Computer Security
[EN] securityvulns.ru no-pyccku


Linux systemd race conditions
Published:18.03.2012
Source:
SecurityVulns ID:12254
Type:local
Threat Level:
5/10
Description:Race conditions on symbolic links removal.
Affected:SYSTEMD : systemd 43
CVE:CVE-2012-1174 (The rm_rf_children function in util.c in the systemd-logind login manager in systemd before 44, when logging out, allows local users to delete arbitrary files via a symlink attack on unspecified files, related to "particular records related with user session.")
Original documentdocumentMANDRIVA, [ MDVSA-2012:030 ] systemd (18.03.2012)

VMWare View multiple security vulnerabilities
Published:18.03.2012
Source:
SecurityVulns ID:12255
Type:remote
Threat Level:
5/10
Description:Multiple XSS vulnerabilities.
Affected:VMWARE : VMware View 4.6
CVE:CVE-2012-1511 (Cross-site scripting (XSS) vulnerability in View Manager Portal in VMware View before 4.6.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.)
 CVE-2012-1510 (Buffer overflow in the WDDM display driver in VMware ESXi 4.0, 4.1, and 5.0; VMware ESX 4.0 and 4.1; and VMware View before 4.6.1 allows guest OS users to gain guest OS privileges via unspecified vectors.)
 CVE-2012-1509 (Buffer overflow in the XPDM display driver in VMware View before 4.6.1 allows guest OS users to gain guest OS privileges via unspecified vectors.)
 CVE-2012-1508 (The XPDM display driver in VMware ESXi 4.0, 4.1, and 5.0; VMware ESX 4.0 and 4.1; and VMware View before 4.6.1 allows guest OS users to gain guest OS privileges or cause a denial of service (NULL pointer dereference) via unspecified vectors.)
Original documentdocumentVMWARE, VMSA-2012-0004 VMware View privilege escalation and cross-site scripting (18.03.2012)

Asterisk security vulnerabilities
Published:18.03.2012
Source:
SecurityVulns ID:12256
Type:remote
Threat Level:
6/10
Description:Milliwatt Application buffer overflow, HTTP manager buffer overflow
Affected:DIGIUM : Asterisk 1.4
 ASTERISK : Asterisk 1.6
 ASTERISK : Asterisk 1.8
 DIGIUM : Asterisk 10.2
Original documentdocumentASTERISK, AST-2012-003: Stack Buffer Overflow in HTTP Manager (18.03.2012)
 documentASTERISK, AST-2012-002: Remote Crash Vulnerability in Milliwatt Application (18.03.2012)

Oracle Exadata Infiniband Switch security vulnerabilities
Published:18.03.2012
Source:
SecurityVulns ID:12257
Type:remote
Threat Level:
5/10
Description:Default accounts, /conf/shadow file weak permissions.
Original documentdocumentlarry0_(at)_me.com, Oracle Exadata Infiniband Switch default logins and world readable shadow file (18.03.2012)

Cisco ASA / Cisco FSM multiple security vulnerabilities
Published:18.03.2012
Source:
SecurityVulns ID:12258
Type:remote
Threat Level:
6/10
Description:Multiple DoS conditions, ActiveX code execution.
Affected:CISCO : Catalyst 6500
 CISCO : Cisco ASA 5500
CVE:CVE-2012-0358 (Buffer overflow in the Cisco Port Forwarder ActiveX control in cscopf.ocx, as distributed through the Clientless VPN feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 through 7.2 before 7.2(5.6), 8.0 before 8.0(5.26), 8.1 before 8.1(2.53), 8.2 before 8.2(5.18), 8.3 before 8.3(2.28), 8.2 before 8.4(2.16), and 8.6 before 8.6(1.1), allows remote attackers to execute arbitrary code via unspecified vectors, aka Bug ID CSCtr00165.)
 CVE-2012-0356 (Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 7.0 through 7.2 before 7.2(5.7), 8.0 before 8.0(5.27), 8.1 before 8.1(2.53), 8.2 before 8.2(5.8), 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.2) and the Firewall Services Module (FWSM) 3.1 and 3.2 before 3.2(23) and 4.0 and 4.1 before 4.1(8) in Cisco Catalyst 6500 series devices, when multicast routing is enabled, allow remote attackers to cause a denial of service (device reload) via a crafted IPv4 PIM message, aka Bug IDs CSCtr47517 and CSCtu97367.)
 CVE-2012-0355 (Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.4 before 8.4(2.11) and 8.5 before 8.5(1.4) allow remote attackers to cause a denial of service (device reload) via (1) IPv4 or (2) IPv6 packets that trigger syslog message 305006, aka Bug ID CSCts39634.)
 CVE-2012-0354 (The Threat Detection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.0 through 8.2 before 8.2(5.20), 8.3 before 8.3(2.29), 8.4 before 8.4(3), 8.5 before 8.5(1.6), and 8.6 before 8.6(1.1) allows remote attackers to cause a denial of service (device reload) via (1) IPv4 or (2) IPv6 packets that trigger a shun event, aka Bug ID CSCtw35765.)
 CVE-2012-0353 (The UDP inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.5), 8.3 before 8.3(2.22), 8.4 before 8.4(2.1), and 8.5 before 8.5(1.2) does not properly handle flows, which allows remote attackers to cause a denial of service (device reload) via a crafted series of (1) IPv4 or (2) IPv6 UDP packets, aka Bug ID CSCtq10441.)
Original documentdocumentCISCO, Cisco Security Advisory: Cisco ASA 5500 Series Adaptive Security Appliance Clientless VPN ActiveX Control Remote Code Execution Vulnerability (18.03.2012)
 documentCISCO, Cisco Security Advisory: Cisco Firewall Services Module Crafted Protocol Independent Multicast Message Denial of Service Vulnerability (18.03.2012)
 documentCISCO, Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module (18.03.2012)

Yealink VOIP Phone crossite sceripting
Published:18.03.2012
Source:
SecurityVulns ID:12260
Type:local
Threat Level:
3/10
Description:Crossite scripting in address book
CVE:CVE-2012-1417 (Multiple cross-site scripting (XSS) vulnerabilities in Local Phone book and Blacklist form in Yealink VOIP Phones allow remote authenticated users to inject arbitrary web script or HTML via the user field to cgi-bin/ConfigManApp.com.)
Original documentdocumentNarendra Shinde, Yealink VOIP Phone Persistent Cross Site Scripting Vulnerability [CVE-2012-1417] (18.03.2012)

EMC Documentum eRoom security vulnerabilities
updated since 18.03.2012
Published:20.03.2012
Source:
SecurityVulns ID:12259
Type:remote
Threat Level:
5/10
Description:replay attacks and crossite scripting.
Affected:EMC : Documentum eRoom 7.4
CVE:CVE-2012-0404 (Cross-site scripting (XSS) vulnerability in EMC Documentum eRoom before 7.4.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.)
 CVE-2012-0398 (EMC Documentum eRoom before 7.4.4 does not properly validate session cookies, which allows remote attackers to hijack or replay sessions via unspecified vectors.)
Original documentdocumentSEC Consult Vulnerability Lab, SEC Consult SA-20120315-0 :: Multiple permanent XSS vulnerabilities in EMC Documentum eRoom (20.03.2012)
 documentEMC, ESA-2012-012: EMC Documentum eRoom Multiple Vulnerabilities (18.03.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod