Computer Security
[EN] securityvulns.ru no-pyccku


BigPond 3G21WB security vulnerabilities
Published:15.10.2012
Source:
SecurityVulns ID:12641
Type:remote
Threat Level:
5/10
Description:Hard coded credentials, commands injection.
Affected:BIGPOND : BigPond 3G21WB
Original documentdocumentRoberto Paleari, Hard-coded credentials and command-injection vulnerabilities on BigPond 3G21WB (15.10.2012)

Ruby restrictions bypass
Published:15.10.2012
Source:
SecurityVulns ID:12642
Type:library
Threat Level:
5/10
Description:Untainted strings modification is possible.
Affected:RUBY : ruby 1.8
CVE:CVE-2012-4481 (The safe-level feature in Ruby 1.8.7 allows context-dependent attackers to modify strings via the NameError#to_s method when operating on Ruby objects. NOTE: this issue is due to an incomplete fix for CVE-2011-1005.)
 CVE-2012-4466 (Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.)
Original documentdocumentUBUNTU, [USN-1603-1] Ruby vulnerabilities (15.10.2012)

VMWare applications security vulnerabilities
Published:15.10.2012
Source:
SecurityVulns ID:12643
Type:remote
Threat Level:
5/10
Description:VMware Movie Decoder code execution, vCenter Operations crossite scripting, vCenter CapacityIQ directory travesal.
Affected:VMWARE : CapacityIQ 1.5
CVE:CVE-2012-5051 (Directory traversal vulnerability in VMware CapacityIQ 1.5.x allows remote attackers to read arbitrary files via unspecified vectors.)
 CVE-2012-5050 (Cross-site scripting (XSS) vulnerability in the server in VMware vCenter Operations (aka vCOps) before 5.0.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.)
 CVE-2012-4897 (Untrusted search path vulnerability in the installer in VMware Movie Decoder before 9.0 allows local users to gain privileges via a Trojan horse executable file in the installer directory.)
Original documentdocumentVMWARE, VMSA-2012-0014 VMware vCenter Operations, CapacityIQ, and Movie Decoder security updates (15.10.2012)

EMC NetWorker Module for Microsoft Applications security vulnerabilities
Published:15.10.2012
Source:
SecurityVulns ID:12644
Type:remote
Threat Level:
6/10
Description:Code execution, information leakage.
Affected:EMC : EMC NetWorker Module for Microsoft Applications 2.3
 EMC : EMC NetWorker Module for Microsoft Applications 2.2
 EMC : EMC NetWorker Module for Microsoft Applications 2.4
CVE:CVE-2012-2290 (The client in EMC NetWorker Module for Microsoft Applications (NMM) 2.2.1, 2.3 before build 122, and 2.4 before build 375 allows remote attackers to execute arbitrary code by sending a crafted message over a TCP communication channel.)
 CVE-2012-2284 (The (1) install and (2) upgrade processes in EMC NetWorker Module for Microsoft Applications (NMM) 2.2.1, 2.3 before build 122, and 2.4 before build 375, when Exchange Server is used, allow local users to read cleartext administrator credentials via unspecified vectors.)
Original documentdocumentEMC, ESA-2012-025: EMC NetWorker Module for Microsoft Applications (NMM) Multiple Vulnerabilities (15.10.2012)

Cisco ASA / FWSM multiple security vulnerabilities
Published:15.10.2012
Source:
SecurityVulns ID:12645
Type:remote
Threat Level:
6/10
Description:Buffer overflow, multiple DoS conditions.
Affected:CISCO : Catalyst 6500
 CISCO : Cisco 7600
 CISCO : Cisco ASA 5500
CVE:CVE-2012-4663 (The DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.13) and the Firewall Services Module (FWSM) 4.1 before 4.1(7) in Cisco Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via a crafted DCERPC packet, aka Bug IDs CSCtr21346 and CSCtr27521.)
 CVE-2012-4662 (The DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.13) and the Firewall Services Module (FWSM) 4.1 before 4.1(7) in Cisco Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via a crafted DCERPC packet, aka Bug IDs CSCtr21376 and CSCtr27524.)
 CVE-2012-4661 (Stack-based buffer overflow in the DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 before 8.3(2.34), 8.4 before 8.4(4.4), 8.5 before 8.5(1.13), and 8.6 before 8.6(1.3) and the Firewall Services Module (FWSM) 4.1 before 4.1(9) in Cisco Catalyst 6500 series switches and 7600 series routers might allow remote attackers to execute arbitrary code via a crafted DCERPC packet, aka Bug IDs CSCtr21359 and CSCtr27522.)
Files:Multiple Vulnerabilities in Cisco Firewall Services Module
 Multiple Vulnerabilities in Cisco Firewall Services Module

Cisco WebEx multiple security vulnerabilities
Published:15.10.2012
Source:
SecurityVulns ID:12646
Type:client
Threat Level:
6/10
Description:Multiple memory corruptions and buffer overflows.
Affected:CISCO : WebEx Business Suite 27
 CISCO : WebEx Business Suite 28
CVE:CVE-2012-3941 (Heap-based buffer overflow in the Cisco WebEx Recording Format (WRF) player T27 before LD SP32 EP10 and T28 before T28.4 allows remote attackers to execute arbitrary code via a crafted WRF file, aka Bug ID CSCtz72850.)
 CVE-2012-3940 (Buffer overflow in the Cisco WebEx Recording Format (WRF) player T27 before LD SP32 EP10 and T28 before T28.4 allows remote attackers to execute arbitrary code via a crafted WRF file, aka Bug ID CSCtz72958.)
 CVE-2012-3939 (Buffer overflow in the Cisco WebEx Recording Format (WRF) player T27 before LD SP32 EP10 and T28 before T28.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted WRF file, aka Bug ID CSCua61331.)
 CVE-2012-3938 (Buffer overflow in the Cisco WebEx Recording Format (WRF) player T27 before LD SP32 EP10 and T28 before T28.4 allows remote attackers to execute arbitrary code via a crafted WRF file, aka Bug ID CSCtz73583.)
 CVE-2012-3937 (Buffer overflow in the Cisco WebEx Recording Format (WRF) player T27 before LD SP32 EP10 and T28 before T28.4 allows remote attackers to execute arbitrary code via a crafted WRF file, aka Bug ID CSCtz72967.)
 CVE-2012-3936 (Buffer overflow in the Cisco WebEx Recording Format (WRF) player T27 before LD SP32 EP10 and T28 before T28.4 allows remote attackers to execute arbitrary code via a crafted WRF file, aka Bug ID CSCua40962.)
Files:Multiple Vulnerabilities in the Cisco WebEx Recording Format Player

Microsoft Excel code execution
Published:15.10.2012
Source:
SecurityVulns ID:12647
Type:client
Threat Level:
7/10
Description:Code execution on .xls files parsing.
Affected:MICROSOFT : Excel 2007
Original documentdocumentpereira_(at)_secbiz.de, Microsoft Office Excel ReadAV Arbitrary Code Execution (15.10.2012)
Files:Microsoft Office Excel ReadAV Arbitrary Code Execution exploit

VLC code execution
Published:15.10.2012
Source:
SecurityVulns ID:12648
Type:local
Threat Level:
5/10
Description:Code execution on PNG files parsing.
Affected:VIDEOLAN : VLC Player 2.0
Original documentdocumentpereira_(at)_secbiz.de, VLC Player 2.0.3 <= ReadAV Arbitrary Code Execution (Update) (15.10.2012)
Files:VLC Player 2.0.3 <= ReadAV Arbitrary Code Execution exploit

Apache Cloudstack default account
Published:15.10.2012
Source:
SecurityVulns ID:12649
Type:remote
Threat Level:
5/10
Description:Default account with known password.
CVE:CVE-2012-4501 (Citrix Cloud.com CloudStack, and Apache CloudStack pre-release, allows remote attackers to make arbitrary API calls by leveraging the system user account, as demonstrated by API calls to delete VMs.)
Original documentdocumentJohn Kinsella, [CVE-2012-4501] CloudStack configuration vulnerability (15.10.2012)

utempter information spoofing
Published:15.10.2012
Source:
SecurityVulns ID:12650
Type:local
Threat Level:
5/10
Description:User supplied data is not checked before writing to utmp.
Original documentdocumentPaul Szabo, utempter allows fake host setting (15.10.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod