Computer Security
[EN] securityvulns.ru no-pyccku


Apache multiple security vulnerabilities
Published:28.07.2014
Source:
SecurityVulns ID:13888
Type:remote
Threat Level:
7/10
Description:mod_status buffer overflow, mod_proxy, mod_deflate, mod_cgid DoS.
Affected:APACHE : Apache 2.4
CVE:CVE-2014-0231 (The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.)
 CVE-2014-0226 (Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.)
 CVE-2014-0118 (The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.)
 CVE-2014-0117 (The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.)
Original documentdocumentUBUNTU, [USN-2299-1] Apache HTTP Server vulnerabilities (28.07.2014)

Videolan vlc multiple security vulnerabilities
Published:28.07.2014
Source:
SecurityVulns ID:13889
Type:library
Threat Level:
6/10
Description:Buffer overflows on different video formats parsing.
Affected:VIDEOLAN : vlc 2.0
CVE:CVE-2013-4388 (Buffer overflow in the mp4a packetizer (modules/packetizer/mpeg4audio.c) in VideoLAN VLC Media Player before 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.)
 CVE-2013-1954 (The ASF Demuxer (modules/demux/asf/asf.c) in VideoLAN VLC media player 2.0.5 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ASF movie that triggers an out-of-bounds read.)
 CVE-2013-1868 (Multiple buffer overflows in VideoLAN VLC media player 2.0.4 and earlier allow remote attackers to cause a denial of service (crash) and execute arbitrary code via vectors related to the (1) freetype renderer and (2) HTML subtitle parser.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2973-1] vlc security update (28.07.2014)

CUPS unauthorized files access
updated since 22.07.2014
Published:28.07.2014
Source:
SecurityVulns ID:13879
Type:local
Threat Level:
5/10
Description:Unauthorized access to RSS files
Affected:CUPS : cups 1.7
CVE:CVE-2014-5031 (The web interface in CUPS before 2.0 does not check that files have world-readable permissions, which allows remote attackers to obtains sensitive information via unspecified vectors.)
 CVE-2014-5030 (CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.)
 CVE-2014-5029 (The web interface in CUPS 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/ and language[0] set to null. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3537.)
 CVE-2014-3537 (The web interface in CUPS before 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2990-1] cups security update (28.07.2014)
 documentUBUNTU, [USN-2293-1] CUPS vulnerability (22.07.2014)

Mozilla Firefox / Thunderbird / Seamonkey multiple security vulnerabilities
Published:28.07.2014
Source:
SecurityVulns ID:13890
Type:client
Threat Level:
8/10
Description:Multiple memory corruptions and buffer overflows.
Affected:MOZILLA : Firefox 30
 MOZILLA : Firefox ESR 24.6
 MOZILLA : Thunderbird 24.6
CVE:CVE-2014-1561 (Mozilla Firefox before 31.0 does not properly restrict use of drag-and-drop events to spoof customization events, which allows remote attackers to alter the placement of UI icons via crafted JavaScript code that is encountered during (1) page, (2) panel, or (3) toolbar customization.)
 CVE-2014-1560 (Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use ASCII character encoding in a required context.)
 CVE-2014-1559 (Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use UTF-8 character encoding in a required context, a different vulnerability than CVE-2014-1558.)
 CVE-2014-1558 (Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use UTF-8 character encoding in a required context, a different vulnerability than CVE-2014-1559.)
 CVE-2014-1557 (The ConvolveHorizontally function in Skia, as used in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, does not properly handle the discarding of image data during function execution, which allows remote attackers to execute arbitrary code by triggering prolonged image scaling, as demonstrated by scaling of a high-quality image.)
 CVE-2014-1556 (Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to execute arbitrary code via crafted WebGL content constructed with the Cesium JavaScript library.)
 CVE-2014-1555 (Use-after-free vulnerability in the nsDocLoader::OnProgress function in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allows remote attackers to execute arbitrary code via vectors that trigger a FireOnStateChange event.)
 CVE-2014-1554 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2014-1552 (Mozilla Firefox before 31.0 and Thunderbird before 31.0 do not properly implement the sandbox attribute of the IFRAME element, which allows remote attackers to bypass intended restrictions on same-origin content via a crafted web site in conjunction with a redirect.)
 CVE-2014-1551 (Use-after-free vulnerability in the FontTableRec destructor in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 on Windows allows remote attackers to execute arbitrary code via crafted use of fonts in MathML content, leading to improper handling of a DirectWrite font-face object.)
 CVE-2014-1550 (Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering.)
 CVE-2014-1549 (The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via crafted audio content that is improperly handled during playback buffering.)
 CVE-2014-1548 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2014-1547 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
Files:MFSA 2014-56 Miscellaneous memory safety hazards (rv:31.0 / rv:24.7)
 MFSA 2014-57 Buffer overflow during Web Audio buffering for playback
 MFSA 2014-58 Use-after-free in Web Audio due to incorrect control message ordering
 MFSA 2014-59 Use-after-free in DirectWrite font handling
 MFSA 2014-60 Toolbar dialog customization event spoofing
 MFSA 2014-61 Use-after-free with FireOnStateChange event
 MFSA 2014-62 Exploitable WebGL crash with Cesium JavaScript library
 MFSA 2014-63 Use-after-free while when manipulating certificates in the trusted cache
 MFSA 2014-64 Crash in Skia library when scaling high quality images
 MFSA 2014-65 Certificate parsing broken by non-standard character encoding
 MFSA 2014-66 IFRAME sandbox same-origin access through redirect

Barracuda Networks Firewall / Web Firewall / Spam&Virus Firewall security vulnerabilities
updated since 28.07.2014
Published:26.08.2014
Source:
SecurityVulns ID:13887
Type:remote
Threat Level:
5/10
Description:XSS, restrictions bypass.
Affected:BARRACUDANETWORK : Barracuda Networks Firewall 6.1
 BARRACUDANETWORK : Web Firewall 610
 BARRACUDANETWORK : Spam & Virus Firewall 600
 BARRACUDANETWORK : Barracuda Networks Web Security Flex 4.1
CVE:CVE-2014-2595
Original documentdocumentVulnerability Lab, Barracuda Networks Web Security Flex v4.1 - Persistent Vulnerabilities (BNSEC-699) (26.08.2014)
 documentadvisories_(at)_portcullis-security.com, CVE-2014-2595 - Authentication Bypass in Barracuda Web Application Firewall (11.08.2014)
 documentVulnerability Lab, Barracuda Networks Web Application Firewall v6.1.5 & LoadBalancer v4.2.2 #37 - Filter Bypass & Multiple Vulnerabilities (04.08.2014)
 documentVulnerability Lab, Barracuda Networks Spam&Virus Firewall v5.1.3 - Client Side Cross Site Vulnerability (28.07.2014)
 documentVulnerability Lab, Barracuda Networks Spam&Virus Firewall v6.0.2 (600 & Vx) - Client Side Cross Site Vulnerability (28.07.2014)
 documentVulnerability Lab, Barracuda Networks #35 Web Firewall 610 v6.0.1 - Filter Bypass & Persistent Vulnerability (28.07.2014)
 documentVulnerability Lab, Barracuda Networks Firewall 6.1.2 #36 - Filter Bypass & Exception Handling Vulnerability + PoC Video BNSEC-2398 (28.07.2014)
 documentVulnerability Lab, Barracuda Networks Firewall 6.1.5 - Filter Bypass & Persistent Vulnerabilities (28.07.2014)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod