Computer Security
[EN] securityvulns.ru no-pyccku


IBM Lotus Notes / Autonomy Keyview multiple security vulnerabilities
Published:15.04.2008
Source:
SecurityVulns ID:8901
Type:remote
Threat Level:
7/10
Description:Multiple buffer overflows.
Affected:IBM : Lotus Notes 7.0
 AUTONOMY : Autonomy Keyview 10.3
CVE:CVE-2008-1101
 CVE-2008-0066
 CVE-2007-5399
Original documentdocumentSECUNIA, Secunia Research: Autonomy Keyview EML Reader Buffer Overflows (15.04.2008)
 documentSECUNIA, Secunia Research: Lotus Notes EML Reader Buffer Overflows (15.04.2008)
 documentSECUNIA, Secunia Research: Lotus Notes htmsr.dll Buffer Overflows (15.04.2008)
 documentSECUNIA, Secunia Research: Lotus Notes kvdocve.dll Path Processing Buffer Overflow (15.04.2008)

squid proxy server DoS
Published:15.04.2008
Source:
SecurityVulns ID:8902
Type:remote
Threat Level:
5/10
Description:assert() on invalid cache update reply.
Affected:SQUID : Squid 2.6
 SQUID : squid 2.5
CVE:CVE-2008-1612 (The arrayShrink function (lib/Array.c) in Squid 2.6.STABLE17 allows attackers to cause a denial of service (process exit) via unknown vectors that cause an array to shrink to 0 entries, which triggers an assert error. NOTE: this issue is due to an incorrect fix for CVE-2007-6239.)
Original documentdocumentUBUNTU, [USN-601-1] Squid vulnerability (15.04.2008)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:15.04.2008
Source:
SecurityVulns ID:8903
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:DOTCLEAR : Dotclear 1.2
 CEZANNE : Cezanne 7
 BOSDEB : BosNews 4.0
 BOSDEB : BosNews 2006
Original documentdocumenthoussamix_(at)_hotmail.fr, BosNews 2002-2006 Remote add user admin (15.04.2008)
 documenthoussamix_(at)_hotmail.fr, BosNews v4.0 Remote add user admin (15.04.2008)
 documentMorgan ARMAND, Dotclear 'ecrire/images.php' Arbitrary File Upload Vulnerability (15.04.2008)
 documentajax_(at)_hotmail.com, KwsPHP (Upload) Remote Code Execution Exploit (15.04.2008)
 documentS21sec labs, S21SEC-041-en:Cezanne SW Cross-Site Scripting (15.04.2008)
 documentS21sec labs, S21SEC-042-en:Cezanne SW Cross-Site Scripting (login required) (15.04.2008)
 documentS21sec labs, S21SEC-043-en:Cezanne SW Blind SQL Injection (15.04.2008)
 documentturkish-warriorr_(at)_hotmail.com, Fones Clinic Mart SQL (15.04.2008)
Files:KwsPHP All Version / Remote Code Execution

Watchguard Firebox user enumeration
Published:15.04.2008
Source:
SecurityVulns ID:8904
Type:remote
Threat Level:
4/10
Description:Error code is different for invalid username and password for PPTP MS-CHAPv2 authentication.
CVE:CVE-2008-1618 (The PPTP VPN service in Watchguard Firebox before 10, when performing the MS-CHAPv2 authentication handshake, generates different error codes during depending on whether the username is valid or invalid, which allows remote attackers to enumerate valid usernames.)
Original documentdocumentSECURITEAM, [NEWS] Watchguard Firebox PPTP VPN User Enumeration Vulnerability (15.04.2008)

Unixware utilities buffer overflow
Published:15.04.2008
Source:
SecurityVulns ID:8905
Type:local
Threat Level:
5/10
Description:Buffer overflows in suid utilities /usr/lib/merge/mcd /usr/opt/reliant/bin/hvdisp /usr/opt/reliant/bin/rcvm
Original documentdocumentSECURITEAM, [EXPL] SCO UnixWare Merge mcd Local Root (Exploit) (15.04.2008)
 documentSECURITEAM, [EXPL] SCO UnixWare Reliant HA Local Root (Exploit) (15.04.2008)
Files:UnixWare Reliant HA Local Root Exploit
 UnixWare Merge mcd Local Root Exploit\

Xitami web server format string vulnerability
Published:15.04.2008
Source:
SecurityVulns ID:8906
Type:remote
Threat Level:
6/10
Description:Format string vulnerability on SSI files handling.
Affected:XITAMI : Xitami 2.5
Original documentdocumentSECURITEAM, [NEWS] Xitami Web Server Multiple Vulnerabilities (Exploit) (15.04.2008)
Files:PoC exploit for Xitami Web Server v2.5c2 LRWP processing format string bug

IBM Websphere MQ unauthorized access
Published:15.04.2008
Source:
SecurityVulns ID:8907
Type:remote
Threat Level:
6/10
Description:Authentication bypass, security restrictions bypass.
Affected:IBM : Websphere MQ 5.3
CVE:CVE-2008-1130 (Unspecified vulnerability in IBM WebSphere MQ 6.0.x before 6.0.2.2 and 5.3 before Fix Pack 14 allows attackers to bypass access restrictions for a queue manager via a SVRCONN (MQ client) channel.)
Original documentdocumentSECURITEAM, [NEWS] Websphere MQ MCAUSER Setting Bypass Vulnerability (15.04.2008)
 documentSECURITEAM, [NEWS] Websphere MQ Security Exit Authentication Bypass Vulnerability (15.04.2008)

Opera browser multiple security vulnerabilities
Published:15.04.2008
Source:
SecurityVulns ID:8908
Type:remote
Threat Level:
6/10
Description:Multiple memory corruptions, keyboard passwords handling weakness.
Affected:OPERA : Opera 9.26
CVE:CVE-2008-1764 (Unspecified vulnerability in Opera for Windows before 9.27 has unknown impact and attack vectors related to "keyboard handling of password inputs.")
 CVE-2008-1762 (Opera before 9.27 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted scaled image pattern in an HTML CANVAS element, which triggers memory corruption.)
 CVE-2008-1761 (Opera before 9.27 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted newsfeed source, which triggers an invalid memory access.)
Original documentdocumentGENTOO, [ GLSA 200804-14 ] Opera: Multiple vulnerabilities (15.04.2008)

OpenOffice array index overflow
Published:15.04.2008
Source:
SecurityVulns ID:8910
Type:remote
Threat Level:
5/10
Description:Array index overflow on large number of document styles.
Affected:OPENOFFICE : OpenOffice 2.2
 OPENOFFICE : OpenOffice 2.3
Original documentdocumentAndriy Rysin, Potential OOo security problem (15.04.2008)

HP OpenView Network Node Manager multiple CGI buffer overflow
updated since 07.12.2007
Published:15.04.2008
Source:
SecurityVulns ID:8422
Type:remote
Threat Level:
5/10
Description:Buffer overflows in ovlogin.exe, OpenView5.exe, snmpviewer.exe, webappmon.exe. OpenView5.exe directory traversal.
Affected:HP : OpenView Network Node Manager 7.51
CVE:CVE-2008-0068 (Directory traversal vulnerability in OpenView5.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to read arbitrary files via directory traversal sequences in the Action parameter.)
 CVE-2007-6204 (Multiple stack-based buffer overflows in HP OpenView Network Node Manager (OV NNM) 6.41, 7.01, and 7.51 allow remote attackers to execute arbitrary code via unspecified long arguments to (1) ovlogin.exe, (2) OpenView5.exe, (3) snmpviewer.exe, and (4) webappmon.exe, as demonstrated via a long Action parameter to OpenView5.exe.)
Original documentdocumentSECUNIA, Secunia Research: HP OpenView Network Node Manager OpenView5.exe Directory Traversal (15.04.2008)
 documentHP, [security bulletin] HPSBMA02281 SSRT061261 rev.1 - HP OpenView Network Node Manager (OV NNM) Remote Unauthorized Execution of Arbitrary Code (07.12.2007)
 documentZDI, ZDI-07-071: HP OpenView Network Node Manager Multiple CGI Buffer Overflows (07.12.2007)

ClamAV antivirus multiple security vulnerabilities
updated since 15.04.2008
Published:16.04.2008
Source:
SecurityVulns ID:8909
Type:remote
Threat Level:
7/10
Description:Endless loop on ARJ files handling. Heap buffer overflow on WWPack'ed and PeSpin'ed PE files.
Affected:CLAMAV : ClamAV 0.92
CVE:CVE-2008-1387
Original documentdocumentIDEFENSE, [Full-disclosure] iDefense Security Advisory 04.14.08: ClamAV libclamav PeSpin Heap Overflow Vulnerability (16.04.2008)
 documentIDEFENSE, iDefense Security Advisory 04.14.08: ClamAV libclamav PE WWPack Heap Overflow Vulnerability (16.04.2008)
 documentHanno Bock, [Full-disclosure] clamav: Endless loop / hang with crafter arj, CVE-2008-1387 (15.04.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod