Computer Security
[EN] securityvulns.ru no-pyccku


ClamAV antivirus integer overflow
Published:19.12.2007
Source:
SecurityVulns ID:8467
Type:remote
Threat Level:
7/10
Description:Integer overflow leading to heap buffer overflow on MEW packer parsing.
Affected:CLAMAV : ClamAV 0.91
CVE:CVE-2007-6335 (Integer overflow in libclamav in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MEW packed PE file, which triggers a heap-based buffer overflow.)
 CVE-2007-5759 (** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6335. Reason: This candidate is a duplicate of CVE-2007-6335. Notes: All CVE users should reference CVE-2007-6335 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.)
Original documentdocumentIDEFENSE, iDefense Security Advisory 12.18.07: ClamAV libclamav MEW PE File Integer Overflow Vulnerability (19.12.2007)
Files:clamav-0.91.2 exploit ( CVE-2007-6335 )

Linux kernel hpet timers DoS
Published:19.12.2007
Source:
SecurityVulns ID:8468
Type:local
Threat Level:
5/10
Affected:LINUX : kernel 2.6
CVE:CVE-2007-5966 (Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information.)
Original documentdocument , (unnamed)(19.12.2007)

Apple Mac OS X mount_smbfs buffer overflow
Published:19.12.2007
Source:
SecurityVulns ID:8469
Type:local
Threat Level:
5/10
Description:Buffer overflow on command line -W argument parsing.
Affected:APPLE : MacOS X 10.4
CVE:CVE-2007-3876 (Stack-based buffer overflow in SMB in Apple Mac OS X 10.4.11 allows local users to execute arbitrary code via crafted command line arguments to (1) mount_smbfs and (2) smbutil.)
Original documentdocumentIDEFENSE, iDefense Security Advisory 12.17.07: Apple Mac OS X mount_smbfs Stack Based Buffer Overflow Vulnerability (19.12.2007)

Asterisk unauthorized access
Published:19.12.2007
Source:
SecurityVulns ID:8470
Type:remote
Threat Level:
6/10
Description:IP restriction is not checked for users with no password configured.
Affected:DIGIUM : Asterisk 1.4
CVE:CVE-2007-6430 (Asterisk Open Source 1.2.x before 1.2.26 and 1.4.x before 1.4.16, and Business Edition B.x.x before B.2.3.6 and C.x.x before C.1.0-beta8, when using database-based registrations ("realtime") and host-based authentication, does not check the IP address when the username is correct and there is no password, which allows remote attackers to bypass authentication using a valid username.)
Original documentdocumentASTERISK, AST-2007-027 - Database matching order permits host-based authentication to be ignored (19.12.2007)

Apache + smbfs information leak
Published:19.12.2007
Source:
SecurityVulns ID:8471
Type:remote
Threat Level:
5/10
Description:It's possible to retrieve script source.
Original documentdocumentMaciej Gąsiorowski, smbfs and apache+php source code disclosure (19.12.2007)

Cisco Firewall Services Module DoS
updated since 19.12.2007
Published:19.12.2007
Source:
SecurityVulns ID:8472
Type:remote
Threat Level:
6/10
Description:Device crash on application traffic analisys.
Affected:CISCO : FWSM 3.2
CVE:CVE-2007-5584 (Unspecified vulnerability in Cisco Firewall Services Module (FWSM) 3.2(3) allows remote attackers to cause a denial of service (device reload) via crafted "data in the control-plane path with Layer 7 Application Inspections.")
Original documentdocumentCISCO, Cisco Security Advisory: Application Inspection Vulnerability in Cisco Firewall Services Module (19.12.2007)

Google toolbar information spoofing
Published:19.12.2007
Source:
SecurityVulns ID:8473
Type:remote
Threat Level:
5/10
Description:Add button dialog spoofing.
Affected:GOOGLE : Google Toolbar 5
Original documentdocumentAviv Raff, Google Toolbar Dialog Spoofing Vulnerability (19.12.2007)

Perforce revision control system DoS
Published:19.12.2007
Source:
SecurityVulns ID:8474
Type:remote
Threat Level:
5/10
Description:HTTP request with empty boy and non-zero Content-Length causes CPU exhaustion.
Affected:PERFORCE : Perforce 2006.1
CVE:CVE-2007-6349 (P4Webs.exe in Perforce P4Web 2006.2 and earlier, when running on Windows, allows remote attackers to cause a denial of service (CPU consumption) via an HTTP request with an empty body and a Content-Length greater than 0.)
Original documentdocumentSYMANTEC, SYMSA-2007-015 (19.12.2007)

Rosoft Media Player buffer overflow
updated since 19.12.2007
Published:17.03.2009
Source:
SecurityVulns ID:8475
Type:remote
Threat Level:
6/10
Description:Stack buffer overflow on .M3U files parsing.
Affected:ROSOFT : Rosoft Media Player 4.1
Original documentdocumentsecurfrog_(at)_gmail.com, Rosoft Media Player 4.1.8 Buffer Overflow ( .M3U) (16.02.2008)
 documentdev code, [Full-disclosure] Rosoft Media Player <= 4.1.7 .M3U Stack Overflow (19.12.2007)
Files:Exploits Rosoft Media Player <= 4.1.7 .M3U Stack Overflow

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod