Computer Security
[EN] securityvulns.ru no-pyccku


Sendmail multipart messages DoS
Published:15.06.2006
Source:
SecurityVulns ID:6260
Type:remote
Threat Level:
6/10
Description:High recurscion level in multipart MIME messages causes stack overflow (exhaustion, not overrun).
Affected:SENDMAIL : Sendmail 8.13
Original documentdocumentSENDMAIL, Sendmail 8.13.7 (15.06.2006)

dhcdbd memory corruption
Published:15.06.2006
Source:
SecurityVulns ID:6261
Type:client
Threat Level:
5/10
Description:Invalid server response lead to memory corruption.
Affected:DHCDBD : dhcdbd 1.10
Original documentdocumentUBUNTU, [USN-299-1] dhcdbd vulnerability (15.06.2006)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:15.06.2006
Source:
SecurityVulns ID:6262
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:VBZOOM : VBZooM 1.01
 TIKIWIKI : tikiwiki 1.9
 VBZOOM : VBZooM 1.11
 PHPBANNEREXCHANG : phpBannerExchange 2.0
 BLUR6EX : blur6ex 0.3
 DELUXEBB : DeluxeBB 1.06
 CMSMUNDO : CMS Mundo 1.0
 VBZOOM : VBZooM 1.02
 35MMSLIDEGALLERY : 35mmslidegallery 6
 PHPMESSENGER : PHP MESSENGER 1.0
 SHOUTBOX : Shoutbox 1.5
 LTWCALENDAR : Ltwcalendar 4.1
 LTWCALENDAR : Jobline 1.1
 WEBCMS : Web-CMS 1.0
 PHPASKIT : PHPAskIt 2.0
 PHPMYFACTURES : PhpMyFactures 1.0
 MCGUESTBOOK : mcGuestbook 1.3
 CHIPMAILER : Chipmailer 1.09
 GSHOUT : G Shout 1.3
 SHOUTPRO : Shoutpro 1.0
 SIMPLESHOUT : Simpleshout 1.6
 WBB : wbb 2.2
 PHPBLUEDRAGON : Php Blue Dragon CMS 2.9
 ISPCONFIG : ISPConfig 2.2
 ANDYSCHAT : Andys Chat 4.5
CVE:CVE-2006-7015 (** DISPUTED ** PHP remote file inclusion vulnerability in admin.jobline.php in Jobline 1.1.1 allows remote attackers to execute arbitrary code via a URL in the mosConfig_absolute_path parameter. NOTE: CVE disputes this issue because the script is protected against direct requests.)
 CVE-2006-7003 (PHP remote file inclusion vulnerability in admin/index.php in Fusion Polls allows remote attackers to execute arbitrary PHP code via a URL in the xtrphome parameter.)
Original documentdocumentSpC-x, Andys Chat 4.5 (action) Remote File Inclusion (15.06.2006)
 documentRedTeam Pentesting, [Full-disclosure] Advisory: Authentication bypass in phpBannerExchange (15.06.2006)
 documentRedTeam Pentesting, [Full-disclosure] Advisory: Unauthorized password recovery in phpBannerExchange (15.06.2006)
 documentSECUNIA, Secunia Research: DeluxeBB SQL Injection and File Inclusion Vulnerabilities (15.06.2006)
 documentSECUNIA, Secunia Research: CMS Mundo SQL Injection and File Upload Vulnerabilities (15.06.2006)
 documentFederico Fazzi, [FSA016] ISPConfig 2.2.3, File inclusion vulnerability (15.06.2006)
 documentFederico Fazzi, PhpBlueDragon CMS 2.9.1, File inclusion vulnerability (15.06.2006)
 documentSpC-x, Fusion Polls (xtrphome) Remote File Inclusion (15.06.2006)
 documentSpC-x, Flipper Poll (root_path) Remote File Inclusion (15.06.2006)
 documentCrAzY.CrAcKeR_(at)_hotmail.com, wbb<<--v 2.1.6 "profile.php" SQL injection (15.06.2006)
 documentCrAzY.CrAcKeR_(at)_hotmail.com, wbb<<--v 2.2.1 "studienplatztausch.php" SQL injection (15.06.2006)
 documentCrAzY.CrAcKeR_(at)_hotmail.com, wbb<<--v 2.2.2 "thread.php" SQL injection (15.06.2006)
 documentSpC-x, bbrss PhpBB (phpbb_root_path) Remote File Inclusion (15.06.2006)
 documentalp_eren_(at)_ayyildiz.org, Freeze Greetings Cards PWD.txt (15.06.2006)
 documentSpC-x, Simpleshout 1.6.0 Version - Remote File Include Vulnerability (15.06.2006)
 documentSpC-x, Shoutpro 1.0 Version - Remote File Include Vulnerability (15.06.2006)
 documentSpC-x, G Shout 1.3.1 Version - Remote File Include Vulnerability (15.06.2006)
 documentAesthetico, [MajorSecurity #17] SixCMS <= 6 - Multiple XSS and directory traversal vulnerabilities (15.06.2006)
 documenttamriel_(at)_gmx.net, Chipmailer <= 1.09 Multiple Vulnerabilities (15.06.2006)
 documentgamr-14_(at)_hotmail.com, file include exploits in mcGuestbook 1.3 (15.06.2006)
 documentCrAzY.CrAcKeR_(at)_hotmail.com, VBZooM <<-- V1.11 "show.php" SQL injection (15.06.2006)
 documentgmdarkfig_(at)_gmail.com, PhpMyFactures 1.0 Cross Site Scripting, SQL Injection, Full Path Disclosure and others (15.06.2006)
 documentbug_(at)_securitynews.ir, TikiWiki Sql injection & XSS Vulnerabilities (15.06.2006)
 documenterne_(at)_ernealizm.com, # MHG Security Team --- PHPAskIt v2.0.1 Remote File Inc. (15.06.2006)
 documentCrAzY.CrAcKeR_(at)_hotmail.com, Web-CMS <<--1.0 "print.php" SQL injection (15.06.2006)
 documentSpC-x, S H O U T B O X (v1.5) Version - Remote File Include Vulnerability (15.06.2006)
 documentSpC-x, Amr Talkbox talkbox.PHP - Remote File Include Vulnerabilities (15.06.2006)
 documentSpC-x, Ltwcalendar 4.1.3 version - Remote File Include Vulnerabilities (15.06.2006)
 documentSpC-x, Jobline 1 1 1 Version - Remote File Include Vulnerability (15.06.2006)
 documentSpC-x, PHP MESSENGER 1.0 Version - Remote File Include Vulnerability (15.06.2006)
 documentblack-cod3_(at)_hotmail.com, multiple Xss exploits in 35mmslidegallery V6 (15.06.2006)
 documentSpC-x, Simpnews <= All version - Remote File Include Vulnerabilities (15.06.2006)
 documentCrAzY.CrAcKeR_(at)_hotmail.com, VBZooM <<--V1.01 "language.php" SQL injection (15.06.2006)
 documentCrAzY.CrAcKeR_(at)_hotmail.com, VBZooM <<--V1.11 "subject.php" SQL injection (15.06.2006)
 documentCrAzY.CrAcKeR_(at)_hotmail.com, VBZooM <<--V1.02 "meaning.php" SQL injection (15.06.2006)
Files:Exploits blur6ex <= 0.3.462 'ID' blind SQL injection / admin credentials disclosure

Kaspersky Antivirus multiple vulnerabilities
Published:15.06.2006
Source:
SecurityVulns ID:6263
Type:local
Threat Level:
6/10
Description:Unsafe kernel mode components implementation leads to Denial of Service and potentially to privilege elevation. Most serious problem is user mode code can access kernel memory.
Affected:KASPERSKY : Kaspersky Internet Security Suite 5.0
Original documentdocumentUNINFORMED, Allowing User-mode Code to Access Kernel Memory (15.06.2006)
 documentUNINFORMED, Patching non-exported, non-system-service kernel functions (15.06.2006)
 documentUNINFORMED, Improper Validation of Kernel Object Types (15.06.2006)
 documentUNINFORMED, Hiding Threads from User-mode (15.06.2006)
 documentUNINFORMED, Improper Validation of User-mode Pointers (15.06.2006)
 documentUNINFORMED, Patching system services at runtime (15.06.2006)

PicoZip zipinfo.dll buffer overflow
Published:15.06.2006
Source:
SecurityVulns ID:6264
Type:library
Threat Level:
5/10
Description:Buffer overflow on oversized filenames in different archivers formats.
Affected:PICOZIP : PicoZip 4.01
Original documentdocumentSECUNIA, Secunia Research: PicoZip "zipinfo.dll" Multiple Archives Buffer Overflow (15.06.2006)
Files:Exploits Pico Zip v. 4.01 Long Filename Buffer Overflow

MySQL DoS
Published:15.06.2006
Source:
SecurityVulns ID:6265
Type:remote
Threat Level:
5/10
Description:"select str_to_date( 1, NULL );" request causes database server to crash.
Affected:MYSQL : MySQL 4.1
 ORACLE : MySQL 5.0
 ORACLE : MySQL 5.1
Original documentdocumentKanatoko, MySQL DoS (15.06.2006)

Sun iPlanet symbolic links problem
Published:15.06.2006
Source:
SecurityVulns ID:6266
Type:local
Threat Level:
5/10
Description:pipe_master suid root application tries to read configuration from msg.conf file with relative path without checking for symbolic links. It makes it possible to read few trings from any file with symbolic link.
Affected:SUN : iPlanet Messaging Server 5.2
Original documentdocumentphp0t, [Full-disclosure] Sun iPlanet Messaging Server 5.2 root password compromise (15.06.2006)

IBM DB2 Universal Database multiple denial of service conditions
Published:15.06.2006
Source:
SecurityVulns ID:6267
Type:remote
Threat Level:
5/10
Affected:IBM : DB2 8.2
Original documentdocumentSECUNIA, [SA20579] DB2 Universal Database Multiple Denial of Service Vulnerabilities (15.06.2006)

KDE kdm symbolic links problem
Published:15.06.2006
Source:
SecurityVulns ID:6268
Type:local
Threat Level:
6/10
Description:Suid root application tries to read configuration from ~/.dmrc file without checking for symbolic links. It makes it possible to read few trings from any file with symbolic link.
Affected:KDE : KDE 3.4
Original documentdocumentUBUNTU, [USN-301-1] kdm vulnerability (15.06.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod