Computer Security
[EN] securityvulns.ru no-pyccku


Sony Playstation 3 flood DoS
Published:27.03.2007
Source:
SecurityVulns ID:7476
Type:remote
Threat Level:
5/10
Description:UDP datagrams flood DoS with enabled remote play feature.
Affected:SONY : PlayStation 3
CVE:CVE-2007-1728 (The Remote Play feature in Sony Playstation 3 (PS3) 1.60 and Playstation Portable (PSP) 3.10 OE-A allows remote attackers to cause a denial of service via a flood of UDP packets.)
Files:Playstation 3 "Remote Play" Remote DoS Exploit

Linux kernel DCCP information leak
Published:27.03.2007
Source:
SecurityVulns ID:7478
Type:local
Threat Level:
6/10
Description:Integer overflow in getsockopt for SOL_DCCP gives ability to read content of kernel memory.
Affected:LINUX : kernel 2.6
CVE:CVE-2007-1734 (The DCCP support in the do_dccp_getsockopt function in net/dccp/proto.c in Linux kernel 2.6.20 and later does not verify the upper bounds of the optlen value, which allows local users running on certain architectures to read kernel memory or cause a denial of service (oops), a related issue to CVE-2007-1730.)
 CVE-2007-1730 (Integer signedness error in the DCCP support in the do_dccp_getsockopt function in net/dccp/proto.c in Linux kernel 2.6.20 and later allows local users to read kernel memory or cause a denial of service (oops) via a negative optlen value.)
Original documentdocumentRobert Święcki, [Full-disclosure] Linux Kernel DCCP Memory Disclosure Vulnerability (27.03.2007)
Files:Exploits Linux Kernel DCCP Memory Disclosure Vulnerability

PHP PECL functions buffer overflows
Published:27.03.2007
Source:
SecurityVulns ID:7475
Type:library
Threat Level:
5/10
Description:Buffer overflow in confirm_phpdoc_compiled() function.
Affected:PHP : PHP 5.2
CVE:CVE-2007-1709 (Buffer overflow in the confirm_phpdoc_compiled function in the phpDOC extension (PECL phpDOC) in PHP 5.2.1 allows context-dependent attackers to execute arbitrary code via a long argument string.)
Original documentdocumentretrog_(at)_alice.it, PHP 5.2.1 with PECL phpDOC local buffer overflow (27.03.2007)
Files:PHP 5.2.1 with PECL phpDOC confirm_phpdoc_compiled() local buffer overflow poc exploit

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:27.03.2007
Source:
SecurityVulns ID:7474
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:XOOPS : xoops 2.0
 WORDPRESS : WordPress 2.1
 CCCONUNTER : CcCounter 2.0
 HORDE : Horde 1.0
 CYPHERSTRUST : Ironmail 6.1
CVE:CVE-2007-1769 (** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-1873. Reason: This candidate is a duplicate of CVE-2007-1873. Notes: All CVE users should reference CVE-2007-1873 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.)
 CVE-2007-1768 (Cross-site scripting (XSS) vulnerability in app/helpers/application_helper.rb in Mephisto 0.7.3 and Mephisto Edge 20070325 allows remote attackers to inject arbitrary web script or HTML via the author name field in a comment.)
 CVE-2007-1723 (Multiple cross-site scripting (XSS) vulnerabilities in the administration console in Secure Computing CipherTrust IronMail 6.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) network, (2) defRouterIp, (3) hostName, (4) domainName, (5) ipAddress, (6) defaultRouter, (7) dns1, or (8) dns2 parameter to (a) admin/system_IronMail.do; the (9) ipAddress parameter to (b) admin/systemOutOfBand.do; the (10) password or (11) confirmPassword parameter to (c) admin/systemBackup.do; the (12) Klicense parameter to (d) admin/systemLicenseManager.do; the (13) rows[1].attrValueStr or (14) rows[2].attrValueStr parameter to (e) admin/systemWebAdminConfig.do; the (15) rows[0].attrValueStr, rows[1].attrValueStr, (16) rows[2].attrValue, or (17) rows[2].attrValueStrClone parameter to (f) admin/ldap_ConfigureServiceProperties.do; the (18) input1 parameter to (g) admin/mailFirewall_MailRoutingInternal.do; or the (19) rows[2].attrValueStr, (20) rows[3].attrValueStr, (21) rows[5].attrValueStr, or (22) rows[6])
 CVE-2007-1714 (Cross-site scripting (XSS) vulnerability in index.php in CcCounter 2.0 allows remote attackers to inject arbitrary web script or HTML via dir parameter.)
 CVE-2007-1679 (** DISPUTED ** Multiple cross-site scripting (XSS) vulnerabilities in Horde Groupware Webmail 1.0 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors in (1) imp/search.php and (2) ingo/rule.php. NOTE: this issue has been disputed by the vendor, noting that the search.php issue was resolved in CVE-2006-4255, and attackers can only use rule.php to inject XSS into their own pages.)
Original documentdocumentUniquE_(at)_UniquE-Key.Org, Xoops All Version -Articles- Print.PHP (ID) Blind SQL Injection Exploit And PoC (27.03.2007)
 documentJavier Olascoaga, Multiple XSS in IronMail (27.03.2007)
 documentstormhacker_(at)_hotmail.com, Satel Lite for PhpNuke (Satellite.php) <= Local File Inclusion (27.03.2007)
 documentCrYpTiC MauleR, Fizzle : Firefox Extension Vulnerability (27.03.2007)
 documentSergey Tikhonov, Mephisto blog is vulnerable to XSS (27.03.2007)
 documentHackers Center Security Group, Horde Webmail Multiple HTML Injection vulnerability (27.03.2007)
 documentlj_(at)_subjectzero.net, Path Disclosure - Wordpress 2.1.2 (27.03.2007)
 documentCrackers_Child, CcCounter 2.0 cross-site scripting vulnerability (27.03.2007)
Files:Xoops All Version -Articles- Print.PHP (ID) Blind SQL Injection Exploit

SingKorea ActiveX buffer overflow
Published:27.03.2007
Source:
SecurityVulns ID:7477
Type:client
Threat Level:
5/10
Description:Buffer overflow in DownloadCertificateExt() method.
CVE:CVE-2007-1722 (Buffer overflow in the DownloadCertificateExt function in SignKorea SKCommAX ActiveX control module 7.2.0.2 and 3280 6.6.0.1 allows remote attackers to execute arbitrary code via a long pszUserID argument.)
Original documentdocumentAlex Park, [Full-disclosure] SignKorea's ActiveX Buffer Overflow Vulnerability (27.03.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod