Computer Security
[EN] securityvulns.ru no-pyccku


Sun Grid Engine rsh client privilege escalation
Published:24.01.2006
Source:
SecurityVulns ID:5685
Type:local
Threat Level:
5/10
Original documentdocumentSECUNIA, [SA18580] Sun Grid Engine rsh Client Privilege Escalation Vulnerability (24.01.2006)

BEA Weblogic application server multiple vulnerabilities
Published:24.01.2006
Source:
SecurityVulns ID:5687
Type:remote
Threat Level:
6/10
Description:Database passwords are stored unencrypted in cleartext, log files access, unauthorized MBean access, cleartext password logged on password change, etc.
Affected:BEA : WebLogic 6.1
 BEA : Weblogic 7.0
 BEA : Weblogic 8.1
 BEA : Weblogic 9.0
 ORACLE : WebLogic Portal 8.1
CVE:CVE-2007-0415 (BEA WebLogic Server 8.1 through 8.1 SP5 does not properly enforce access control after a dynamic update and dynamic redeployment of an application that is implemented through exploded jars, which allows attackers to bypass intended access restrictions.)
 CVE-2007-0414 (BEA WebLogic Server 6.1 through 6.1 SP7, 7.0 through 7.0 SP6, 8.1 through 8.1 SP5, and 9.0 allows remote attackers to cause a denial of service (server hang) via certain requests that cause muxer threads to block when processing error pages.)
 CVE-2007-0413 (BEA WebLogic Server 8.1 through 8.1 SP5 improperly cleartext data in a backup of config.xml after offline editing, which allows local users to obtain sensitive information by reading this backup file.)
 CVE-2007-0412 (BEA WebLogic Server 6.1 through 6.1 SP7, 7.0 through 7.0 SP7, and 8.1 through 8.1 SP5 allows remote attackers to read arbitrary files inside the class-path property via .ear or exploded .ear files that use the manifest class-path property to point to utility jar files.)
 CVE-2007-0411 (BEA WebLogic Server 8.1 through 8.1 SP5, 9.0, 9.1, and 9.2 Gold, when WS-Security is used, does not properly validate certificates, which allows remote attackers to conduct a man-in-the-middle (MITM) attack.)
 CVE-2007-0410 (Unspecified vulnerability in the thread management in BEA WebLogic 7.0 through 7.0 SP6, 8.1 through 8.1 SP5, 9.0, and 9.1, when T3 authentication is used, allows remote attackers to cause a denial of service (thread and system hang) via unspecified "sequences of events.")
 CVE-2007-0409 (BEA WebLogic 7.0 through 7.0 SP6, 8.1 through 8.1 SP4, and 9.0 initial release does not encrypt passwords stored in the JDBCDataSourceFactory MBean Properties, which allows local administrative users to read the cleartext password.)
 CVE-2007-0408 (BEA Weblogic Server 8.1 through 8.1 SP4 does not properly validate client certificates when reusing cached connections, which allows remote attackers to obtain access via an untrusted X.509 certificate.)
Original documentdocumentSECUNIA, [SA18593] BEA WebLogic Portal Information Disclosure and Security Bypass (24.01.2006)
 documentSECUNIA, [SA18592] BEA WebLogic Server/Express Vulnerabilities and Security Issues (24.01.2006)
 documentSECUNIA, [SA18581] BEA WebLogic Server/Express Multiple Domains Administrator Access (24.01.2006)

FetchMail mail processor DoS
updated since 23.01.2006
Published:24.01.2006
Source:
SecurityVulns ID:5681
Type:remote
Threat Level:
5/10
Description:Error on bounce message generation cause uninitialized memory reference.
Affected:FETCHMAIL : fetchmail 6.3
Original documentdocumentma+nomail_(at)_dt.e-technik.uni-dortmund.de, [VulnWatch] fetchmail security announcement fetchmail-SA-2006-01 (CVE-2006-0321) (24.01.2006)
 documentSECUNIA, [SA18571] Fetchmail Bounced Message Denial of Service Vulnerability (23.01.2006)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:24.01.2006
Source:
SecurityVulns ID:5684
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:FLYSPRAY : Flyspray 0.9
 ADODB : ADOdb 4.7
Original documentdocumentSECUNIA, [SA18575] ADOdb PostgreSQL SQL Injection Vulnerability (24.01.2006)
 documentDEBIAN, [Full-disclosure] [SECURITY] [DSA 953-1] New flyspray packages fix cross-site scripting (24.01.2006)

OpenSSH scp client unfiltered shell characters
Published:24.01.2006
Source:
SecurityVulns ID:5686
Type:local
Threat Level:
5/10
Description:Unsafe argument (filename) usage in system() call.
Affected:OPENSSH : OpenSSH 4.2
Original documentdocumentSECUNIA, [SA18579] OpenSSH scp Command Line Shell Command Injection (24.01.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod