Computer Security
[EN] securityvulns.ru no-pyccku


HP Easy Printer Care Software ActiveX unauthorized access
updated since 12.08.2011
Published:16.01.2012
Source:
SecurityVulns ID:11854
Type:client
Threat Level:
6/10
Description:Files write access is possible.
CVE:CVE-2011-4787 (A certain ActiveX control in HPTicketMgr.dll in HP Easy Printer Care Software 2.5 and earlier allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via unspecified vectors, a different vulnerability than CVE-2011-2404 and CVE-2011-4786.)
 CVE-2011-4786 (A certain ActiveX control in HPTicketMgr.dll in HP Easy Printer Care Software 2.5 and earlier allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via unspecified vectors, a different vulnerability than CVE-2011-2404 and CVE-2011-4787.)
 CVE-2011-2404 (The HPTicketMgr.dll ActiveX control in HP Easy Printer Care Software 2.5 and earlier allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via unspecified vectors.)
Original documentdocumentZDI, ZDI-12-013 : HP Easy Printer Care XMLCacheMgr Class ActiveX Control Remote Code Execution Vulnerability (16.01.2012)
 documentZDI, ZDI-12-014 : HP Easy Printer Care XMLSimpleAccessor Class ActiveX Control Remote Code Execution Vulnerability (16.01.2012)
 documentZDI, ZDI-11-261: HP Easy Printer Care XMLSimpleAccessor Class ActiveX Control Remote Code Execution Vulnerability (17.08.2011)
 documentHP, [security bulletin] HPSBPI02698 SSRT100404 rev.1 - HP Easy Printer Care Software Running on Windows, Remote Execution of Arbitrary Code (12.08.2011)

McAfee SaaS ActiveX code execution
Published:16.01.2012
Source:
SecurityVulns ID:12145
Type:client
Threat Level:
5/10
Description:MyCioScan.Scan.ShowReport() method code execution.
Original documentdocumentZDI, ZDI-12-012 : (0Day) McAfee SaaS myCIOScn.dll ShowReport Method Remote Command Execution (16.01.2012)

t1lib / xpdf library multiple security vulnerabilities
updated since 29.03.2011
Published:16.01.2012
Source:
SecurityVulns ID:11541
Type:remote
Threat Level:
5/10
Description:Multiple memory corruptions.
Affected:T1LIB : t1lib 5.1
 XPDF : xpdf 3.02
CVE:CVE-2011-1554 (Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764.)
 CVE-2011-1553 (Use-after-free vulnerability in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764.)
 CVE-2011-1552 (t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764.)
 CVE-2011-0764 (t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a crafted Type 1 font in a PDF document, as demonstrated by testz.2184122398.pdf.)
 CVE-2011-0433 (Heap-based buffer overflow in the linetoken function in afmparse.c in t1lib, as used in teTeX 3.0.x, GNOME evince, and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a DVI file containing a crafted Adobe Font Metrics (AFM) file, a different vulnerability than CVE-2010-2642.)
Original documentdocumentAdvisories Toucan-System, TSSA-2011-01 xpdf : multiple vulnerabilities allow remote code execution (29.03.2011)

MailEnable crossite scripting
Published:16.01.2012
Source:
SecurityVulns ID:12142
Type:remote
Threat Level:
5/10
Description:Crossite scripting in ForgottonPassword.aspx
Affected:MAILENABLE : MailEnable 6.02
 MAILENABLE : MailEnable 5.52
CVE:CVE-2012-0389 (Cross-site scripting (XSS) vulnerability in ForgottenPassword.aspx in MailEnable Professional, Enterprise, and Premium 4.26 and earlier, 5.x before 5.53, and 6.x before 6.03 allows remote attackers to inject arbitrary web script or HTML via the Username parameter.)
Original documentdocumenthenri_(at)_nerv.fi, ME020567: MailEnable webmail cross-site scripting vulnerability CVE-2012-0389 (16.01.2012)

HP StorageWorks P2000 security vulnerabilities
updated since 16.01.2012
Published:21.01.2012
Source:
SecurityVulns ID:12144
Type:remote
Threat Level:
5/10
Description:Default account, directory traversal.
Affected:HP : StorageWorks P2000
CVE:CVE-2011-4788 (Absolute path traversal vulnerability in the web interface on HP StorageWorks P2000 G3 MSA array systems allows remote attackers to read arbitrary files via a pathname in the URI.)
Original documentdocumentHP, [security bulletin] HPSBST02735 SSRT100516 rev.1 - HP StorageWorks Modular Smart Array P2000 G3, Remote Execution of Arbitrary Code (21.01.2012)
 documentZDI, ZDI-12-015 : (0Day) HP StorageWorks P2000 G3 Directory Traversal and Default Account Vulnerabilities (16.01.2012)

HP Diagnostics Server buffer overflow
updated since 16.01.2012
Published:03.06.2012
Source:
SecurityVulns ID:12143
Type:remote
Threat Level:
5/10
Description:Buffer overflow on TCP/23472 request parsing
Affected:HP : LoadRunner 11.00
CVE:CVE-2011-4789 (Stack-based buffer overflow in magentservice.exe in the server in HP Diagnostics allows remote attackers to execute arbitrary code via a crafted size value in a packet.)
Original documentdocumentHP, [security bulletin] HPSBMU02785 SSRT100526 rev.1 - HP LoadRunner Running on Windows, Remote Execution of Arbitrary Code (03.06.2012)
 documentZDI, ZDI-12-016 : (0Day) HP Diagnostics Server magentservice.exe Remote Code Execution Vulnerability (16.01.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod