Computer Security
[EN] securityvulns.ru no-pyccku


Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:24.10.2010
Source:
SecurityVulns ID:11207
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:WAGORA : W-Agora 4.1
 TYPO3 : typo3 4.3
 DELUXEBB : DeluxeBB 1.3
 TRIBIQ : Tribiq CMS 5.2
 4SITE : 4site CMS 2.4
 SNEWS : sNews 1.7
 SAWMILL : Sawmill 8.1
 PECIOCMS : Pecio CMS 2.0
 MICROCMS : Micro CMS 1.0
 WICCLE : Wiccle Web Builder CMS 2.0
CVE:CVE-2010-3717 (The t3lib_div::validEmail function in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 does not properly restrict input to filter_var FILTER_VALIDATE_EMAIL operations in PHP, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a long e-mail address string, a related issue to CVE-2010-3710.)
 CVE-2010-3716 (The be_user_creation task in TYPO3 4.2.x before 4.2.15 and 4.3.x before 4.3.7 allows remote authenticated users to gain privileges via a crafted POST request that creates a user account with arbitrary group memberships.)
 CVE-2010-3715 (Multiple cross-site scripting (XSS) vulnerabilities in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) the RemoveXSS function, and allow remote authenticated users to inject arbitrary web script or HTML via vectors related to (2) the backend.)
 CVE-2010-3714 (The jumpUrl (aka access tracking) implementation in tslib/class.tslib_fe.php in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 does not properly compare certain hash values during access-control decisions, which allows remote attackers to read arbitrary files via unspecified vectors.)
Original documentdocumentYam Mesicka, Aardvark Topsite XSS vulnerability (24.10.2010)
 documentMustLive, Уязвимости в W-Agora (24.10.2010)
 documentDEBIAN, [SECURITY] [DSA 2121-1] New TYPO3 packages fix several vulnerabilities (24.10.2010)
 documentSecPod Research, Wiccle Web Builder CMS and iWiccle CMS Community Builder Multiple XSS Vulnerabilities (24.10.2010)
 documentSecPod Research, Pecio CMS XSS Vulnerability (24.10.2010)
 documentSecPod Research, Micro CMS Persistent XSS Vulnerability. (24.10.2010)
 documentSEC Consult Vulnerability Lab, SEC Consult SA-20101021-0 :: Multiple critical vulnerabilities in Sawmill log analysis software (24.10.2010)
 documentHigh-Tech Bridge Security Research, XSS vulnerability in sNews (24.10.2010)
 documentHigh-Tech Bridge Security Research, XSS vulnerability in sNews (24.10.2010)
 documentHigh-Tech Bridge Security Research, SQL Injection in 4site CMS (24.10.2010)
 documentHigh-Tech Bridge Security Research, Path disclosure in Tribiq CMS (24.10.2010)
 documentHigh-Tech Bridge Security Research, SQL injection in DeluxeBB (24.10.2010)

SAP BusinessObjects default password
Published:24.10.2010
Source:
SecurityVulns ID:11209
Type:remote
Threat Level:
5/10
Description:Deafault account admin/axis2 is used for AXIS2 installation.
CVE:CVE-2010-0219 (Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2 and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.)
Original documentdocumentHD Moore, R7-0037: SAP BusinessObjects Axis2 Default Admin Password (24.10.2010)

LibSMI ibrary code execution
Published:24.10.2010
Source:
SecurityVulns ID:11212
Type:library
Threat Level:
5/10
Description:Buffer overflow on oversized numerical OID.
Affected:LIBSMI : libsmi 0.4
CVE:CVE-2010-2891 (Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.)
Original documentdocumentCORE SECURITY TECHNOLOGIES ADVISORIES, [CORE-2010-0819] LibSMI smiGetNode Buffer Overflow When Long OID Is Given In Numerical Form (24.10.2010)

Microsoft Windows Mobile double free vulnerability
Published:24.10.2010
Source:
SecurityVulns ID:11213
Type:client
Threat Level:
4/10
Description:Double free on receiving VCF via MMS/bluetooth.
Affected:MICROSOFT : Windows Mobile 6.1
 MICROSOFT : Windows Mobile 6.5
Original documentdocumentkarakorsankara_(at)_hotmail.com, [SecurityArchitect-009]: Microsoft Windows Mobile Double Free Vulnerability (24.10.2010)

libpurple library / Pidgin DoS
Published:24.10.2010
Source:
SecurityVulns ID:11214
Type:library
Threat Level:
5/10
Description:Crash on base64 decoding in different protocols.
Affected:PIDGIN : pidgin 2.7
 LIBPURPLE : libpurple 2.7
CVE:CVE-2010-3711 (libpurple in Pidgin before 2.7.4 does not properly validate the return value of the purple_base64_decode function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a crafted message, related to the plugins for MSN, MySpaceIM, XMPP, and Yahoo! and the NTLM authentication support.)
Original documentdocumentMANDRIVA, [ MDVSA-2010:208 ] pidgin (24.10.2010)

Linux kernel RDS protocol privilege escalation
Published:24.10.2010
Source:
SecurityVulns ID:11211
Type:local
Threat Level:
6/10
Description:It's possible to overwite kernel memory regions via recvmsg() for RDS protocol.
Affected:LINUX : kernel 2.6
CVE:CVE-2010-3904 (The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.)
Original documentdocumentVSR Advisories, VSR Advisories: Linux RDS Protocol Local Privilege Escalation (24.10.2010)

GNU C dynamic linker privilege escalation
updated since 24.10.2010
Published:26.10.2010
Source:
SecurityVulns ID:11210
Type:local
Threat Level:
7/10
Description:Invalid $ORIGIN processing allows to load user library into suid application.
Affected:GNU : glibc 2.11
CVE:CVE-2010-3856 (ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.)
 CVE-2010-3847 (elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.)
Original documentdocumentTavis Ormandy, The GNU C library dynamic linker will dlopen arbitrary DSOs during setuid loads. (26.10.2010)
 documentTavis Ormandy, The GNU C library dynamic linker expands $ORIGIN in setuid library search path (24.10.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod