Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft Internet Explorer memory corruption
Published:18.12.2008
Source:
SecurityVulns ID:9526
Type:client
Threat Level:
10/10
Description:Memory corruption leads to code execution. Vulnerability is used in-the-wild for hidden malware installation.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
CVE:CVE-2008-4844 (Use-after-free vulnerability in mshtml.dll in Microsoft Internet Explorer 5.01, 6, and 7 on Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to execute arbitrary code via a crafted XML document containing nested SPAN elements, as exploited in the wild in December 2008.)
Original documentdocumentCERT, US-CERT Technical Cyber Security Alert TA08-352A -- Microsoft Internet Explorer Data Binding Vulnerability (18.12.2008)
 documentMICROSOFT, Microsoft Security Bulletin MS08-078 - Critical Security Update for Internet Explorer (960714) (18.12.2008)
Files:Microsoft Security Bulletin MS08-078 - Critical Security Update for Internet Explorer (960714)

Mozilla Firefox / Thunderbird / Seamonkey multiple seucrity vulnerabilities
updated since 18.12.2008
Published:19.12.2008
Source:
SecurityVulns ID:9527
Type:remote
Threat Level:
8/10
Description:Crossite scripting, crossite data access, memory corruptions, code execution, filtering bypass, user session tracking.
Affected:MOZILLA : Firefox 2.0
 MOZILLA : Thunderbird 2.0
 MOZILLA : SeaMonkey 1.1
 MOZILLA : Firefox 3.0
CVE:CVE-2008-5513 (Unspecified vulnerability in the session-restore feature in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19 allows remote attackers to bypass the same origin policy, inject content into documents associated with other domains, and conduct cross-site scripting (XSS) attacks via unknown vectors related to restoration of SessionStore data.)
 CVE-2008-5512 (Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allow remote attackers to run arbitrary JavaScript with chrome privileges via unknown vectors in which "page content can pollute XPCNativeWrappers.")
 CVE-2008-5511 (Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy and conduct cross-site scripting (XSS) attacks via an XBL binding to an "unloaded document.")
 CVE-2008-5510 (The CSS parser in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 ignores the '\0' escaped null character, which might allow remote attackers to bypass protection mechanisms such as sanitization routines.)
 CVE-2008-5508 (Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not properly parse URLs with leading whitespace or control characters, which might allow remote attackers to misrepresent URLs and simplify phishing attacks.)
 CVE-2008-5507 (Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy and access portions of data from another domain via a JavaScript URL that redirects to the target resource, which generates an error if the target data does not have JavaScript syntax, which can be accessed using the window.onerror DOM API.)
 CVE-2008-5506 (Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy by causing the browser to issue an XMLHttpRequest to an attacker-controlled resource that uses a 302 redirect to a resource in a different domain, then reading content from the response, aka "response disclosure.")
 CVE-2008-5505 (Mozilla Firefox 3.x before 3.0.5 allows remote attackers to bypass intended privacy restrictions by using the persist attribute in an XUL element to create and access data entities that are similar to cookies.)
 CVE-2008-5504 (Mozilla Firefox 2.x before 2.0.0.19 allows remote attackers to run arbitrary JavaScript with chrome privileges via vectors related to the feed preview, a different vulnerability than CVE-2008-3836.)
 CVE-2008-5503 (The loadBindingDocument function in Mozilla Firefox 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not perform any security checks related to the same-domain policy, which allows remote attackers to read or access data from other domains via crafted XBL bindings.)
 CVE-2008-5501 (The layout engine in Mozilla Firefox 3.x before 3.0.5, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service via vectors that trigger an assertion failure.)
 CVE-2008-5500 (The layout engine in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to (1) a reahable assertion or (2) an integer overflow.)
Original documentdocumentChris Evans, Firefox cross-domain text theft (CESA-2008-011) (19.12.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-60 (18.12.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-61 (18.12.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-62 (18.12.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-63 (18.12.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-64 (18.12.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-65 (18.12.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-66 (18.12.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-67 (18.12.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-68 (18.12.2008)
 documentMOZILLA, Mozilla Foundation Security Advisory 2008-69 (18.12.2008)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
updated since 18.12.2008
Published:19.12.2008
Source:
SecurityVulns ID:9528
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc. Phpclanwebsite: multiple directory traversals, multiple SQL injections, multiple crossite scriptings,
Affected:JOOMLA : Joomla 1.5
 PHPCLANWEBSITE : Phpclanwebsite 2.12
 LITTLECMS : LittleCMS 1.16
CVE:CVE-2008-5317 (Integer signedness error in the cmsAllocGamma function in src/cmsgamma.c in Little cms color engine (aka lcms) before 1.17 allows attackers to have an unknown impact via a file containing a certain "number of entries" value, which is interpreted improperly, leading to an allocation of insufficient memory.)
 CVE-2008-4122 (Joomla! 1.5.8 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.)
Original documentdocumentEhsan_Hp200_(at)_hotmail.com, EasySiteNetwork (joke.php?id) Remote SQL injection Vulnerability (18.12.2008)
 documentUBUNTU, [USN-693-1] LittleCMS vulnerability (18.12.2008)
 documentHanno Bock, Joomla: Session hijacking vulnerability, CVE-2008-4122 (18.12.2008)
 documentS4aVRd0w, Многочисленные уязвимости в Phpclanwebsite <= 1.23.3 Fix Pack #5 (18.12.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod