Computer Security
[EN] securityvulns.ru no-pyccku


MIT Kerberos buffer overflow
updated since 06.09.2007
Published:13.09.2007
Source:
SecurityVulns ID:8119
Type:library
Threat Level:
7/10
Description:Buffer overflow on oversized string in RPC library svcauth_gss_validate() function.
Affected:MIT : krb5 1.6
CVE:CVE-2007-3999 (Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and possibly third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.)
Original documentdocumentZDI, ZDI-07-052: Multiple Kerberos Implementations Authentication Context Stack Overflow Vulnerability (13.09.2007)

Oracle Jinitiator ActiveX buffer overflow
Published:13.09.2007
Source:
SecurityVulns ID:8140
Type:client
Threat Level:
6/10
Description:Multiple stack based buffer overflows.
Affected:ORACLE : Jinitiator 1.1
CVE:CVE-2007-4467 (Multiple stack-based buffer overflows in the Oracle JInitiator ActiveX control (beans.ocx) 1.1.8.16 and earlier allow remote attackers to execute arbitrary code via unspecified "initialization parameters.")
Original documentdocumentIntegrigy Security Alerts, Oracle Jinitiator 1.1.8 Vulnerabilities CVE-2007-4467 - Additional Information (13.09.2007)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:13.09.2007
Source:
SecurityVulns ID:8141
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:SWSOFT : Plesk 7.6
 SWSOFT : Plesk 8.1
 PARALLELS : Plesk 8.2
 BOINC : Boinc 5.10
Original documentdocumentcrazy_king_(at)_eno7.org, CS Guestbook Admin Name & Md5 Security Vuln (13.09.2007)
 documentHackers Center Security Group, Boinc Forum Cross Site Scripting Vulrnability (13.09.2007)
 documentNick Merritt, RE: ScanAlert Security Advisory (13.09.2007)

X.Org X server composite extention buffer overflow
Published:13.09.2007
Source:
SecurityVulns ID:8142
Type:local
Threat Level:
5/10
Affected:XORG : X.Org 1.3
CVE:CVE-2007-4730 (Buffer overflow in the compNewPixmap function in compalloc.c in the Composite extension for the X.org X11 server before 1.4 allows local users to execute arbitrary code by copying data from a large pixel depth pixmap into a smaller pixel depth pixmap.)

RSA Envision crossite scripting
Published:13.09.2007
Source:
SecurityVulns ID:8143
Type:remote
Threat Level:
5/10
Description:Crossite scripting with username.
Affected:RSA : EnVision 3.3
Original documentdocumentStelios Tigkas, RSA EnVision Reflected XSS Hole (13.09.2007)

Ekiga VoIP/video application DoS
Published:13.09.2007
Source:
SecurityVulns ID:8144
Type:client
Threat Level:
5/10
Description:SIPURL::GetHostAddress() invalid memory allocation.
Affected:EKIGA : Ekiga 2.0
Original documentdocumentlabs_(at)_s21sec.com, S21SEC-036-EN Ekiga <= 2.0.5 Denial of service (13.09.2007)

Apple Quicktime code execution
Published:13.09.2007
Source:
SecurityVulns ID:8145
Type:client
Threat Level:
7/10
Description:It's possible to execute script in browser's system context.
Affected:APPLE : QuickTime 7.1
Original documentdocumentpdp (architect), 0DAY: QuickTime pwns Firefox (13.09.2007)

Autodesk Backburner backdoor
Published:13.09.2007
Source:
SecurityVulns ID:8146
Type:remote
Threat Level:
6/10
Description:Service accepts commands thorugh TCP/3234.
Affected:AUTODESK : Backburner 3.0
CVE:CVE-2007-4749 (The cmdjob utility in Autodesk Backburner 3.0.2 allows remote attackers to execute arbitrary commands on render servers by queueing jobs that contain these commands. NOTE: this is only a vulnerability in environments in which the administrator has not followed documentation that outlines the security risks of operating Backburner on untrusted networks.)
Original documentdocumentSYMANTEC, SYMSA-2007-008: Autodesk Backburner 3.0.2 System Backdoor (13.09.2007)

AOL Instant Messenger alerts spoofing
Published:13.09.2007
Source:
SecurityVulns ID:8147
Type:remote
Threat Level:
5/10
Affected:AOL : Instant Messenger 6.1
Original documentdocumentshell_(at)_dotshell.net, AIM Arbitrary HTML Display in Notification Window (13.09.2007)

Multiple video players memory corruption
Published:13.09.2007
Source:
SecurityVulns ID:8148
Type:client
Threat Level:
5/10
Description:Memory corruption on malformed AVI file.
Affected:MPLAYER : MPlayer 1.0
 MPC : Media Player Classic 6.4
 MYMPC : mympc 1.0
 STORMPLAYER : StormPlayer 1.0
 KMPLAYER : KMPlayer 2.9
Original documentdocumentvulnhunt_(at)_gmail.com, CAL-20070912-1 Multiple vendor produce handling AVI file vulnerabilities (13.09.2007)

Apache crossite scripting
Published:13.09.2007
Source:
SecurityVulns ID:8149
Type:remote
Threat Level:
5/10
Description:Crossite scripting with UTF-7 characters on directories listing and error messages.
Affected:APACHE : Apache 2.2
CVE:CVE-2007-4465 (Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.)
Original documentdocumentMaksymilian Arciemowicz, Apache2 Undefined Charset UTF-7 XSS Vulnerability (13.09.2007)

Quagga bgpd BGP routing daemon DoS
Published:13.09.2007
Source:
SecurityVulns ID:8150
Type:remote
Threat Level:
5/10
Description:Crash on invalid OPEN and UPDATE requests.
Affected:QUAGGA : quagga 0.99
Original documentdocumentnoreply_(at)_musecurity.com, [Full-disclosure] [MU-200709-01] Quagga bgpd Remote Denial of Service Vulnerability (13.09.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod