Computer Security
[EN] securityvulns.ru no-pyccku


notepad++ buffer overflow
Published:15.05.2007
Source:
SecurityVulns ID:7714
Type:local
Threat Level:
4/10
Description:Buffer overflow on Ruby (.rb) files editing.
Affected:NOTEPADPLUS : notepad++ 4.1
Original documentdocumentVade 79, notepad++[v4.1]: (win32) ruby file processing buffer overflow exploit. (15.05.2007)
Files:notepad++[v4.1]: (win32) ruby file processing buffer overflow exploit

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
updated since 15.05.2007
Published:15.05.2007
Source:
SecurityVulns ID:7715
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Original documentdocumentspriteversus_(at)_hotmail.com, ImI image file inclusion in script upload (15.05.2007)
 documentexpw0rm_(at)_gmail.com, ifdate 2.* unauthorized administrative access bug (15.05.2007)

Mac OS X Safari information leak
updated since 07.05.2007
Published:15.05.2007
Source:
SecurityVulns ID:7674
Type:client
Threat Level:
5/10
Description:Saved password can be accessed from the web page via system components.
Original documentdocumentpoplix_(at)_papusia.org, Apple Safari on MacOSX may reveal user's saved passwords (15.05.2007)
 documentpoplix_(at)_papuasia.org, safari's saved password at risk (07.05.2007)

Samba file server multiple security vulnerabilities
updated since 15.05.2007
Published:16.05.2007
Source:
SecurityVulns ID:7713
Type:remote
Threat Level:
7/10
Description:Multiple heap based buffer overflows, invalid SID to uid translation privilege escalation, shell characters problem.
Affected:SAMBA : Samba 3.0
CVE:CVE-2007-2447 (The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.)
 CVE-2007-2446 (Multiple heap-based buffer overflows in the NDR parsing in smbd in Samba 3.0.0 through 3.0.25rc3 allow remote attackers to execute arbitrary code via crafted MS-RPC requests involving (1) DFSEnum (netdfs_io_dfs_EnumInfo_d), (2) RFNPCNEX (smb_io_notify_option_type_data), (3) LsarAddPrivilegesToAccount (lsa_io_privilege_set), (4) NetSetFileSecurity (sec_io_acl), or (5) LsarLookupSids/LsarLookupSids2 (lsa_io_trans_names).)
 CVE-2007-2444 (Logic error in the SID/Name translation functionality in smbd in Samba 3.0.23d through 3.0.25pre2 allows local users to gain temporary privileges and execute SMB/CIFS protocol operations via unspecified vectors that cause the daemon to transition to the root user.)
 CVE-2007-2444 (Logic error in the SID/Name translation functionality in smbd in Samba 3.0.23d through 3.0.25pre2 allows local users to gain temporary privileges and execute SMB/CIFS protocol operations via unspecified vectors that cause the daemon to transition to the root user.)
Original documentdocumentZDI, ZDI-07-032: Samba sec_io_acl Heap Overflow Vulnerability (16.05.2007)
 documentZDI, ZDI-07-030: Samba netdfs_io_dfs_EnumInfo_d Heap Overflow Vulnerability (16.05.2007)
 documentZDI, ZDI-07-029: Samba lsa_io_privilege_set Heap Overflow Vulnerability (16.05.2007)
 documentZDI, ZDI-07-031: Samba smb_io_notify_option_type_data Heap Overflow Vulnerability (16.05.2007)
 documentZDI, ZDI-07-033: Samba lsa_io_trans_names Heap Overflow Vulnerability (16.05.2007)
 documentIDEFENSE, iDefense Security Advisory 05.14.07: Samba SAMR Change Password Remote Command Injection Vulnerability (15.05.2007)
 documentSAMBA, [SAMBA-SECURITY] CVE-2007-2447: Remote Command Injection Vulnerability (15.05.2007)
 documentSAMBA, [SAMBA-SECURITY] CVE-2007-2444: Local SID/Name Translation Failure Can Result in User Privilege Elevation (15.05.2007)
 documentSAMBA, [SAMBA-SECURITY] CVE-2007-2446: Multiple Heap Overflows Allow Remote Code Execution (15.05.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod