Computer Security
[EN] no-pyccku

dbus DoS
SecurityVulns ID:10085
Threat Level:
Description:Denial of Service via dbus_signature_validate.
Affected:DBUS : dbus 1.2
CVE:CVE-2009-1189 (The _dbus_validate_signature_with_reason function (dbus-marshal-validate.c) in D-Bus (aka DBus) before 1.2.14 uses incorrect logic to validate a basic type, which allows remote attackers to spoof a signature via a crafted key. NOTE: this is due to an incorrect fix for CVE-2008-3834.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 1837-1] New dbus packages fix denial of service (20.07.2009)

Real Helix Server DoS
SecurityVulns ID:10086
Threat Level:
Description:DoS on RTSP and SETUP requests handling.
Affected:REAL : Helix Server 12.0
 REAL : Helix Mobile Server 12.0
CVE:CVE-2009-2534 (RealNetworks Helix Server and Helix Mobile Server before 13.0.0 allow remote attackers to cause a denial of service (daemon crash) via an RTSP SETUP request that (1) specifies the / URI or (2) lacks a / character in the URI.)
 CVE-2009-2533 (rmserver in RealNetworks Helix Server and Helix Mobile Server before 13.0.0 allows remote attackers to cause a denial of service (daemon exit) via multiple RTSP SET_PARAMETER requests with empty DataConvertBuffer headers.)
Original documentdocumentCORE SECURITY TECHNOLOGIES ADVISORIES, CORE-2009-0227: Real Helix DNA RTSP and SETUP request handler vulnerabilities (20.07.2009)

net-snmp multiple security vulnerabilities
updated since 10.11.2008
SecurityVulns ID:9414
Threat Level:
Description:Buffer overflow in snmp_get, integer overflow in SNMP agent.
Affected:NETSNMP : Net-SNMP 5.1
CVE:CVE-2009-1887 (agent/snmp_agent.c in snmpd in net-snmp 5.0.9 in Red Hat Enterprise Linux (RHEL) 3 allows remote attackers to cause a denial of service (daemon crash) via a crafted SNMP GETBULK request that triggers a divide-by-zero error. NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-4309.)
 CVE-2008-4309 (Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before, 5.3 before, and 5.2 before allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats.)
 CVE-2008-2292 (Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).)
Original documentdocumentMANDRIVA, [ MDVSA-2009:156 ] net-snmp (20.07.2009)
 documentDEBIAN, [SECURITY] [DSA 1663-1] New net-snmp packages fix several vulnerabilities (10.11.2008)

Linux kernel privilege escalation
updated since 20.07.2009
SecurityVulns ID:10084
Threat Level:
Description:Error in NULL pointer dereference error handling.
Affected:LINUX : kernel 2.6
CVE:CVE-2009-1897 (The tun_chr_poll function in drivers/net/tun.c in the tun subsystem in the Linux kernel 2.6.30 and, when the -fno-delete-null-pointer-checks gcc option is omitted, allows local users to gain privileges via vectors involving a NULL pointer dereference and an mmap of /dev/net/tun, a different vulnerability than CVE-2009-1894.)
 CVE-2009-1895 (The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).)
Original documentdocumentRPATH, rPSA-2009-0111-1 kernel (27.07.2009)
 documentBrad Spengler, Linux 2.6.30+/SELinux/RHEL5 test kernel 0day, exploiting the unexploitable (20.07.2009)
Files:2.6.30+/RHEL5 2.6.18 local kernel exploit in /dev/net/tun

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod