Computer Security
[EN] securityvulns.ru no-pyccku


Linux kernel privilege escalation
updated since 11.11.2004
Published:18.02.2007
Source:
SecurityVulns ID:4173
Type:remote
Threat Level:
5/10
Description:Invalid exception conditions handling leads to multiple reace conditions with privileged memory access.
Affected:LINUX : kernel 2.4
 LINUX : kernel 2.6
CVE:CVE-2007-0958 (Linux kernel 2.6.x before 2.6.20 allows local users to read unreadable binaries by using the interpreter (PT_INTERP) functionality and triggering a core dump, a variant of CVE-2004-1073.)
 CVE-2004-1073 (The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.)
Original documentdocumentKatrina Tsipenyuk, Unchecked returns from kernel_read() in linux-2.6.10-rc2 kernel (18.12.2004)
 documentPaul Starzetz, Linux ELF loader vulnerabilities (11.11.2004)
Files:ChangeLog-2.6.20

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:18.02.2007
Source:
SecurityVulns ID:7255
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:PBLANG : PBLang 4.60
 DOTCLEAR : Dotclear 1.2
 MALBUM : mAlbum 0.3
 LIFETYPE : Lifetype 1.1
 APACHESTATS : Apache Stats 0.0
 DRAKECMS : Drake CMS 0.3
 TASKFREAK : TaskFreak! 0.5
 LIFETYPE : LifeType 1.2
 DROPBOX : DropBox 0.0
CVE:CVE-2007-1198 (Cross-site scripting (XSS) vulnerability in TaskFreak! before 0.5.7 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly a variant of CVE-2007-0982.)
 CVE-2007-1052 (** DISPUTED ** PHP remote file inclusion vulnerability in index.php in PBLang (PBL) 4.60 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the dbpath parameter, a different vector than CVE-2006-5062. NOTE: this issue has been disputed by a reliable third party for 4.65, stating that the dbpath variable is initialized in an included file that is created upon installation.)
 CVE-2007-1048 (PHP remote file inclusion vulnerability in admin_rebuild_search.php in phpbb_wordsearch allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.)
 CVE-2007-1045 (mAlbum 0.3 has default accunts (1) "login"/"pass" for its administrative account and (2) "dqsfg"/"sdfg", which allows remote attackers to gain privileges.)
 CVE-2007-1043 (Ezboo webstats, possibly 3.0.3, allows remote attackers to bypass authentication and gain access via a direct request to (1) update.php and (2) config.php.)
 CVE-2007-0982 (Cross-site scripting (XSS) vulnerability in error.php in TaskFreak! 0.5.5 allows remote attackers to inject arbitrary web script or HTML via the tznMessage parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.)
 CVE-2007-0979 (Unspecified vulnerability in LifeType before 1.1.6, and 1.2 before 1.2-beta2, allows remote attackers to obtain sensitive information (file contents) via a "crafted URL.")
 CVE-2007-0975 (Variable extraction vulnerability in Ian Bezanson Apache Stats before 0.0.3 beta allows attackers to overwrite critical variables, with unknown impact, when the extract function is used on the _REQUEST superglobal array.)
 CVE-2007-0974 (Multiple unspecified vulnerabilities in Ian Bezanson DropBox before 0.0.4 beta have unknown impact and attack vectors, possibly related to a variable extraction vulnerability.)
Original documentdocumentme you, PBLang 4.60 <= (index.php) Remote File Include Vulnerability (18.02.2007)
 documentsn0oPy.team_(at)_gmail.com, Ezboo webstats acces to sensitive files (18.02.2007)
 documentk4rtal_(at)_gmail.com, Drake CMS v0.3.2 < = RFi Vulnerabilities (18.02.2007)
 documentk4rtal_(at)_gmail.com, phpbb_wordsearch < = RFi Vulnerabilities (18.02.2007)
 documentk4rtal_(at)_gmail.com, DotClear v1.2.5 (18.02.2007)
 documentsn0oPy.team_(at)_gmail.com, mAlbum v0.3 admin by default user/pass (18.02.2007)

Oracle authentication downgrade
Published:18.02.2007
Source:
SecurityVulns ID:7256
Type:m-i-t-m
Threat Level:
4/10
Description:It's possible for man-in-the-middle to force client and server to use weaker authentication protocol.
Affected:ORACLE : Oracle 9i
 ORACLE : Oracle 10g
Original documentdocumentsec.list_(at)_hu.pwc.com, Downgrading the Oracle native authentication (18.02.2007)

Axigen format string vulnerability
Published:18.02.2007
Source:
SecurityVulns ID:7257
Type:remote
Threat Level:
5/10
Description:Format string vulnerability on syslog() call.
Affected:AXIGEN : Axigen 2.0
Original documentdocumentfugich, [Full-disclosure] Axigen server version: 2.0.0-beta1 (Linux/i686) - pop3 remote shell (18.02.2007)
Files:Exploits Axigen eMail Server v2.0 (beta) remote shell format string vulnerability in pop3

HP ServiceGuard for Linux unauthorized accesss
Published:18.02.2007
Source:
SecurityVulns ID:7258
Type:remote
Threat Level:
6/10
CVE:CVE-2007-0980 (Unspecified vulnerability in HP Serviceguard for Linux; packaged for SuSE SLES8 and United Linux 1.0 before SG A.11.15.07, SuSE SLES9 and SLES10 before SG A.11.16.10, and Red Hat Enterprise Linux (RHEL) before SG A.11.16.10; allows remote attackers to obtain unauthorized access via unspecified vectors.)
Original documentdocumentHP, [security bulletin] HBSBGN02189 SSRT071297 rev.1 ServiceGuard for Linux, Remote Unauthorized Access (18.02.2007)

SpamAssassin DoS
Published:18.02.2007
Source:
SecurityVulns ID:7259
Type:remote
Threat Level:
6/10
Description:Oversized URLs in messages lead to DoS conditions.
Affected:APACHE : SpamAssassin 3.1
CVE:CVE-2007-0451 (Apache SpamAssassin before 3.1.8 allows remote attackers to cause a denial of service via long URLs in malformed HTML, which triggers "massive memory usage.")

IBM AIX buffer overflow
Published:18.02.2007
Source:
SecurityVulns ID:7260
Type:local
Threat Level:
5/10
Affected:IBM : AIX 5.3
CVE:CVE-2007-0978 (Buffer overflow in swcons in IBM AIX 5.3 allows local users to gain privileges via long input data.)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod