Computer Security
[EN] securityvulns.ru no-pyccku


Multiple TCP implementations different security vulnerabilities
updated since 09.09.2009
Published:18.11.2009
Source:
SecurityVulns ID:10211
Type:remote
Threat Level:
9/10
Description:Multiple security vulnerabilities in different operation sustems caused by resource exhaustions on maintaining TCP states table.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 CISCO : IOS 12.0
 CISCO : IOS 12.1
 CISCO : IOS 12.2
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 CISCO : IOS 12.3
 CISCO : IOS 12.4
 CISCO : PIX 7.0
 CISCO : PIX 7.1
 MICROSOFT : Windows Vista
 CISCO : PIX 7.2
 CISCO : CatOS 7.6
 MICROSOFT : Windows 2008 Server
 CISCO : PIX 8.0
 CISCO : PIX 8.1
 CISCO : IOS XE 2.1
 CISCO : IOS XE 2.2
 CISCO : CatOS 8.7
 CISCO : Cisco Nexus 5000
 CISCO : Cisco Nexus 7000
CVE:CVE-2009-1926 (Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote attackers to cause a denial of service (TCP outage) via a series of TCP sessions that have pending data and a (1) small or (2) zero receive window size, and remain in the FIN-WAIT-1 or FIN-WAIT-2 state indefinitely, aka "TCP/IP Orphaned Connections Vulnerability.")
 CVE-2009-1925 (The TCP/IP implementation in Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2 does not properly manage state information, which allows remote attackers to execute arbitrary code by sending packets to a listening service, and thereby triggering misinterpretation of an unspecified field as a function pointer, aka "TCP/IP Timestamps Code Execution Vulnerability.")
 CVE-2008-4609 (The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.)
Original documentdocumentHP, [security bulletin] HPSBMI02473 SSRT080138 rev.1 - Cisco Catalyst Blade Switch 3020/3120, Remote Denial of Service (DoS) (18.11.2009)
 documentFabian Yamaguchi, TCP/IP Orphaned Connections Vulnerability (09.09.2009)
 documentCISCO, Cisco Security Advisory: TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products (09.09.2009)
 documentMICROSOFT, Microsoft Security Bulletin MS09-048 - Critical Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (967723) (09.09.2009)
Files:Microsoft Security Bulletin MS09-048 - Critical: Vulnerabilities in Windows TCP/IP could allow remote code execution

HP Discovery & Dependency Mapping Inventory code execution
Published:18.11.2009
Source:
SecurityVulns ID:10411
Type:remote
Threat Level:
5/10
Affected:HP : HP Discovery & Dependency Mapping Inventory 7.60
CVE:CVE-2009-3841 (Unspecified vulnerability in HP Discovery & Dependency Mapping Inventory (DDMI) 2.5x, 7.5x, and 7.60 on Windows allows remote authenticated users to execute arbitrary code via unknown vectors.)
Original documentdocumentHP, [security bulletin] HPSBMA02456 SSRT090188 rev.1 - HP Discovery & Dependency Mapping Inventory (DDMI) Running on Windows, Remote Execution of Arbitrary Code (18.11.2009)

Rhinosoft Serv-U buffer overflow
Published:18.11.2009
Source:
SecurityVulns ID:10409
Type:remote
Threat Level:
6/10
Description:Buffer overflow in TEA (Tiny Encryption Algorithm) implementation.
Affected:RHINOSOFT : Serv-U 9.0
Original documentdocumentSECUNIA, Secunia Research: RhinoSoft Serv-U TEA Decoding Buffer Overflow (18.11.2009)

Novell eDirectory buffer overflow
updated since 26.10.2009
Published:18.11.2009
Source:
SecurityVulns ID:10348
Type:remote
Threat Level:
6/10
Description:Buffer overflow in /dhost/modules?L:
Affected:NOVELL : eDirectory 8.8
Original documentdocumentkarakorsankara_(at)_hotmail.com, Hellcode Research: Novell eDirectory HTTPSTK Login Stack Overflow Vulnerability (18.11.2009)
 documentadvisory_(at)_hackattack.com, Novell eDirectory 8.8 SP5 Denial of Service (13.11.2009)
 documentkarakorsankara_(at)_hotmail.com, Novell eDirectory 8.8 SP5 for Windows - Buffer Overflow Vulnerability (26.10.2009)

IBM SolidDB / HP OpenView NNM DoS
updated since 18.11.2009
Published:19.11.2009
Source:
SecurityVulns ID:10410
Type:remote
Threat Level:
5/10
Description:DoS against TCP/2315 (TCP/2690 for HP OV NNM) database engine.
Affected:HP : OpenView Network Node Manager 7.53
 IBM : SolidDB Server 6.30
CVE:CVE-2009-3840 (The embedded database engine service (aka ovdbrun.exe) in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to cause a denial of service (daemon crash) via an invalid Error Code field in a packet.)
Original documentdocumentHP, [security bulletin] HPSBMA02477 SSRT090177 rev.2 - HP OpenView Network Node Manager (OV NNM), Remote Denial of Service (DoS) (19.11.2009)
 documentCORE SECURITY TECHNOLOGIES ADVISORIES, CORE-2009-0814: HP Openview NNM 7.53 Invalid DB Error Code vulnerability (18.11.2009)
 documentCORE SECURITY TECHNOLOGIES ADVISORIES, CORE-2009-1027: IBM SolidDB invalid error code vulnerability (18.11.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod