Computer Security
[EN] securityvulns.ru no-pyccku


PostgreSQL DoS
Published:24.03.2009
Source:
SecurityVulns ID:9765
Type:local
Threat Level:
5/10
Description:Stack overflow on error message conversion.
Affected:POSTGRES : PostgreSQL 7.4
 POSTGRES : PostgreSQL 8.0
 POSTGRES : PostgreSQL 8.1
 POSTGRES : PostgreSQL 8.2
 POSTGRES : PostgreSQL 8.3
CVE:CVE-2009-0922 (PostgreSQL before 8.3.7, 8.2.13, 8.1.17, 8.0.21, and 7.4.25 allows remote authenticated users to cause a denial of service (stack consumption and crash) by triggering a failure in the conversion of a localized error message to a client-specified encoding, as demonstrated using mismatched encoding conversion requests.)
Original documentdocumentMANDRIVA, [ MDVSA-2009:079 ] postgresql (24.03.2009)

FreeBSD / Mac OS X integer overflow
Published:24.03.2009
Source:
SecurityVulns ID:9766
Type:local
Threat Level:
7/10
Description:Integer overflow in kernel space on process timers.
Affected:FREEBSD : FreeBSD 7.0
 FREEBSD : FreeBSD 7.1
 FREEBSD : FreeBSD 7.2
CVE:CVE-2009-1041 (The ktimer feature (sys/kern/kern_time.c) in FreeBSD 7.0, 7.1, and 7.2 allows local users to overwrite arbitrary kernel memory via an out-of-bounds timer value.)
Original documentdocumentmu-b, [Full-disclosure] FreeBSD/OS X kernel bug dump (24.03.2009)
 documentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-09:06.ktimer (24.03.2009)
Files:FreeBSD >= 7.0 local kernel root exploit
 Apple MACOS X 792.0 <= xnu <= 1228.x local kernel root exploit
 Apple MACOS X 792.0 <= xnu <= 1228.x local kernel root exploit

Linux-PAM signed/unsignedconversion vulnerability
Published:24.03.2009
Source:
SecurityVulns ID:9767
Type:local
Threat Level:
4/10
Description:Problems with non-ASCII symbols in configuration file.
Affected:PAM : Linux-PAM 1.0
CVE:CVE-2009-0887 (Integer signedness error in the _pam_StrTok function in libpam/pam_misc.c in Linux-PAM (aka pam) 1.0.3 and earlier, when a configuration file contains non-ASCII usernames, might allow remote attackers to cause a denial of service, and might allow remote authenticated users to obtain login access with a different user's non-ASCII username, via a login attempt.)
Original documentdocumentMANDRIVA, [ MDVSA-2009:077 ] pam (24.03.2009)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:24.03.2009
Source:
SecurityVulns ID:9768
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:PHPCLASSIFIEDS : PHP Classifieds 7.3
 TRANSPARENTTECH : ExpressionEngine 1.6
 WEBCIT : webcit 7.37
 PHPPIZABI : PHPizabi 0.848
CVE:CVE-2009-0364 (Format string vulnerability in the mini_calendar component in Citadel.org WebCit 7.22, and other versions before 7.39, allows remote attackers to execute arbitrary code via unspecified vectors.)
Original documentdocumentrgod, PHPizabi v0.848b C1 HFP1 proc.inc.php remote privilege escalation (php.ini independent) (24.03.2009)
 documentDEBIAN, [SECURITY] [DSA 1752-1] New webcit packages fix potential remote code execution (24.03.2009)
 documentAdam Baldwin, ExpressionEngine Persistent Cross-Site Scripting (24.03.2009)
 documentSECUNIA, [SA34410] PHP Classifieds Cross-Site Scripting and File Upload Vulnerabilities (24.03.2009)

Rittal CMC-TC Processing Unit II multiple security vulnerabilities
Published:24.03.2009
Source:
SecurityVulns ID:9769
Type:remote
Threat Level:
5/10
Description:Crossite scripting, session hijacking.
Affected:RITTAL : CMC-TC Processing Unit II
Original documentdocumentHenri Lindberg - Smilehouse Oy, Rittal CMC-TC Processing Unit II multiple vulnerabilities (24.03.2009)

Evolution Data Server multiple security vulnerabilities
Published:24.03.2009
Source:
SecurityVulns ID:9770
Type:client
Threat Level:
7/10
Description:Signature spoofing, DoS, process memory disclosure, integer overflows.
CVE:CVE-2009-0587 (Multiple integer overflows in Evolution Data Server (aka evolution-data-server) before 2.24.5 allow context-dependent attackers to execute arbitrary code via a long string that is converted to a base64 representation in (1) addressbook/libebook/e-vcard.c in evc or (2) camel/camel-mime-utils.c in libcamel.)
 CVE-2009-0582 (The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data.)
 CVE-2009-0547 (Evolution 2.22.3.1 checks S/MIME signatures against a copy of the e-mail text within a signed-data blob, not the copy of the e-mail text displayed to the user, which allows remote attackers to spoof a signature by modifying the latter copy, a different vulnerability than CVE-2008-5077.)
Original documentdocumentMANDRIVA, [ MDVSA-2009:078 ] evolution-data-server (24.03.2009)

ZyXel G-570S multiple security vulnerabilities
Published:24.03.2009
Source:
SecurityVulns ID:9771
Type:remote
Threat Level:
5/10
Description:Unauthorized configuration access, DoS, information disclosure.
Affected:ZYXEL : ZyXEL G-570S
Original documentdocumentSECUNIA, [SA34275] ZyXEL G-570S Multiple Vulnerabilities (24.03.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod