Computer Security
[EN] securityvulns.ru no-pyccku


IBM DB2 database server multiple security vulnerabilities
updated since 16.04.2008
Published:20.04.2008
Source:
SecurityVulns ID:8915
Type:local
Threat Level:
6/10
Description:Privilege escalation with administration utility, db2dasStartStopFMDaemon buffer overflow. JAR files DoS. Code execution with ADMIN_SP_C/ADMIN_SP_C2. Arbitrary files overwrite with SYSPROC.NNSTAT.
Affected:IBM : DB2 9.1
CVE:CVE-2007-5758
 CVE-2007-5664
Original documentdocumentSHATTER, Team SHATTER Security Advisory: IBM DB2 UDB Arbitrary code execution in ADMIN_SP_C/ADMIN_SP_C2 procedures (20.04.2008)
 documentSHATTER, Team SHATTER Security Advisory: IBM DB2 UDB Arbitrary file overwrite in SYSPROC.NNSTAT procedure (20.04.2008)
 documentSHATTER, Team SHATTER Security Advisory: Multiple DoS in JAR files manipulation procedures (20.04.2008)
 documentIDEFENSE, [Full-disclosure] iDefense Security Advisory 04.09.08: IBM DB2 Universal Database Administration Server File Creation Vulnerability (16.04.2008)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:20.04.2008
Source:
SecurityVulns ID:8925
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc. mnoGoSearch: crossite scripting in search.php3 via q parameter.
Affected:MNOGOSEARCH : mnoGoSearch 3.3
 SUPERNEWS : Süper News 1.0
 LIGHTNEASY : LightNEasy 1.2
 WIKEPAGE : Wikepage Wiki 2007-2
Original documentdocumentdarkz.gsa_(at)_gmail.com, LightNEasy v.1.2.2 flat Multiple Vulnerabilities (20.04.2008)
 documentnoreply_(at)_aria-security.com, 5th avenue Shopping Cart SQL Injection (20.04.2008)
 documenthadf hdafdf, Süper News v1.0 Remote SQL Injection Vulnerability (20.04.2008)
 documentMustLive, Vulnerability in mnoGoSearch (20.04.2008)

OpenOffice multiple security vulnerabilities
Published:20.04.2008
Source:
SecurityVulns ID:8926
Type:client
Threat Level:
6/10
Description:multiple buffer overflows and integer overflows on QPRO (Quattro Pro), EMF and Microsoft Office files parsing.
CVE:CVE-2008-0320
 CVE-2007-5747 (Integer underflow in OpenOffice.org before 2.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Quattro Pro (QPRO) file with crafted values that trigger an excessive loop and a stack-based buffer overflow.)
 CVE-2007-5746
 CVE-2007-5745 (Multiple heap-based buffer overflows in OpenOffice.org before 2.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Quattro Pro (QPRO) file with crafted (1) Attribute and (2) Font Description records.)
Original documentdocumentIDEFENSE, iDefense Security Advisory 04.17.08: Multiple Vendor OpenOffice QPRO File Parsing Integer Underflow Vulnerability (20.04.2008)
 documentIDEFENSE, iDefense Security Advisory 04.17.08: Multiple Vendor OpenOffice QPRO Multiple Heap Overflow Vulnerabilities (20.04.2008)
 documentIDEFENSE, iDefense Security Advisory 04.17.08: Multiple Vendor OpenOffice EMF EMR_BITBLT Record Integer Overflow Vulnerability (20.04.2008)
 documentIDEFENSE, iDefense Security Advisory 04.17.08: Multiple Vendor OpenOffice OLE DocumentSummaryInformation Heap Overflow Vulnerability (20.04.2008)

Multiple torrent client commands injection
Published:20.04.2008
Source:
SecurityVulns ID:8927
Type:client
Threat Level:
6/10
Description:It's possible to inject web interface command by using CSRF injection technique.
Affected:TORRENTFLUX : torrentflux 2.3
Original documentdocumentth3.r00k_(at)_gmail.com, BitTorrent Clients and CSRF (20.04.2008)

MPlayer array index overflow
Published:20.04.2008
Source:
SecurityVulns ID:8928
Type:client
Threat Level:
6/10
Description:Array index overflow on SDP session data parsing.
CVE:CVE-2008-1558 (Uncontrolled array index in the sdpplin_parse function in stream/realrtsp/sdpplin.c in MPlayer 1.0 rc2 allows remote attackers to overwrite memory and execute arbitrary code via a large streamid SDP parameter. NOTE: this issue has been referred to as an integer overflow.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 1552-1] New mplayer packages fix arbitrary code execution (20.04.2008)

Aztech ADSL routers backdoor
Published:20.04.2008
Source:
SecurityVulns ID:8929
Type:remote
Threat Level:
6/10
Description:It's possible to obtain administrative access with undocumented account isp/isp.
Original documentdocumentDerek striemer, Aztech ADSL2/2+ 4 Port default password (20.04.2008)

Microsoft Windows privilege escalation
Published:20.04.2008
Source:
SecurityVulns ID:8930
Type:local
Threat Level:
5/10
Description:By using RPCSS service it's possible to elevate privileges from NetworkService to SYSTEM.
Affected:MICROSOFT : Windows XP
 MICROSOFT : Windows Vista
 MICROSOFT : Windows Windows 2003 Server
 MICROSOFT : Windows Windows 2008 Server
Files:Token Kidnapping

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod