Computer Security
[EN] securityvulns.ru no-pyccku


OpenSSL multiple security vulnerabilities
Published:29.05.2008
Source:
SecurityVulns ID:9028
Type:remote
Threat Level:
6/10
Description:NULL pointer dereference, memory corruption on TLS certificate exchange.
Affected:OPENSSL : OpenSSL 0.9
Original documentdocumentCERT-FI, CERT-FI Vulnerability Advisory on OpenSSL (29.05.2008)

Linux multiple security vulnerabilities
Published:29.05.2008
Source:
SecurityVulns ID:9029
Type:remote
Threat Level:
5/10
Description:Memory leak in IPv6 over IPv4 tunnels, mmap DoS on the SPARC architecture, DoS on amd64 architecture, DoS with hrtimer integer overflow on 64bit architectures.
Affected:LINUX : kernel 2.6
CVE:CVE-2008-2137 (The (1) sparc_mmap_check function in arch/sparc/kernel/sys_sparc.c and the (2) sparc64_mmap_check function in arch/sparc64/kernel/sys_sparc.c, in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3, omit some virtual-address range (aka span) checks when the mmap MAP_FIXED bit is not set, which allows local users to cause a denial of service (panic) via unspecified mmap calls.)
 CVE-2008-2136 (Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel before 2.6.25.3 allows remote attackers to cause a denial of service (memory consumption) via network traffic to a Simple Internet Transition (SIT) tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count.)
 CVE-2008-1615 (Linux kernel 2.6.18, and possibly other versions, when running on AMD64 architectures, allows local users to cause a denial of service (crash) via certain ptrace calls.)
 CVE-2007-6712 (Integer overflow in the hrtimer_forward function (hrtimer.c) in Linux kernel 2.6.21-rc4, when running on 64-bit systems, allows local users to cause a denial of service (infinite loop) via a timer with a large expiry value, which causes the timer to always be expired.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 1588-1] New Linux 2.6.18 packages fix several vulnerabilities (29.05.2008)

emacs code execution
Published:29.05.2008
Source:
SecurityVulns ID:9030
Type:local
Threat Level:
5/10
Description:LISP macro execution is possible.
Affected:EMACS : Emacs 21
CVE:CVE-2008-2142 (Emacs 21 and XEmacs automatically load and execute .flc (fast lock) files that are associated with other files are edited within Emacs, which allows user-assisted attackers to execute arbitrary code.)
Original documentdocumentRPATH, rPSA-2008-0177-1 emacs emacs-leim (29.05.2008)

Samba buffer overflow
Published:29.05.2008
Source:
SecurityVulns ID:9031
Type:client
Threat Level:
6/10
Description:Buffer overflow in receive_smb_raw() SMB client code.
Affected:SAMBA : Samba 3.0
CVE:CVE-2008-1105
Original documentdocumentSECUNIA, Secunia Research: Samba "receive_smb_raw()" Buffer Overflow Vulnerability (29.05.2008)
 documentSAMBA, [SAMBA] CVE-2008-1105 - Boundary failure when parsing SMB responses (29.05.2008)

EMC AlphaStor multiple security vulnerabilities
Published:29.05.2008
Source:
SecurityVulns ID:9032
Type:remote
Threat Level:
6/10
Description:Library Manager (TCP/3500) code execution, Server Agent (TCP/41025) multiple buffer overflows.
Affected:EMC : AlphaStor 3.1
CVE:CVE-2008-2158
 CVE-2008-2158
 CVE-2008-2157
 CVE-2008-2157
Original documentdocumentIDEFENSE, iDefense Security Advisory 05.27.08: EMC AlphaStor Server Agent Multiple Stack Buffer Overflow Vulnerabilities (29.05.2008)
 documentIDEFENSE, iDefense Security Advisory 05.27.08: EMC AlphaStor Library Manager Arbitrary Command Execution Vulnerability (29.05.2008)

Motorola RAZR cell phones buffer overflow
Published:29.05.2008
Source:
SecurityVulns ID:9033
Type:remote
Threat Level:
6/10
Description:Buffer overflow on JPEG images processing.
Affected:MOTOROLA : Motorola RAZR
Original documentdocumentZDI, ZDI-08-033: Motorola RAZR JPG Processing Stack Overflow Vulnerability (29.05.2008)

CA Internet Security Suite ActiveX unauthorized files access
Published:29.05.2008
Source:
SecurityVulns ID:9034
Type:client
Threat Level:
5/10
Description:SaveToFile method allows system files corruption.
Affected:CA : CA Internet Security Suite 2008
Original documentdocumentipsdix_(at)_gmail.com, [NSG_28-5-08] CA Internet Security Suite 2008 (UmxEventCli.dll/SaveToFile()) remote file corruption poc (29.05.2008)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:29.05.2008
Source:
SecurityVulns ID:9036
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:DVBBS : Dvbbs 8.2
 FLASHBLOG : FlashBlog 0.31
Original documentdocumentMarvin Simkin, Calcium web calendar: Reflected XSS (29.05.2008)
 documentmefisto_(at)_hackermail.com, FlashBlog Remote File Upload Vulnerability (29.05.2008)
 documenthackerb_(at)_hotmail.com, dvbbs8.2(access/sql)version login.asp remote sql injection (29.05.2008)
 documentHER0, Flash Blog Sql Injection (29.05.2008)

imlib2 library buffer overflow
updated since 29.05.2008
Published:29.05.2008
Source:
SecurityVulns ID:9037
Type:library
Threat Level:
6/10
Description:Buffer overflow on PNM and XPM files parsing in load() function.
CVE:CVE-2008-5187 (The load function in the XPM loader for imlib2 1.4.2, and possibly other versions, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XPM file that triggers a "pointer arithmetic error" and a heap-based buffer overflow, a different vulnerability than CVE-2008-2426.)
 CVE-2008-2426 (Multiple stack-based buffer overflows in Imlib 2 (aka imlib2) 1.4.0 allow user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via (1) a PNM image with a crafted header, related to the load function in src/modules/loaders/loader_pnm.c; or (2) a crafted XPM image, related to the load function in src/modules/loader_xpm.c.)
Original documentdocumentUBUNTU, [Full-disclosure] [USN-683-1] Imlib2 vulnerability (02.12.2008)
 documentSECUNIA, Secunia Research: imlib2 PNM and XPM Buffer Overflow (29.05.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod