Computer Security
[EN] securityvulns.ru no-pyccku


Safari multiple security vulnerabilities
Published:24.04.2008
Source:
SecurityVulns ID:8937
Type:remote
Threat Level:
4/10
Description:DoS conditions, link target spoofing.
Original documentdocumentjplopezy_(at)_gmail.com, Safari 3.1.1 Multiple Vulnerabilities for windows (24.04.2008)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:24.04.2008
Source:
SecurityVulns ID:8938
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc. Wordpress: different message for wrong username and pasword, weak inicial password generation.
Affected:WORDPRESS : WordPress 2.0
 WORDPRESS : WordPress 2.1
 WORDPRESS : WordPress 2.2
 WORDPRESS : WordPress 2.3
 WORDPRESS : Wordpress 2.5
 ROUNDUP : Roundup 1.4
CVE:CVE-2008-1474 (Multiple unspecified vulnerabilities in Roundup before 1.4.4 have unknown impact and attack vectors.)
Original documentdocumentMustLive, Vulnerabilities in WordPress (24.04.2008)
 documentnoreply_(at)_aria-security.com, NetClassifieds Sql Injection (24.04.2008)
 documentnoreply_(at)_aria-security.com, Horde Webmail XSS [Aria-Security] (24.04.2008)
 documentDEBIAN, [SECURITY] [DSA 1554-1] New roundup packages fix cross-site scripting vulnerability (24.04.2008)

Xinelib buffer overflow
Published:24.04.2008
Source:
SecurityVulns ID:8939
Type:client
Threat Level:
7/10
Description:Buffer overflow on oversized MP3 Copyright tag.
Affected:XINE : xine 1.1
 XINE : xinelib 1.1
Original documentdocumentlaurent gaffie, xine-lib NES Sound Format Demuxer Buffer Overflow (24.04.2008)

Asterisk IAX2 calls spoofing
Published:24.04.2008
Source:
SecurityVulns ID:8940
Type:remote
Threat Level:
6/10
Description:Insuficient check of server ACK and weak call number generation allows blind spoofing.
Affected:ASTERISK : Asterisk 1.2
 DIGIUM : Asterisk 1.4
 ASTERISK : Asterisk s800i
 ASTERISK : AsteriskNOW 1.0
CVE:CVE-2008-1897 (The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake. NOTE: this issue exists because of an incomplete fix for CVE-2008-1923.)
Original documentdocumentASTERISK, AST-2008-006 - 3-way handshake in IAX2 incomplete (24.04.2008)

OpenFire jabber server DoS
Published:24.04.2008
Source:
SecurityVulns ID:8941
Type:remote
Threat Level:
5/10
Description:Memory exhaustion if client fails to receive messages.
CVE:CVE-2008-1728 (ConnectionManagerImpl.java in Ignite Realtime Openfire 3.4.5 allows remote attackers to cause a denial of service (daemon outage) by triggering large outgoing queues without reading messages.)
Original documentdocumentGENTOO, [ GLSA 200804-26 ] Openfire: Denial of Service (24.04.2008)

Zune software ActiveX unauthorized access
Published:24.04.2008
Source:
SecurityVulns ID:8942
Type:client
Threat Level:
5/10
Description:It's possible to save files to any location.
Original documentdocumentinfo_(at)_ilionsecurity.ch, Zune software - arbitrary file overwrite (24.04.2008)

RSA Authentication Agent crossite scripting
Published:24.04.2008
Source:
SecurityVulns ID:8943
Type:remote
Description:Crossite scriptign via authorization page.
Affected:RSA : RSA Authentication Agent 5.3
Original documentdocumentProCheckUp Research, PR07-43: Cross-domain redirect on RSA Authentication Agent (24.04.2008)
 documentProCheckUp Research, PR07-44: XSS on RSA Authentication Agent login page (24.04.2008)

Microsoft Windows Realtek HD Audio privilege escalation
Published:24.04.2008
Source:
SecurityVulns ID:8944
Type:local
Threat Level:
6/10
Description:Multiple security vulnerabilities on IOCTL processing.
Affected:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 REALTEK : RealTek HD Audio Codec Driver 6.0
Original documentdocumentvulns_(at)_wintercore.com, [W01-0408] Realtek HD Audio Codec Drivers (Vista) - Local Privilege Escalation (24.04.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod