Computer Security
[EN] securityvulns.ru no-pyccku


Symantec Messaging Gateway backdoor
updated since 02.09.2012
Published:19.09.2012
Source:
SecurityVulns ID:12554
Type:remote
Threat Level:
6/10
Description:User 'support' with known insecure password is available by default.
Affected:SYMANTEC : Symantec Messaging Gateway 9.5
CVE:CVE-2012-3579 (Symantec Messaging Gateway (SMG) before 10.0 has a default password for an unspecified account, which makes it easier for remote attackers to obtain privileged access via an SSH session.)
Original documentdocumentNCC Group Research, NGS00267 Patch Notification: Symantec Messaging Gateway SSH with backdoor user account (19.09.2012)
 documentSEC Consult Vulnerability Lab, SEC Consult SA-20120829-0 :: Symantec Messaging Gateway - Support Backdoor (02.09.2012)

icclib / ghostscript integer overflow
Published:19.09.2012
Source:
SecurityVulns ID:12591
Type:library
Threat Level:
6/10
Description:Integer overflow on PostScript/PDF embedded images parsing.
Affected:GHOSTSCRIPT : ghostscript 9.06
CVE:CVE-2012-4405 (Multiple integer underflows in the icmLut_allocate function in International Color Consortium (ICC) Format library (icclib), as used in Ghostscript 9.06 and Argyll Color Management System, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) PostScript or (2) PDF file with embedded images, which triggers a heap-based buffer overflow. NOTE: this issue is also described as an array index error.)
Original documentdocumentMANDRIVA, [ MDVSA-2012:151 ] ghostscript (19.09.2012)

IBM SDK, Java Technology Edition multiple security vulnerabilities
Published:19.09.2012
Source:
SecurityVulns ID:12592
Type:library
Threat Level:
6/10
Description:More than 10 different vulnerabilities with sanbox bypass.
Affected:IBM : IBM SDK, Java Technology Edition 7.0
 IBM : IBM SDK, Java Technology Edition 6.0
Original documentdocumentSecurity Explorations, [SE-2012-01] Security vulnerabilities in IBM Java (19.09.2012)

gimp multiple security vulnereabilities
Published:19.09.2012
Source:
SecurityVulns ID:12593
Type:local
Threat Level:
4/10
Description:Memory corruption on FIT, GIF, KiSS images parsing.
CVE:CVE-2012-3481 (Integer overflow in the ReadImage function in plug-ins/common/file-gif-load.c in the GIF image format plug-in in GIMP 2.8.x and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted height and len properties in a GIF image file, which triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.)
 CVE-2012-3403 (Heap-based buffer overflow in the KiSS CEL file format plug-in in GIMP 2.8.x and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted KiSS palette file, which triggers an "invalid free.")
 CVE-2012-3236 (fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string.)
Original documentdocumentUBUNTU, [USN-1559-1] GIMP vulnerabilities (19.09.2012)

Apple RemoteDesktop information leakage
updated since 27.08.2012
Published:19.09.2012
Source:
SecurityVulns ID:12541
Type:m-i-t-m
Threat Level:
5/10
Description:VNC enctyprion settings are ignored.
Affected:APPLE : Apple Remote Desktop 3.0
 APPLE : Apple Remote Desktop 3.5
CVE:CVE-2012-0681 (Apple Remote Desktop before 3.6.1 does not recognize the "Encrypt all network data" setting during connections to third-party VNC servers, which allows remote attackers to obtain cleartext VNC session content by sniffing the network.)
Original documentdocumentAPPLE, APPLE-SA-2012-09-17-1 Apple Remote Desktop 3.5.3 (19.09.2012)
 documentAPPLE, APPLE-SA-2012-08-20-1 Apple Remote Desktop 3.6.1 (27.08.2012)

Microsoft Internet Explorer memory corruption
updated since 19.09.2012
Published:25.10.2012
Source:
SecurityVulns ID:12594
Type:client
Threat Level:
9/10
Description:Use-after-free vulnereability is actively used in-the-wild to install malware.
Affected:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
CVE:CVE-2012-4969 (Use-after-free vulnerability in the CMshtmlEd::Exec function in mshtml.dll in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site, as exploited in the wild in September 2012.)
 CVE-2012-2557 (Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "cloneNode Use After Free Vulnerability.")
 CVE-2012-2548 (Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Layout Use After Free Vulnerability.")
 CVE-2012-2546 (Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Event Listener Use After Free Vulnerability.")
 CVE-2012-1529 (Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "OnMove Use After Free Vulnerability.")
Original documentdocumentVUPEN Security Research, VUPEN Security Research - Microsoft Internet Explorer "scrollIntoView" Use-After-Free Vulnerability (MS12-063) (25.10.2012)
 documentVUPEN Security Research, VUPEN Security Research - Microsoft Internet Explorer "OnMove" Use-After-Free Vulnerability (MS12-063) (25.10.2012)
 documentCERT, US-CERT Alert TA12-265A - Microsoft Releases Patch for Internet Explorer Exploit (24.09.2012)
 documentCERT, US-CERT Alert TA12-262A - Microsoft Security Advisory for Internet Explorer Exploit (19.09.2012)
Files:Microsoft Security Advisory (2757760)
 Microsoft Security Bulletin MS12-063 - Critical Cumulative Security Update for Internet Explorer (2744842)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod