Computer Security
[EN] securityvulns.ru no-pyccku


Cisco Wireless LAN Controller multiple security vulnerabilities
Published:27.01.2013
Source:
SecurityVulns ID:12842
Type:remote
Threat Level:
6/10
Description:DoS via IP packet processing in IPS, DoS via SIP packet, SNMP unauthorized access, HTTP Profiling code execution.
Affected:CISCO : Cisco 500
 CISCO : Cisco 2100
 CISCO : Cisco 4100
 CISCO : Cisco 5500
 CISCO : Cisco 4400
 CISCO : Cisco 2000
 CISCO : Catalyst 3750G
 CISCO : Cisco 2500
 CISCO : Cisco Flex 7500
 CISCO : Cisco 7500
 CISCO : Cisco 8500
CVE:CVE-2013-1105 (Cisco Wireless LAN Controller (WLC) devices with software 7.0 before 7.0.235.3, 7.1 and 7.2 before 7.2.111.3, and 7.3 before 7.3.101.0 allow remote authenticated users to bypass wireless-management settings and read or modify the device configuration via an SNMP request, aka Bug ID CSCua60653.)
 CVE-2013-1104 (The HTTP Profiling functionality on Cisco Wireless LAN Controller (WLC) devices with software 7.3.101.0 allows remote authenticated users to execute arbitrary code via a crafted HTTP User-Agent header, aka Bug ID CSCuc15636.)
 CVE-2013-1103 (Cisco Wireless LAN Controller (WLC) devices with software 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allow remote attackers to cause a denial of service (Access Point reload) via crafted SIP packets, aka Bug ID CSCts87659.)
 CVE-2013-1102 (The Wireless Intrusion Prevention System (wIPS) component on Cisco Wireless LAN Controller (WLC) devices with software 7.0 before 7.0.235.0, 7.1 and 7.2 before 7.2.110.0, and 7.3 before 7.3.101.0 allows remote attackers to cause a denial of service (device reload) via crafted IP packets, aka Bug ID CSCtx80743.)

ircd-ratbox / Charybdis DoS
Published:27.01.2013
Source:
SecurityVulns ID:12843
Type:remote
Threat Level:
5/10
Description:Crash with assert() on connection initialization.
Affected:RATBOX : ratbox 3.0
 CHARYBDIS : Charybdis 3.4
CVE:CVE-2012-6084 (modules/m_capab.c in (1) ircd-ratbox before 3.0.8 and (2) Charybdis before 3.4.2 does not properly support capability negotiation during server handshakes, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed request.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2612-1] ircd-ratbox security update (27.01.2013)

Multiple Barracuda Networks products backdoors
Published:27.01.2013
Source:
SecurityVulns ID:12844
Type:remote
Threat Level:
8/10
Description:There are built-in SSH-accessible system accounts with unfiltered IP ranges.
Original documentdocumentSEC Consult Vulnerability Lab, SEC Consult SA-20130124-0 :: Critical SSH Backdoor in multiple Barracuda Networks Products (27.01.2013)

HP Diagnostics Server code execution
updated since 27.08.2012
Published:27.01.2013
Source:
SecurityVulns ID:12531
Type:remote
Threat Level:
7/10
Description:magentservice.exe code execution on TCP/23472 request parsing.
Affected:HP : HP Diagnostics Server 9.21
Original documentdocumentHP, [security bulletin] HPSBMU02841 SSRT100724 rev.1 - HP Diagnostics Server, Remote Execution of Arbitrary Code (27.01.2013)
 documentZDI, ZDI-12-162 : (0Day) HP Diagnostics Server magentservice.exe Remote Code Execution Vulnerability (27.08.2012)

EMC Avamar weak permissions
updated since 02.01.2013
Published:27.01.2013
Source:
SecurityVulns ID:12806
Type:local
Threat Level:
5/10
Description:Cache files are world writable.
CVE:CVE-2012-2291 (EMC Avamar Client 4.x, 5.x, and 6.x on HP-UX and Mac OS X, and the EMC Avamar plugin 4.x, 5.x, and 6.x for Oracle, uses world-writable permissions for cache directories, which allows local users to gain privileges via an unspecified symlink attack.)
Original documentdocumentEMC, Re: EMC Avamar: World writable cache files (27.01.2013)
 documentfulldisclosure_(at)_greyhat.dk, EMC Avamar: World writable cache files (02.01.2013)

EMC AlphaStor security vulnerabilities
Published:27.01.2013
Source:
SecurityVulns ID:12845
Type:remote
Threat Level:
6/10
Description:Command injection, format string vulnerability.
Affected:EMC : AlphaStor 4.0
CVE:CVE-2013-0929 (Format string vulnerability in the _vsnsprintf function in rrobotd.exe in the Device Manager in EMC AlphaStor 4.0 before build 800 allows remote attackers to execute arbitrary code via format string specifiers in a command.)
 CVE-2013-0928 (The NetWorker command processor in rrobotd.exe in the Device Manager in EMC AlphaStor 4.0 before build 800 allows remote attackers to execute arbitrary commands via a DCP "run command" operation.)
Original documentdocumentEMC, ESA-2013-008: EMC AlphaStor Multiple Vulnerabilities (27.01.2013)

Cisco Linksys WRT54GL multiple security vulnerabilities
Published:27.01.2013
Source:
SecurityVulns ID:12846
Type:remote
Threat Level:
5/10
Description:Code execution, crossite scripting, crossite request forgery.
Affected:CISCO : Linksys WRT54GL
Original documentdocumentdevnull_(at)_s3cur1ty.de, Multiple Vulnerabilities in Linksys WRT54GL (27.01.2013)

F5 BIG-IP security vulnerabilities
Published:27.01.2013
Source:
SecurityVulns ID:12847
Type:remote
Threat Level:
5/10
Description:SQL and XML injections.
Affected:F5 : BIG-IP 11.2
CVE:CVE-2012-3000 (Multiple SQL injection vulnerabilities in sam/admin/reports/php/saveSettings.php in the (1) APM WebGUI in F5 BIG-IP LTM, GTM, ASM, Link Controller, PSM, APM, Edge Gateway, and Analytics and (2) AVR WebGUI in WebAccelerator and WOM 11.2.x before 11.2.0-HF3 and 11.2.x before 11.2.1-HF3 allow remote authenticated users to execute arbitrary SQL commands via the defaultQuery parameter.)
 CVE-2012-2997 (XML External Entity (XXE) vulnerability in sam/admin/vpe2/public/php/server.php in F5 BIG-IP 10.0.0 through 10.2.4 and 11.0.0 through 11.2.1 allows remote authenticated users to read arbitrary files via a crafted XML file.)
Original documentdocumentSEC Consult Vulnerability Lab, SEC Consult SA-20130122-1 :: F5 BIG-IP SQL injection vulnerability (27.01.2013)
 documentSEC Consult Vulnerability Lab, SEC Consult SA-20130122-0 :: F5 BIG-IP XML External Entity Injection vulnerability (27.01.2013)

PHP information leakage
Published:27.01.2013
Source:
SecurityVulns ID:12848
Type:library
Threat Level:
5/10
Description:openssl_encrypt() memory disclosure
CVE:CVE-2012-6113 (The openssl_encrypt function in ext/openssl/openssl.c in PHP 5.3.9 through 5.3.13 does not initialize a certain variable, which allows remote attackers to obtain sensitive information from process memory by providing zero bytes of input data.)

Vino information leakage
Published:27.01.2013
Source:
SecurityVulns ID:12849
Type:remote
Threat Level:
6/10
Description:It's possible to access clipboard content without authentication.
Affected:VINO : Vino 3.4
CVE:CVE-2012-4429 (Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900.)
Original documentdocumentUBUNTU, [USN-1701-1] Vino vulnerability (27.01.2013)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod