Computer Security
[EN] securityvulns.ru no-pyccku


Multiple Cisco Security Monitoring, Analysis and Response System security vulnerabilities
Published:22.07.2006
Source:
SecurityVulns ID:6382
Type:remote
Threat Level:
6/10
Description:Default preconfigured Oracle databse account, JBoss code execution, multiple administrative interface code executions.
Affected:CISCO : CS-MARS 4.1
 CISCO : CS-MARS 4.2
Original documentdocumentJon Hart, Cisco MARS < 4.2.1 remote compromise (22.07.2006)
 documentCISCO, Cisco Security Advisory: Multiple Vulnerabilities in Cisco Security Monitoring, Analysis and Response System (CS-MARS) (22.07.2006)
Files:Exploits Cisco/Protego CS-MARS < 4.2.1 remote command execution, system compromise via insecure JBoss installation

Multiple Ethereal / TEthereal / TShark / WireShark security vulnerabilities
Published:22.07.2006
Source:
SecurityVulns ID:6383
Type:remote
Threat Level:
6/10
Description:Buffer overflows in multiple protocols dessectors.
Affected:WIRESHARK : wireshark 0.99
 TSHARK : tshark 0.99
 ETHEREAL : Ethereal 0.99
 ETHEREAL : TEthereal 0.99
Original documentdocumentMANDRAKE, [ MDKSA-2006:128 ] - Updated wireshark packages fix numerous vulnerabilities (22.07.2006)

OutpostFirewall / Lavasoft Firewall privilege escalation
Published:22.07.2006
Source:
SecurityVulns ID:6384
Type:local
Threat Level:
6/10
Description:Firewall administration application launches explorer.exe with Local System privileges if explorer.exe is not running.
Affected:AGNITUM : Outpost Firewall Pro 3.51
 LAVASOFT : Lavasoft Personal Firewall 1.0
Original documentdocumentmullware_(at)_gmail.com, Escalation of privileges in Outpost and Lavasoft Firewalls -Unusual ShellExecute behavior (22.07.2006)

Linux kernel procfs race conditions
Published:22.07.2006
Source:
SecurityVulns ID:6385
Type:local
Threat Level:
6/10
Description:Privilege escalation is possible.
Affected:LINUX : kernel 2.6
Original documentdocumentDEBIAN, [SECURITY] [DSA 1111-1] New Linux kernel 2.6.8 packages fix privilege escalation (22.07.2006)
Files:Exploits Linux kernel /proc race conditions

D-Link routers UPNP buffer overflow
Published:22.07.2006
Source:
SecurityVulns ID:6386
Type:remote
Threat Level:
6/10
Description:Buffer overflow on oversized UPNP (TCP/1900) M-SEARCH request.
Affected:DLINK : D-Link DI-524
 DLINK : D-Link DI-624
 DLINK : D-Link DI-784
 DLINK : D-Link DI-604
 DLINK : D-Link EBR-2310
 DLINK : D-Link WBR-2310
 DLINK : D-Link WBR-1310
Original documentdocumentEEYE, D-Link Router UPNP Stack Overflow (22.07.2006)

Weak Mercury Messenger permissions
Published:22.07.2006
Source:
SecurityVulns ID:6387
Type:local
Threat Level:
5/10
Description:Chat log director yis world-readable.
Original documentdocumentHans Wolters, Mercury Messenger (22.07.2006)

Multiple UFO2000 game security vulnerabilities
Published:22.07.2006
Source:
SecurityVulns ID:6388
Type:remote
Threat Level:
5/10
Description:Memory corruptions, buffer overflows, SQL injections, etc.
Affected:UFO2000 : UFO2000 1057
Original documentdocumentLuigi Auriemma, Multiple vulnerabilities in UFO2000 svn 1057 (22.07.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod