Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft Office multiple security vulnerabilities
updated since 11.08.2010
Published:16.08.2010
Source:
SecurityVulns ID:11055
Type:remote
Threat Level:
7/10
Description:Multiple memory corruptions on different data type parsing in Word and Excel.
Affected:MICROSOFT : Office XP
 MICROSOFT : Office 2003
 MICROSOFT : Office 2004 for Mac
 MICROSOFT : Office 2007
 MICROSOFT : Office 2008 for Mac
 MICROSOFT : Works 9
CVE:CVE-2010-2562 (Microsoft Office Excel 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly parse the Excel file format, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Excel file, aka "Excel Memory Corruption Vulnerability.")
 CVE-2010-1903 (Microsoft Office Word 2002 SP3 and 2003 SP3, and Office Word Viewer, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed record in a Word file, aka "Word HTML Linked Objects Memory Corruption Vulnerability.")
 CVE-2010-1902 (Buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2; Microsoft Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Word Viewer; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via unspecified properties in the data in a crafted RTF document, aka "Word RTF Parsing Buffer Overflow Vulnerability.")
 CVE-2010-1901 (Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2; Microsoft Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Word Viewer; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 do not properly handle unspecified properties in rich text data, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted RTF document, aka "Word RTF Parsing Engine Memory Corruption Vulnerability.")
 CVE-2010-1900 (Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2; Microsoft Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Word Viewer; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; and Works 9 do not properly handle malformed records in a Word file, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file, aka "Word Record Parsing Vulnerability.")
Original documentdocumentIDEFENSE, iDefense Security Advisory 08.10.10: Microsoft Office RTF Parsing Engine Memory Corruption Vulnerability (16.08.2010)
 documentZDI, ZDI-10-151: Microsoft Office Word 2007 plcffldMom Parsing Remote Code Execution Vulnerability (14.08.2010)
 documentZDI, ZDI-10-150: Microsoft Office Word sprmCMajority Record Parsing Remote Code Execution Vulnerability (11.08.2010)
 documentCHECKPOINT, Microsoft Office Word HTML Linked Objects Memory Corruption Vulnerability - CVE-2010-1903 (11.08.2010)
 documentIDEFENCE, iDefense Security Advisory 08.10.10: Microsoft Word RTF File Parsing Heap Buffer Overflow Vulnerability (11.08.2010)
 documentMICROSOFT, Microsoft Security Bulletin MS10-057 - Important Vulnerability in Microsoft Office Excel Could Allow Remote Code Execution (2269707) (11.08.2010)
 documentMICROSOFT, Microsoft Security Bulletin MS10-056 - Critical Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (2269638) (11.08.2010)
Files:Microsoft Security Bulletin MS10-056 - Critical Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (2269638)
 Microsoft Security Bulletin MS10-057 - Important Vulnerability in Microsoft Office Excel Could Allow Remote Code Execution (2269707)

SWFTools integer overflows
Published:16.08.2010
Source:
SecurityVulns ID:11075
Type:local
Threat Level:
5/10
Description:Integer overflows on PNG and JPEG files.
Affected:SWFTOOLS : SWFTools 0.9
CVE:CVE-2010-1516 (Multiple integer overflows in SWFTools 0.9.1 allow remote attackers to execute arbitrary code via (1) a crafted PNG file, related to the getPNG function in lib/png.c; or (2) a crafted JPEG file, related to the jpeg_load function in lib/jpeg.c.)
Original documentdocumentSECUNIA, Secunia Research: SWFTools Two Integer Overflow Vulnerabilities (16.08.2010)

Cisco IOS DoS
Published:16.08.2010
Source:
SecurityVulns ID:11076
Type:remote
Threat Level:
7/10
Description:Resources exhaustion via half open connections.
Affected:CISCO : IOS 15.1
CVE:CVE-2010-2827 (Cisco IOS 15.1(2)T allows remote attackers to cause a denial of service (resource consumption and TCP outage) via spoofed TCP packets, related to embryonic TCP connections that remain in the SYN_RCVD or SYN_SENT state, aka Bug ID CSCti18193.)
Original documentdocumentCISCO, Cisco Security Advisory: Cisco IOS Software TCP Denial of Service Vulnerability (16.08.2010)

Opera file download dialog spoofing
Published:16.08.2010
Source:
SecurityVulns ID:11077
Type:client
Threat Level:
4/10
Description:It's possible to place windows on the top of file download dialog and to close it right before user's click.
Affected:OPERA : Opera 10.60
Original documentdocumentSECUNIA, Secunia Research: Opera "Download" Dialog File Execution Security Issue (16.08.2010)

SimpleWebServer DoS
Published:16.08.2010
Source:
SecurityVulns ID:11078
Type:remote
Threat Level:
5/10
Description:Crash on HTTP headers parsing.
Affected:SWS : Simple Web Server 2.1
Original documentdocumentRodrigo Escobar, [DCA-0003] Simple Web Server DoS (16.08.2010)
Files:Simple Web Server From header DoS

D-Link WBR-2310 wireless router DoS
Published:16.08.2010
Source:
SecurityVulns ID:11079
Type:remote
Threat Level:
5/10
Description:Crash on oversized HTTP request.
Affected:DLINK : D-Link WBR-2310
Original documentdocumentRodrigo Escobar, [DCA-00014] Dlink WBR-2310 Wireless Router DoS (16.08.2010)
Files:Dlink WBR-2310 Wireless Router DoS exploit

HP OpenView Network Node Manager code execution
Published:16.08.2010
Source:
SecurityVulns ID:11080
Type:remote
Threat Level:
5/10
Affected:HP : OpenView Network Node Manager 7.51
 HP : OpenView Network Node Manager 7.53
CVE:CVE-2010-2709 (Stack-based buffer overflow in webappmon.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a long OvJavaLocale value in a cookie.)
Original documentdocumentHP, [security bulletin] HPSBMA02563 SSRT100165 rev.1 - HP OpenView Network Node Manager (OV NNM), Remote Execution of Arbitrary Code (16.08.2010)

EMC Celerra Network Attached Storage appliance unauthorized access
updated since 16.08.2010
Published:09.09.2010
Source:
SecurityVulns ID:11081
Type:remote
Threat Level:
6/10
Description:Full NFS access from predefined list of IP addresses is enabled by default.
CVE:CVE-2010-2860 (The EMC Celerra Network Attached Storage (NAS) appliance accepts external network traffic to IP addresses intended for an intranet network within the appliance, which allows remote attackers to read, create, or modify arbitrary files in the user data directory via NFS requests.)
Original documentdocumentEMC, ESA-2010-015: EMC Celerra NFS authentication bypass vulnerability using IP spoofing. (09.09.2010)
 documentTrustwave Advisories, TWSL2010-003: Unauthorized access to root NFS export on EMC Celerra NAS appliance (16.08.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod