Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft Internet Explorer multiple security vulnerabilities
updated since 12.08.2008
Published:14.08.2008
Source:
SecurityVulns ID:9217
Type:remote
Threat Level:
8/10
Description:Multiple memory corruptions, MHTML crossite scripting.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
CVE:CVE-2008-2259
 CVE-2008-2258 (Microsoft Internet Explorer 5.01, 6, and 7 accesses uninitialized memory in certain conditions, which allows remote attackers to cause a denial of service (crash) and execute arbitrary code via vectors related to a document object "appended in a specific order" with "particular functions ... performed on" document objects, aka "HTML Objects Memory Corruption Vulnerability" or "Table Layout Memory Corruption Vulnerability," a different vulnerability than CVE-2008-2257.)
 CVE-2008-2257 (Microsoft Internet Explorer 5.01, 6, and 7 accesses uninitialized memory in certain conditions, which allows remote attackers to cause a denial of service (crash) and execute arbitrary code via vectors related to a document object "appended in a specific order," aka "HTML Objects Memory Corruption Vulnerability" or "XHTML Rendering Memory Corruption Vulnerability," a different vulnerability than CVE-2008-2258.)
 CVE-2008-2256
 CVE-2008-2255
 CVE-2008-2254 (Microsoft Internet Explorer 6 and 7 accesses uninitialized memory, which allows remote attackers to cause a denial of service (crash) and execute arbitrary code via unknown vectors, aka "HTML Object Memory Corruption Vulnerability.")
 CVE-2008-1448 (The MHTML protocol handler in a component of Microsoft Outlook Express 5.5 SP2 and 6 through SP1, and Windows Mail, does not assign the correct Internet Explorer Security Zone to UNC share pathnames, which allows remote attackers to bypass intended access restrictions and read arbitrary files via an mhtml: URI in conjunction with a redirection, aka "URL Parsing Cross-Domain Information Disclosure Vulnerability.")
Original documentdocumentCORE SECURITY TECHNOLOGIES ADVISORIES, CORE-2008-0103: Internet Explorer Zone Elevation Restrictions Bypass and Security Zone Restrictions Bypass (14.08.2008)
 documentZDI, ZDI-08-050: Microsoft Internet Explorer XHTML Rendering Memory Corruption Vulnerability (13.08.2008)
 documentZDI, ZDI-08-051: Microsoft Internet Explorer Table Layout Memory Corruption Vulnerability (13.08.2008)
 documentMICROSOFT, Microsoft Security Bulletin MS08-048 - Important Security Update for Outlook Express and Windows Mail (951066) (12.08.2008)
 documentMICROSOFT, Microsoft Security Bulletin MS08-045 - Critical Cumulative Security Update for Internet Explorer (953838) (12.08.2008)
Files:Microsoft Security Bulletin MS08-045 - Critical Cumulative Security Update for Internet Explorer (953838)
 Microsoft Security Bulletin MS08-048 - Important Security Update for Outlook Express and Windows Mail (951066)

Postfix mail server hardlinks privilege escalation
updated since 14.08.2008
Published:02.09.2008
Source:
SecurityVulns ID:9222
Type:local
Threat Level:
4/10
Description:It's possible to cause Postfix to deliver mail to system file by using hardlinks to symlink (available against standard in Linux, IRIX, Solaris).
Affected:POSTFIX : Postfix 2.3
 POSTFIX : Postfix 2.4
 POSTFIX : postfix 2.5
 POSTFIX : postfix 2.6
CVE:CVE-2008-2937 (Postfix 2.5 before 2.5.4 and 2.6 before 2.6-20080814 delivers to a mailbox file even when this file is not owned by the recipient, which allows local users to read e-mail messages by creating a mailbox file corresponding to another user's account name.)
 CVE-2008-2936 (Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.)
Original documentdocumentRoman Medina, PoCfix (PoC for Postfix local root vuln - CVE-2008-2936) (02.09.2008)
 documentWietse Venema, Postfix local privilege escalation via hardlinked symlinks (14.08.2008)
Files:PoC for Postfix local root vuln - CVE-2008-2936

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod