Computer Security
[EN] securityvulns.ru no-pyccku


GNU enscript buffer overflow
Published:29.10.2008
Source:
SecurityVulns ID:9389
Type:local
Threat Level:
5/10
Description:Buffer overflow on text file conversion.
Affected:GNU : enscript 1.6
CVE:CVE-2008-3863 (Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.)
Original documentdocumentSECUNIA, Secunia Research: GNU Enscript "setfilename" Special Escape Buffer Overflow (29.10.2008)

Wireshark sniffer multiple security vulnerabilities
Published:29.10.2008
Source:
SecurityVulns ID:9391
Type:remote
Threat Level:
5/10
Description:Multiple DoS conditions on different protocols parsing.
Affected:WIRESHARK : Wireshark 1.0
CVE:CVE-2008-4685 (Use-after-free vulnerability in the dissect_q931_cause_ie function in packet-q931.c in the Q.931 dissector in Wireshark 0.10.3 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via certain packets that trigger an exception.)
 CVE-2008-4684 (packet-frame in Wireshark 0.99.2 through 1.0.3 does not properly handle exceptions thrown by post dissectors, which allows remote attackers to cause a denial of service (application crash) via a certain series of packets, as demonstrated by enabling the (1) PRP or (2) MATE post dissector.)
 CVE-2008-4683 (The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a packet with an invalid length, related to an erroneous tvb_memcpy call.)
 CVE-2008-4682 (wtap.c in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application abort) via a malformed Tamos CommView capture file (aka .ncf file) with an "unknown/unexpected packet type" that triggers a failed assertion.)
 CVE-2008-4681 (Unspecified vulnerability in the Bluetooth RFCOMM dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via unknown packets.)
 CVE-2008-4680 (packet-usb.c in the USB dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a malformed USB Request Block (URB).)
Original documentdocumentMANDRIVA, [ MDVSA-2008:215 ] wireshark (29.10.2008)

Microsoft Internet Explorer address bar spoofing
Published:29.10.2008
Source:
SecurityVulns ID:9392
Type:client
Threat Level:
3/10
Description:There are few methods of address bar spoofing.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
Original documentdocumentAmit Klein, Writeup by Amit Klein (Trusteer): Address Bar Spoofing for IE6 (29.10.2008)

Altiris Deployment Server Agent privilege escalation
Published:29.10.2008
Source:
SecurityVulns ID:9394
Type:local
Threat Level:
5/10
Description:multiple shatter-attacks.
Original documentdocumentBrett Moore, Insomnia : ISVA-081020.1 - Altiris Deployment Server Agent - Privilege Escalation (29.10.2008)

Trend Micro OfficeScan buffer overflow
updated since 15.09.2008
Published:29.10.2008
Source:
SecurityVulns ID:9290
Type:remote
Threat Level:
5/10
Description:Buffer overflow in cgiRecvFile.exe Web component.
Affected:TM : OfficeScan 7.3
CVE:CVE-2008-3862 (Stack-based buffer overflow in CGI programs in the server in Trend Micro OfficeScan 7.3 Patch 4 build 1367 and other builds before 1374, and 8.0 SP1 Patch 1 before build 3110, allows remote attackers to execute arbitrary code via an HTTP POST request containing crafted form data, related to "parsing CGI requests.")
 CVE-2008-2437 (Stack-based buffer overflow in cgiRecvFile.exe in Trend Micro OfficeScan 7.3 patch 4 build 1362 and other builds, OfficeScan 8.0 and 8.0 SP1, and Client Server Messaging Security 3.6 allows remote attackers to execute arbitrary code via an HTTP request containing a long ComputerName parameter.)
Original documentdocumentSECUNIA, Secunia Research: Trend Micro OfficeScan CGI Parsing Buffer Overflows (29.10.2008)
 documentSECUNIA, Secunia Research: Trend Micro OfficeScan "cgiRecvFile.exe" Buffer Overflow (15.09.2008)

EATON MGE Office Protection Systems Network Shutdown Module unauthorized access
Published:29.10.2008
Source:
SecurityVulns ID:9393
Type:remote
Threat Level:
6/10
Description:Authentication bypass and code execution.
Affected:EATON : MGE Network Shutdown Module 3.10
Original documentdocumentsecurity_(at)_nruns.com, n.runs-SA-2008.009 - Eaton MGE OPS Network Shutdown Module - authentication bypass vulnerability and remote code execution (29.10.2008)

lynx code execution
Published:29.10.2008
Source:
SecurityVulns ID:9390
Type:client
Threat Level:
6/10
Description:It's possible to execute code in Advanced Mode by redirecting to lynxcgi: URI.
Affected:LYNX : lynx 2.8
CVE:CVE-2008-4690 (lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929. NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler.)
Original documentdocumentMANDRIVA, [ MDVSA-2008:218 ] lynx (29.10.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod