Computer Security
[EN] securityvulns.ru no-pyccku


Wireshark buffer overflow
updated since 11.01.2011
Published:20.01.2011
Source:
SecurityVulns ID:11346
Type:remote
Threat Level:
5/10
Description:Buffer overflow on ENTTEC DMX RLE decompression and MAC-LTE parsing.
Affected:WIRESHARK : Wireshark 1.2
CVE:CVE-2011-0444 (Buffer overflow in the MAC-LTE dissector (epan/dissectors/packet-mac-lte.c) in Wireshark 1.2.0 through 1.2.13 and 1.4.0 through 1.4.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of RARs.)
 CVE-2010-4538 (Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression.)
Original documentdocumentMANDRIVA, [ MDVSA-2011:007 ] wireshark (20.01.2011)
 documentMANDRIVA, [ MDVSA-2011:002 ] wireshark (11.01.2011)

Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:20.01.2011
Source:
SecurityVulns ID:11366
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:SUBVERSION : Subversion 1.6
 PIXIE : Pixie 1.04
 DOTNETNUKE : DotNetNuke 05.06
 SIMPLOO : Simploo CMS 1.7
CVE:CVE-2010-4644 (Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command.)
 CVE-2010-4539 (The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.)
Original documentdocumentMANDRIVA, [ MDVSA-2011:006 ] subversion (20.01.2011)
 documentdavid.kurz_(at)_majorsecurity.net, Simploo CMS Community Edition - Remote PHP Code Execution Issue (20.01.2011)
 documentDaniel Niggebrugge, DotNetNuke Remote Code Execution vulnerability (20.01.2011)
 documentHigh-Tech Bridge Security Research, SQL Injection in Pixie (20.01.2011)
 documentHigh-Tech Bridge Security Research, SQL Injection in Pixie (20.01.2011)
 documentMustLive, Уязвимости в xAjax и xajax_jquery_plugin (20.01.2011)

sudo privilege escalation
Published:20.01.2011
Source:
SecurityVulns ID:11367
Type:local
Threat Level:
5/10
Description:Under some conditions it's possible to execute code with group rights.
Affected:SUDO : sudo 1.7
CVE:CVE-2011-0010 (check.c in sudo 1.7.x before 1.7.4p5, when a Runas group is configured, does not require a password for command execution that involves a gid change but no uid change, which allows local users to bypass an intended authentication requirement via the -g option to a sudo command.)
 CVE-2011-0008 (A certain Fedora patch for parse.c in sudo before 1.7.4p5-1.fc14 on Fedora 14 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command. NOTE: this vulnerability exists because of a CVE-2009-0034 regression.)
 CVE-2009-0034 (parse.c in sudo 1.6.9p17 through 1.6.9p19 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command.)
Original documentdocumentUBUNTU, [USN-1046-1] Sudo vulnerability (20.01.2011)

HP OpenView Storage Data Protector code execution
Published:20.01.2011
Source:
SecurityVulns ID:11368
Type:remote
Threat Level:
5/10
Affected:HP : OpenView Storage Data Protector 6.11
CVE:CVE-2011-0273 (Buffer overflow in crs.exe in HP OpenView Storage Data Protector Cell Manager 6.11 allows remote attackers to execute arbitrary code via unspecified message types.)
Original documentdocumentHP, [security bulletin] HPSBMA02625 SSRT100138 rev.1 - HP OpenView Storage Data Protector, Remote Execution of Arbitrary Code (20.01.2011)

hplip memory corruption
Published:20.01.2011
Source:
SecurityVulns ID:11369
Type:client
Threat Level:
5/10
Description:Memory corruption on SNMP response processing.
Affected:HPLIP : hplip 3.9
CVE:CVE-2010-4267 (Stack-based buffer overflow in the hpmud_get_pml function in io/hpmud/pml.c in Hewlett-Packard Linux Imaging and Printing (HPLIP) 1.6.7, 3.9.8, 3.10.9, and probably other versions allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SNMP response with a large length value.)
Original documentdocumentMANDRIVA, [ MDVSA-2011:013 ] hplip (20.01.2011)

HP LoadRunner code execution
Published:20.01.2011
Source:
SecurityVulns ID:11370
Type:remote
Threat Level:
5/10
Affected:HP : LoadRunner 9.52
CVE:CVE-2011-0272 (Unspecified vulnerability in HP LoadRunner 9.52 allows remote attackers to execute arbitrary code via network traffic to TCP port 5001 or 5002, related to the HttpTunnel feature.)
Original documentdocumentHP, [security bulletin] HPSBMA02624 SSRT100195 rev.1 - HP LoadRunner, Remote Execution of Arbitrary Code (20.01.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod