Server in Novell Open Enterprise Server 2 (OES2) through SP3 on Linux allows remote attackers to execute arbitrary code via a crafted attributes-natural-language field.)
Original documentdocumentZDI, ZDI-12-031 : Novell iPrint Server attributes-natural-language Remote Code Execution Vulnerability (13.02.2012)

IBM ActiveX multiple security vulnerabilities
Published:13.02.2012
Source:
SecurityVulns ID:12179
Type:client
Threat Level:
5/10
Description:SPSS and Rational Rhapsody ActiveX multiple security vulnerabilities.
CVE:CVE-2012-0190 (Unspecified vulnerability in the Render method in the ExportHTML.ocx ActiveX control in ExportHTML.dll in IBM SPSS Dimensions 5.5 and SPSS Data Collection 5.6, 6.0, and 6.0.1 allows remote attackers to execute arbitrary code via a crafted HTML document.)
 CVE-2012-0189 (Multiple unspecified vulnerabilities in the (1) PrintFile and (2) SaveDoc methods in the VsVIEW6 ActiveX control in VsVIEW6.ocx in IBM SPSS SamplePower 3.0 allow remote attackers to execute arbitrary code via a crafted HTML document.)
 CVE-2012-0188 (Unspecified vulnerability in the SetLicenseInfoEx method in an ActiveX control in mraboutb.dll in IBM SPSS Dimensions 5.5 and SPSS Data Collection 5.6, 6.0, and 6.0.1 allows remote attackers to execute arbitrary code via a crafted HTML document.)
 CVE-2012-0188 (Unspecified vulnerability in the SetLicenseInfoEx method in an ActiveX control in mraboutb.dll in IBM SPSS Dimensions 5.5 and SPSS Data Collection 5.6, 6.0, and 6.0.1 allows remote attackers to execute arbitrary code via a crafted HTML document.)
 CVE-2011-1392 (The Blueberry FlashBack ActiveX control in BB FlashBack Recorder.dll in Blueberry BB FlashBack, as used in IBM Rational Rhapsody before 7.6.1 and other products, does not properly implement the (1) Start, (2) PauseAndSave, (3) InsertMarker, and (4) InsertSoundToFBRAtMarker methods, which allows remote attackers to execute arbitrary code via unspecified vectors.)
 CVE-2011-1391 (The Blueberry FlashBack ActiveX control in BB FlashBack Recorder.dll in Blueberry BB FlashBack, as used in IBM Rational Rhapsody before 7.6.1 and other products, does not properly implement the InsertMarker method, which allows remote attackers to execute arbitrary code via unspecified vectors.)
 CVE-2011-1388 (The Blueberry FlashBack ActiveX control in BB FlashBack Recorder.dll in Blueberry BB FlashBack, as used in IBM Rational Rhapsody before 7.6.1 and other products, does not properly implement the TestCompatibilityRecordMode method, which allows remote attackers to execute arbitrary code via unspecified vectors.)
Original documentdocumentZDI, ZDI-12-019 : IBM SPSS mraboutb.dll ActiveX Control SetLicenseInfoEx Method Remote Code Execution Vulnerability (13.02.2012)
 documentZDI, ZDI-12-030 : IBM Rational Rhapsody BBFlashBack.Recorder.1 TestCompatibilityRecordMode Remote Code Execution Vulnerability (13.02.2012)
 documentZDI, ZDI-12-029 : IBM Rational Rhapsody BBFlashBack.Recorder.1 InsertMarker Remote Code Execution Vulnerability (13.02.2012)
 documentZDI, ZDI-12-028 : IBM Rational Rhapsody BBFlashBack.FBRecorder.1 Control Multiple Remote Code Execution Vulnerabilities (13.02.2012)
 documentZDI, ZDI-12-027 : IBM SPSS VsVIEW6.ocx ActiveX Control SaveDoc Method Remote Code Execution Vulnerability (13.02.2012)
 documentZDI, ZDI-12-026 : IBM SPSS ExportHTML.dll ActiveX Control Render Method Remote Code Execution Vulnerability (13.02.2012)

EMC Networker buffer overflow
Published:13.02.2012
Source:
SecurityVulns ID:12180
Type:remote
Threat Level:
6/10
Description:Buffer overflow on RPC request parsing in indexd.exe
Affected:EMC : NetWorker 7.6
 EMC : NetWorker 7.5
CVE:CVE-2012-0395 (Buffer overflow in the server in EMC NetWorker 7.5.x and 7.6.x before 7.6.3 SP1 Cumulative Release build 851 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.)
Original documentdocumentEMC, ESA-2012-005: EMC NetWorker buffer overflow vulnerability (13.02.2012)
 documentZDI, ZDI-12-025 : EMC Networker indexd.exe Opcode 0x01 Parsing Remote Code Execution (13.02.2012)

CA Total Defense multiple security vulnerabilities
Published:13.02.2012
Source:
SecurityVulns ID:12181
Type:remote
Threat Level:
6/10
Description:SQL injection, information leakage.
Original documentdocumentZDI, ZDI-12-024 : Total Defense Suite UNC Management Web Service uncsp_ViewReportsHomepage SQL Injection Vulnerability (13.02.2012)
 documentZDI, ZDI-12-023 : Total Defense Suite UNC Management Web Service Database Credentials Disclosure Vulnerability (13.02.2012)
 documentZDI, ZDI-12-022 : Total Defense Suite UNC Management Console ExportReport SQL Injection Vulnerability (13.02.2012)

Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:13.02.2012
Source:
SecurityVulns ID:12182
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:BUGZILLA : Bugzilla 3.5
 BUGZILLA : Bugzilla 3.6
 BUGZILLA : Bugzilla 3.7
 ZENPHOTO : ZenPhoto 1.4
 PHPLDAPADMIN : phpLDAPadmin 1.2
 BUGZILLA : Bugzilla 4.1
 CYBEROAM : Cyberoam Central Console 2.00
 EFRONTLEARNING : eFronts Community++ 3.6
 BATAVI : Batavi 1.1
 APACHE : CXF 2.4
 APACHE : CXF 2.5
 SIMPLEGROUPWARE : SimpleGroupware 0.742
 BUGZILLA : Bugzilla 4.2
 BUGZILLA : Bugzilla 4.0
 MIBEW : mibew messenger 1.6
 POSTFIXADMIN : postfixadmin 2.3
 OSCLASS : OSClass 2.3
 DLCASSIFIEDS : DClassifieds 0.1
 WORDPRESS : WordPress 3.3
 WORDPRESS : Kish Guest Posting Plugin 1.0
 BIGWARE : Bigware shop 2.14
 SOLARWINDS : SolarWinds Storage Manager Server 5.1
 WORDPRESS : AllWebMenus 1.1
CVE:CVE-2012-0995 (Multiple cross-site scripting (XSS) vulnerabilities in ZENphoto 1.4.2 allow remote attackers to inject arbitrary web script or HTML via the (1) msg parameter in an external action to zp-core/admin.php, (2) PATH_INTO to an unspecified URL, as demonstrated using /1/, (3) PATH_INFO to zp-core/admin.php, or (4) album parameter to zp-core/admin-edit.php.)
 CVE-2012-0994 (SQL injection vulnerability in the Manage Albums feature in zp-core/admin-albumsort.php in ZENphoto 1.4.2 allows remote authenticated users to execute arbitrary SQL commands via the sortableList parameter.)
 CVE-2012-0993 (Eval injection vulnerability in zp-core/zp-extensions/viewer_size_image.php in ZENphoto 1.4.2, when the viewer_size_image plugin is enabled, allows remote attackers to execute arbitrary PHP code via the viewer_size_image_saved cookie.)
 CVE-2012-0803
 CVE-2012-0448 (Bugzilla 2.x and 3.x before 3.4.14, 3.5.x and 3.6.x before 3.6.8, 3.7.x and 4.0.x before 4.0.4, and 4.1.x and 4.2.x before 4.2rc2 does not reject non-ASCII characters in e-mail addresses of new user accounts, which makes it easier for remote authenticated users to spoof other user accounts by choosing a similar e-mail address.)
Original documentdocumentpavel_(at)_6scan.com, AllWebMenus < 1.1.9 WordPress Menu Plugin Arbitrary file upload (13.02.2012)
 documentddivulnalert_(at)_ddifrontline.com, DDIVRT-2011-39 SolarWinds Storage Manager Server SQL Injection Authentication Bypass (13.02.2012)
 documentVulnerability Lab, Bart`s CMS - SQL Injection Vulnerability (13.02.2012)
 documentrwenzel_(at)_dw-itsecurity.de, SQL injection in Bigware shop software (13.02.2012)
 documentn0b0d13s_(at)_gmail.com, Wordpress Kish Guest Posting Plugin 1.0 (uploadify.php) Unrestricted File Upload Vulnerability (13.02.2012)
 documentTrustwave Advisories, TWSL2012-002: Multiple Vulnerabilities in WordPress (13.02.2012)
 documentHigh-Tech Bridge Security Research, CSRF (Cross-Site Request Forgery) in DClassifieds (13.02.2012)
 documentHigh-Tech Bridge Security Research, Multiple vulnerabilities in OSclass (13.02.2012)
 documentFilippo Cavallarin, Mibew messenger multiple XSS (13.02.2012)
 documentFilippo Cavallarin, Multiple vulnerabilities in postfixadmin (13.02.2012)
 documentFilippo Cavallarin, Multiple vulnerabilities in OSClass (13.02.2012)
 documentLpSolit_(at)_gmail.com, Security advisory for Bugzilla 4.2rc2, 4.0.4, 3.6.8 and 3.4.14 (13.02.2012)
 documentHigh-Tech Bridge Security Research, Multiple vulnerabilities in OpenEMR (13.02.2012)
 documentandsarmiento_(at)_gmail.com, XSS phpLDAPadmin: 1.2.0.5 (Debian package) and 1.2.2 (sourceforge) (13.02.2012)
 documentsecurity_(at)_infoserve.de, SimpleGroupware 0.742 Cross-Site-Scripting vulnerability (13.02.2012)
 documentAPACHE, CVE-2012-0803: Apache CXF does not validate UsernameToken policies correctly (13.02.2012)
 documentNetsparker Advisories, SQL Injection Vulnerability in Batavi 1.1.2 (13.02.2012)
 documentVulnerability Lab, eFronts Community++ v3.6.10 - Cross Site Vulnerability (13.02.2012)
 documentVulnerability Lab, Cyberoam Central Console v2.00.2 - File Include Vulnerability (13.02.2012)
 documentHigh-Tech Bridge Security Research, Multiple vulnerabilities in ZENphoto (13.02.2012)

D-Link ShareCenter security vulnerabilities
Published:13.02.2012
Source:
SecurityVulns ID:12183
Type:remote
Threat Level:
5/10
Description:Authentication bypass, information leakage.
Affected:DLINK : D-Link DNS-320
 DLINK : D-Link DNS-325
Original documentdocumentroberto.paleari_(at)_emaze.net, Unauthenticated remote code execution on D-Link ShareCenter products (13.02.2012)

HP Data Protector Media Operations integer overflow
Published:13.02.2012
Source:
SecurityVulns ID:12184
Type:remote
Threat Level:
5/10
Description:DBServer.exe integer overflow.
Affected:HP : HP Data Protector Media Operations 6.11
CVE:CVE-2011-4791 (DBServer.exe in HP Data Protector Media Operations 6.11 and earlier allows remote attackers to execute arbitrary code via a crafted request containing a large value in a length field.)
Original documentdocumentHP, [security bulletin] HPSBMU02739 SSRT100280 rev.1 - HP Data Protector Media Operations, Remote Execution of Arbitrary Code (13.02.2012)

EMC Documentum Content Server privilege escalation
Published:13.02.2012
Source:
SecurityVulns ID:12185
Type:local
Threat Level:
4/10
Description:System administrator can elevate privileges to super-user.
Affected:EMC : Documentum Content Server 6.5
 EMC : Documentum Content Server 6.6
Original documentdocumentEMC, ESA-2012-009: EMC Documentum Content Server privilege elevation vulnerability (13.02.2012)

sudo format string vulnerability
Published:13.02.2012
Source:
SecurityVulns ID:12186
Type:local
Threat Level:
6/10
Description:Format string vulnerability on logging.
Affected:SUDO : sudo 1.8
Original documentdocumentjoernchen of Phenoelit, Advisory: sudo 1.8 Format String Vulnerability (13.02.2012)

bip security vulnerabilities
Published:13.02.2012
Source:
SecurityVulns ID:12187
Type:remote
Threat Level:
5/10
Description:DoS, buffer overflow.
Affected:BIP : bip 0.8
CVE:CVE-2012-0806 (Buffer overflow in Bip 0.8.8 and earlier might allow remote authenticated users to execute arbitrary code via vectors involving a series of TCP connections that triggers use of many open file descriptors.)
 CVE-2010-3071 (bip before 0.8.6 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an empty USER command.)
Original documentdocumentGENTOO, [ GLSA 201201-18 ] bip: Multiple vulnerabilities (13.02.2012)

Wireshark multiple security vulnerabilities
Published:13.02.2012
Source:
SecurityVulns ID:12188
Type:remote
Threat Level:
5/10
Description:LANalyzer buffer overflow, DoS.
Affected:WIRESHARK : Wireshark 1.6
CVE:CVE-2012-0068 (The lanalyzer_read function in wiretap/lanalyzer.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a Novell catpure file containing a record that is too small.)
 CVE-2012-0067 (wiretap/iptrace.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in an AIX iptrace file.)
 CVE-2012-0066 (Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in a (1) Accellent 5Views (aka .5vw) file, (2) I4B trace file, or (3) NETMON 2 capture file.)
 CVE-2012-0042 (Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 does not properly perform certain string conversions, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet, related to epan/to_str.c.)
 CVE-2012-0041 (The dissect_packet function in epan/packet.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in a capture file, as demonstrated by an airopeek file.)
 CVE-2011-3483 (Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a "buffer exception handling vulnerability.")
Original documentdocumentDEBIAN, [SECURITY] [DSA 2395-1] wireshark security update (13.02.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod