Computer Security
[EN] securityvulns.ru no-pyccku


IBM DB2 database multiple security vulnerabilities
Published:18.08.2007
Source:
SecurityVulns ID:8068
Type:remote
Threat Level:
6/10
Description:Directory traversal, buffer overflow, shared libraries loaded from insecure locations, files and directories manipulation.
Affected:IBM : DB2 9.1
CVE:CVE-2007-4276 (Stack-based buffer overflow in IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 allows attackers to execute arbitrary code via a long DASPROF and possibly other environment variables, which are copied into the buildDasPaths buffer.)
 CVE-2007-4275 (Multiple untrusted search path vulnerabilities in IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 allow local users to gain privileges via certain vectors related to (1) DB2 instance or FMP startup on Linux and Solaris; (2) exec of executables while running as root on non-Windows systems, as demonstrated by AIX; and unspecified vectors involving (3) db2licm and (4) db2pd.)
 CVE-2007-4273 (IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 allows local users to create arbitrary directories and execute arbitrary code via a "crafted localized message file" that enables a format string attack, possibly involving the (1) OSSEMEMDBG or (2) TRC_LOG_FILE environment variable in db2licd (db2licm).)
 CVE-2007-4272 (Multiple vulnerabilities in IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 allow local users to create arbitrary files via (1) unspecified vectors where an attacker's umask is honored, (2) /etc/ld.so.preload, (3) certain "cron data file locations", and other unspecified vectors possibly involving the (4) OSSEMEMDBG or (5) TRC_LOG_FILE environment variable in db2licd (db2licm).)
 CVE-2007-4271 (Directory traversal vulnerability in IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 allows local users to create arbitrary files via a .. (dot dot) in an unspecified environment variable, which is appended to "/tmp/" and used as a log file. NOTE: this issue might be related to symlink following.)
 CVE-2007-4270 (Multiple race conditions in IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 allow local users to gain root privileges via a symlink attack on certain files.)
Original documentdocumentIDEFENSE, iDefense Security Advisory 08.16.07: IBM DB2 Universal Database Directory Creation Vulnerability (18.08.2007)
 documentIDEFENSE, iDefense Security Advisory 08.16.07: IBM DB2 Universal Database Multiple Race Condition Vulnerabilities (18.08.2007)
 documentIDEFENSE, iDefense Security Advisory 08.16.07: IBM DB2 Universal Database Multiple File Creation Vulnerabilities (18.08.2007)
 documentIDEFENSE, iDefense Security Advisory 08.16.07: IBM DB2 Universal Database Multiple Untrusted Search Path Vulnerabilities (18.08.2007)
 documentIDEFENSE, iDefense Security Advisory 08.16.07: IBM DB2 Universal Database buildDasPaths Buffer Overflow Vulnerability (18.08.2007)
 documentIDEFENSE, iDefense Security Advisory 08.16.07: IBM DB2 Universal Database Directory Traversal Vulnerability (18.08.2007)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:18.08.2007
Source:
SecurityVulns ID:8069
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:VBULLETIN : vBulletin 3.6
 WORDPRESS : Sirius 1.0
CVE:CVE-2007-4480 (Cross-site scripting (XSS) vulnerability in index.php in the Sirius 1.0 theme for WordPress allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO (PHP_SELF).)
Original documentdocumentimei, Olate Download 3.4.1~environment.php.php~Code Execution (18.08.2007)
 documentRaeD Hasadya, vBulletin V3.6.8 XSS Password Md5 Hash (18.08.2007)
 documentMustLive, Vulnerability in theme Sirius 1.0 for WordPress (18.08.2007)

Diskeeper information leak
Published:18.08.2007
Source:
SecurityVulns ID:8070
Type:remote
Threat Level:
5/10
Description:Anonymously accessible RPC functions allows to read higher addresses of processes address space.
Affected:EXECUTIVESOFTWAR : Diskeeper 9
Original documentdocumentauto48696_(at)_hushmail.com, Remote Memory Read in Diskeeper 9 - 2007 (18.08.2007)
Files:Exploits Diskeeper Remote Memory Read

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod