Computer Security
[EN] securityvulns.ru no-pyccku


debian-goodies Scripts shell characters vulnerabilities
Published:25.03.2008
Source:
SecurityVulns ID:8832
Type:remote
Threat Level:
5/10
Description:Shell characters problem via process names in checkrestart utility.
Affected:DEBIAN : debian-goodies 0.23
CVE:CVE-2007-3912 (checkrestart in debian-goodies before 0.34 allows local users to gain privileges via shell metacharacters in the name of the executable file for a running process.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 1527-1] New debian-goodies packages fix privilege escalation (25.03.2008)

OpenSSH privilege escalation
Published:25.03.2008
Source:
SecurityVulns ID:8834
Type:local
Threat Level:
6/10
Description:Local user can hijack X-session of different user because of invalid DISPLAY variable initialization.
Affected:OPENSSH : OpenSSH 4.3
CVE:CVE-2008-1483 (OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.)
Original documentdocumentRPATH, rPSA-2008-0120-1 gnome-ssh-askpass openssh openssh-client openssh-server (25.03.2008)

Xine / MPlayer / VLC buffer overflow
updated since 21.01.2008
Published:25.03.2008
Source:
SecurityVulns ID:8592
Type:library
Threat Level:
6/10
Description:Buffer overflows and array overflow on RTSP parsing.
Affected:MPLAYER : MPlayer 1.0
 XINE : xine 1.1
 XINE : xinelib 1.1
 VLC : VLC 0.8
CVE:CVE-2008-0238 (Multiple heap-based buffer overflows in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 allow remote attackers to execute arbitrary code via the SDP (1) Title, (2) Author, or (3) Copyright attribute, related to the rmff_dump_header function, different vectors than CVE-2008-0225. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.)
 CVE-2008-0235 (The Microsoft VFP_OLE_Server ActiveX control allows remote attackers to execute arbitrary code by invoking the foxcommand method.)
 CVE-2008-0225 (Heap-based buffer overflow in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote attackers to execute arbitrary code via the SDP Abstract attribute, related to the rmff_dump_header function and related to disregarding the max field. NOTE: some of these details are obtained from third party information.)
 CVE-2008-0073
Original documentdocumentGuido Landi, [Full-disclosure] CVE-2008-0073 - MPlayer and VLC "sdpplin_parse()" Array Indexing Vulnerability (25.03.2008)
 documentDEBIAN, [SECURITY] [DSA 1472-1] New xine-lib packages fix arbitrary code execution (21.01.2008)

Linksys SPA-2102 wireless IP phones DoS
Published:25.03.2008
Source:
SecurityVulns ID:8831
Type:remote
Threat Level:
5/10
Description:Large ICMP packets cause device to crash.
Affected:LINKSYS : SPA-2102
Original documentdocumentDerek striemer, Linksys phone adapter denial of service (25.03.2008)

Hamachi VPN Client cleartext password in process memory
Published:25.03.2008
Source:
SecurityVulns ID:8833
Type:local
Threat Level:
3/10
Description:Cleartext username and password can be dumped in cleartext from process memory.
Affected:HAMACHI : Hamachi VPN Client 1.0
Original documentdocumentevilcry_(at)_gmail.com, Hamachi Password Disclosure Vulnerability (25.03.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod