Computer Security
[EN] securityvulns.ru no-pyccku


Apache security vulnerabilities
Published:24.03.2014
Source:
SecurityVulns ID:13623
Type:remote
Threat Level:
6/10
Description:mod_log_config DoS, mod_dav buffer overflow.
Affected:APACHE : Apache 2.2
 APACHE : Apache 2.4
CVE:CVE-2014-0098 (The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.)
 CVE-2013-6438 (The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.)
Original documentdocumentMANDRIVA, [ MDVSA-2014:065 ] apache (24.03.2014)

EMC Connectrix Manager information leakage
Published:24.03.2014
Source:
SecurityVulns ID:13624
Type:remote
Threat Level:
5/10
Description:Files access is possible.
Affected:EMC : Connectrix Manager Converged Network Edition 12.1
CVE:CVE-2014-2276 (The FileUploadController servlet in EMC Connectrix Manager Converged Network Edition (CMCNE) before 12.1.5 does not properly restrict additions to the Connectrix Manager repository, which allows remote attackers to obtain sensitive information by importing a crafted firmware file.)
Original documentdocumentEMC, ESA-2014-018: EMC Connectrix Manager Converged Network Edition Information Disclosure Vulnerability (24.03.2014)

OpenXchange crossite scripting
updated since 08.01.2014
Published:24.03.2014
Source:
SecurityVulns ID:13485
Type:remote
Threat Level:
5/10
Description:Crossite scripting on MS Office and EML documents viewing.
CVE:CVE-2014-2077 (Cross-site scripting (XSS) vulnerability in the frontend in Open-Xchange (OX) AppSuite 7.4.1 before 7.4.1-rev10 and 7.4.2 before 7.4.2-rev8 allows remote attackers to inject arbitrary web script or HTML via the subject of an email, involving 'the aria "tags" for screenreaders at the top bar'.)
 CVE-2014-1679 (Cross-site scripting (XSS) vulnerability in Open-Xchange (OX) AppSuite before 7.2.2-rev31, 7.4.0 before 7.4.0-rev27, and 7.4.1 before 7.4.1-rev17 allows remote attackers to inject arbitrary web script or HTML via the header in an attached SVG file.)
 CVE-2013-7141 (Cross-site scripting (XSS) vulnerability in Open-Xchange (OX) AppSuite 7.4.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to crafted "<%" tags.)
 CVE-2013-6997 (Multiple cross-site scripting (XSS) vulnerabilities in Open-Xchange (OX) AppSuite 7.4.0 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) an HTML email with crafted CSS code containing wildcards or (2) office documents containing "crafted hyperlinks with script URL handlers.")
Original documentdocumentOPENXCHANGE, Open-Xchange Security Advisory 2014-02-10 (24.03.2014)
 documentOPENXCHANGE, Open-Xchange Security Advisory 2014-03-17 (24.03.2014)
 documentOPENXCHANGE, Open-Xchange Security Advisory 2014-01-17 (19.01.2014)
 documentOPENXCHANGE, Open-Xchange Security Advisory 2014-01-06 (08.01.2014)

Net-SNMP DoS
Published:24.03.2014
Source:
SecurityVulns ID:13625
Type:remote
Threat Level:
5/10
Description:Few DoS conditions.
Affected:NETSNMP : net-snmp 5.7
CVE:CVE-2014-2285 (The perl_trapd_handler function in perl/TrapReceiver/TrapReceiver.xs in Net-SNMP 5.7.3.pre3 and earlier, when using certain Perl versions, allows remote attackers to cause a denial of service (snmptrapd crash) via an empty community string in an SNMP trap, which triggers a NULL pointer dereference within the newSVpv function in Perl.)
 CVE-2014-2284 (The Linux implementation of the ICMP-MIB in Net-SNMP 5.5 before 5.5.2.1, 5.6.x before 5.6.2.1, and 5.7.x before 5.7.2.1 does not properly validate input, which allows remote attackers to cause a denial of service via unspecified vectors.)
Original documentdocumentMANDRIVA, [ MDVSA-2014:052 ] net-snmp (24.03.2014)

lighttpd security vulnerabilities
Published:24.03.2014
Source:
SecurityVulns ID:13626
Type:remote
Threat Level:
7/10
Description:SQL injection, directory traversal.
Affected:LIGHTTPD : lighttpd 1.4
CVE:CVE-2014-2324 (Multiple directory traversal vulnerabilities in (1) mod_evhost and (2) mod_simple_vhost in lighttpd before 1.4.35 allow remote attackers to read arbitrary files via a .. (dot dot) in the host name, related to request_check_hostname.)
 CVE-2014-2323 (SQL injection vulnerability in mod_mysql_vhost.c in lighttpd before 1.4.35 allows remote attackers to execute arbitrary SQL commands via the host name, related to request_check_hostname.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2877-1] lighttpd security update (24.03.2014)

Mozilla Firefox / Thunderbird / Seamonkey / nss multiple security vulnerabilities
updated since 24.03.2014
Published:27.03.2014
Source:
SecurityVulns ID:13621
Type:client
Threat Level:
9/10
Description:Buffer overflows, memory corruptions, information leakage, privilege escalation, protection bypass, unauthorized access, interface spoofing.
CVE:CVE-2014-1516 (The saltProfileName function in base/GeckoProfileDirectories.java in Mozilla Firefox through 28.0.1 on Android relies on Android's weak approach to seeding the Math.random function, which makes it easier for attackers to bypass a profile-randomization protection mechanism via a crafted application.)
 CVE-2014-1515 (Mozilla Firefox before 28.0.1 on Android processes a file: URL by copying a local file onto the SD card, which allows attackers to obtain sensitive information from the Firefox profile directory via a crafted application.)
 CVE-2014-1514 (vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.)
 CVE-2014-1513 (TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.)
 CVE-2014-1512 (Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary code by triggering extensive memory consumption while garbage collection is occurring, as demonstrated by improper handling of BumpChunk objects.)
 CVE-2014-1511 (Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to bypass the popup blocker via unspecified vectors.)
 CVE-2014-1510 (The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.)
 CVE-2014-1509 (Buffer overflow in the _cairo_truetype_index_to_ucs4 function in cairo, as used in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25, allows remote attackers to execute arbitrary code via a crafted extension that renders fonts in a PDF document.)
 CVE-2014-1508 (The libxul.so!gfxContext::Polygon function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process memory, cause a denial of service (out-of-bounds read and application crash), or possibly bypass the Same Origin Policy via vectors involving MathML polygon rendering.)
 CVE-2014-1507 (Directory traversal vulnerability in the DeviceStorage API in Mozilla FirefoxOS before 1.2.2 allows attackers to bypass the media sandbox protection mechanism, and read or modify arbitrary files, via a crafted application that uses a relative pathname for a DeviceStorageFile object.)
 CVE-2014-1506 (Directory traversal vulnerability in Android Crash Reporter in Mozilla Firefox before 28.0 on Android allows attackers to trigger the transmission of local files to arbitrary servers, or cause a denial of service (application crash), via a crafted application that specifies Android Crash Reporter arguments.)
 CVE-2014-1506 (Directory traversal vulnerability in Android Crash Reporter in Mozilla Firefox before 28.0 on Android allows attackers to trigger the transmission of local files to arbitrary servers, or cause a denial of service (application crash), via a crafted application that specifies Android Crash Reporter arguments.)
 CVE-2014-1505 (The SVG filter implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive displacement-correlation information, and possibly bypass the Same Origin Policy and read text from a different domain, via a timing attack involving feDisplacementMap elements, a related issue to CVE-2013-1693.)
 CVE-2014-1504 (The session-restore feature in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not consider the Content Security Policy of a data: URL, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document that is accessed after a browser restart.)
 CVE-2014-1502 (The (1) WebGL.compressedTexImage2D and (2) WebGL.compressedTexSubImage2D functions in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to bypass the Same Origin Policy and render content in a different domain via unspecified vectors.)
 CVE-2014-1501 (Mozilla Firefox before 28.0 on Android allows remote attackers to bypass the Same Origin Policy and access arbitrary file: URLs via vectors involving the "Open Link in New Tab" menu selection.)
 CVE-2014-1500 (Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (resource consumption and application hang) via onbeforeunload events that trigger background JavaScript execution.)
 CVE-2014-1499 (Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to spoof the domain name in the WebRTC (1) camera or (2) microphone permission prompt by triggering navigation at a certain time during generation of this prompt.)
 CVE-2014-1498 (The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.)
 CVE-2014-1497 (The mozilla::WaveReader::DecodeAudioData function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process heap memory, cause a denial of service (out-of-bounds read and application crash), or possibly have unspecified other impact via a crafted WAV file.)
 CVE-2014-1496 (Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 might allow local users to gain privileges by modifying the extracted Mar contents during an update.)
 CVE-2014-1493 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2014-1493 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2014-1492 (The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.)
 CVE-2014-1484 (Mozilla Firefox before 27.0 on Android 4.2 and earlier creates system-log entries containing profile paths, which allows attackers to obtain sensitive information via a crafted application.)
Original documentdocumentVUPEN Security Research, VUPEN Security Research - Mozilla Firefox "BumpChunk" Object Processing Use-after-free (Pwn2Own) (27.03.2014)
 documentRoee Hay, Firefox for Android Profile Directory Derandomization and Data Exfiltration (CVE-2014-1484, CVE-2014-1506, CVE-2014-1515, CVE-2014-1516) (27.03.2014)
 documentMANDRIVA, [ MDVSA-2014:066 ] nss (24.03.2014)
Files:Mozilla Foundation Security Advisory 2014-15
 Mozilla Foundation Security Advisory 2014-16
 Mozilla Foundation Security Advisory 2014-17
 Mozilla Foundation Security Advisory 2014-18
 Mozilla Foundation Security Advisory 2014-19
 Mozilla Foundation Security Advisory 2014-20
 Mozilla Foundation Security Advisory 2014-21
 Mozilla Foundation Security Advisory 2014-22
 Mozilla Foundation Security Advisory 2014-23
 Mozilla Foundation Security Advisory 2014-24
 Mozilla Foundation Security Advisory 2014-25
 Mozilla Foundation Security Advisory 2014-26
 Mozilla Foundation Security Advisory 2014-27
 Mozilla Foundation Security Advisory 2014-28
 Mozilla Foundation Security Advisory 2014-29
 Mozilla Foundation Security Advisory 2014-30
 Mozilla Foundation Security Advisory 2014-31
 Mozilla Foundation Security Advisory 2014-32

Nessus privilege escalation
updated since 24.03.2014
Published:07.04.2014
Source:
SecurityVulns ID:13622
Type:local
Threat Level:
5/10
Description:Weak permissions for plugin library, insecure temporary files creation.
Affected:TEANABLE : Nessus 5.2
Original documentdocument0a29 40, 0A29-14-1 : NCCGroup EasyDA privilege escalation & credential disclosure vulnerability [0day] (07.04.2014)
 documentNCC Group Research, NCC00643 Technical Advisory: Nessus Authenticated Scan Local Privilege Escalation (24.03.2014)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod