Computer Security
[EN] securityvulns.ru no-pyccku


cups-filters limitations bypass
Published:31.08.2015
Source:
SecurityVulns ID:14666
Type:remote
Threat Level:
5/10
Description:Local printers may be accessible via external interfaces.
CVE:CVE-2015-6520 (IPPUSBXD before 1.22 listens on all interfaces, which allows remote attackers to obtain access to USB connected printers via a direct request.)
Original documentdocumentUBUNTU, [USN-2725-1] cups-filters vulnerability (31.08.2015)

PHP security vulnerabilities
Published:31.08.2015
Source:
SecurityVulns ID:14667
Type:library
Threat Level:
5/10
Description:DoS and buffer overflow on PHAR files processing.
Affected:PHP : PHP 5.6
CVE:CVE-2015-5590 (Stack-based buffer overflow in the phar_fix_filepath function in ext/phar/phar.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large length value, as demonstrated by mishandling of an e-mail attachment by the imap PHP extension.)
 CVE-2015-5589
Original documentdocumentDEBIAN, [SECURITY] [DSA 3344-1] php5 security update (31.08.2015)

Mozilla Firefox / Thunderbird / Seamonkey / Firefox OS multiple security vulnerabilities
updated since 10.08.2015
Published:31.08.2015
Source:
SecurityVulns ID:14623
Type:client
Threat Level:
8/10
Description:Restrictions bypass, memory corruptions.
Affected:MOZILLA : Firefox OS 2.1
 MOZILLA : Firefox ESR 38.1
 MOZILLA : Thunderbird 38.1
 MOZILLA : Firefox before 39.0
CVE:CVE-2015-4498 (The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process.)
 CVE-2015-4497 (Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token sequences for a CANVAS element.)
 CVE-2015-4496 (Multiple integer overflows in libstagefright in Mozilla Firefox before 38.0 allow remote attackers to execute arbitrary code via crafted sample metadata in an MPEG-4 video file, a related issue to CVE-2015-1538.)
 CVE-2015-4495 (The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.)
 CVE-2015-4494 (Mozilla Firefox OS before 2.2 does not require the wifi-manage privilege for reading a Wi-Fi system message, which allows attackers to obtain potentially sensitive information via a crafted app.)
 CVE-2015-4493 (Heap-based buffer overflow in the stagefright::ESDS::parseESDescriptor function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via an invalid size field in an esds chunk in MPEG-4 video data, a related issue to CVE-2015-1539.)
 CVE-2015-4492 (Use-after-free vulnerability in the XMLHttpRequest::Open implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 might allow remote attackers to execute arbitrary code via a SharedWorker object that makes recursive calls to the open method of an XMLHttpRequest object.)
 CVE-2015-4491 (Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.)
 CVE-2015-4490 (The nsCSPHostSrc::permits function in dom/security/nsCSPUtils.cpp in Mozilla Firefox before 40.0 does not implement the Content Security Policy Level 2 exceptions for the blob, data, and filesystem URL schemes during wildcard source-expression matching, which might make it easier for remote attackers to conduct cross-site scripting (XSS) attacks by leveraging unexpected policy-enforcement behavior.)
 CVE-2015-4489 (The nsTArray_Impl class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging a self assignment.)
 CVE-2015-4488 (Use-after-free vulnerability in the StyleAnimationValue class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 allows remote attackers to have an unspecified impact by leveraging a StyleAnimationValue::operator self assignment.)
 CVE-2015-4487 (The nsTSubstring::ReplacePrep function in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, related to an "overflow.")
 CVE-2015-4486 (The decrease_ref_count function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via malformed WebM video data.)
 CVE-2015-4485 (Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.)
 CVE-2015-4484 (The js::jit::AssemblerX86Shared::lock_addl function in the JavaScript implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to cause a denial of service (application crash) by leveraging the use of shared memory and accessing (1) an Atomics object or (2) a SharedArrayBuffer object.)
 CVE-2015-4483 (Mozilla Firefox before 40.0 allows man-in-the-middle attackers to bypass a mixed-content protection mechanism via a feed: URL in a POST request.)
 CVE-2015-4482 (mar_read.c in the Updater in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows local users to gain privileges or cause a denial of service (out-of-bounds write) via a crafted name of a Mozilla Archive (aka MAR) file.)
 CVE-2015-4481 (Race condition in the Mozilla Maintenance Service in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Windows allows local users to write to arbitrary files and consequently gain privileges via vectors involving a hard link to a log file during an update.)
 CVE-2015-4480 (Integer overflow in the stagefright::SampleTable::isValid function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via crafted MPEG-4 video data with H.264 encoding.)
 CVE-2015-4479 (Multiple integer overflows in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to execute arbitrary code via a crafted saio chunk in MPEG-4 video data.)
 CVE-2015-4478 (Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 do not impose certain ECMAScript 6 requirements on JavaScript object properties, which allows remote attackers to bypass the Same Origin Policy via the reviver parameter to the JSON.parse method.)
 CVE-2015-4477 (Use-after-free vulnerability in the MediaStream playback feature in Mozilla Firefox before 40.0 allows remote attackers to execute arbitrary code via unspecified use of the Web Audio API.)
 CVE-2015-4475 (The mozilla::AudioSink function in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 mishandles inconsistent sample formats within MP3 audio data, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a malformed file.)
 CVE-2015-4474 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2015-4473 (Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.)
 CVE-2015-2745 (Multiple cross-site scripting (XSS) vulnerabilities in the Search app in Gaia in Mozilla Firefox OS before 2.2 allow remote attackers to inject arbitrary HTML via the (1) name or (2) title field in card content associated with a search link that is mishandled after a HOME button press or a Show Windows action, as demonstrated by embedding an arbitrary application or spoofing the account-creation page.)
 CVE-2015-2744 (Cross-site scripting (XSS) vulnerability in the Search app in Gaia in Mozilla Firefox OS before 2.2 allows remote attackers to inject arbitrary HTML via a crafted search link that is mishandled after re-opening the browser or opening the tab view.)
Files: Mozilla Foundation Security Advisory 2015-72 Remote HTML tag injection in Gaia Search app
  Mozilla Foundation Security Advisory 2015-73 Remote HTML tag injection in Gaia System app
  Mozilla Foundation Security Advisory 2015-74 UMS (USB) mounting after reboot even without unlocking
  Mozilla Foundation Security Advisory 2015-75 COPPA error screen in FxAccounts signup allows loading arbitrary web content into B2G root process
  Mozilla Foundation Security Advisory 2015-76 Wifi direct system messages don't require a permission
  Mozilla Foundation Security Advisory 2015-77 Upper bound check bypass due to signed compare in SharedBufferManagerParent::RecvAllocateGrallocBuffer
  Mozilla Foundation Security Advisory 2015-78 Same origin violation and local file stealing via PDF reader
 Mozilla Foundation Security Advisory 2015-79 Miscellaneous memory safety hazards (rv:40.0 / rv:38.2)
 Mozilla Foundation Security Advisory 2015-80 Out-of-bounds read with malformed MP3 file
 Mozilla Foundation Security Advisory 2015-81 Use-after-free in MediaStream playback
 Mozilla Foundation Security Advisory 2015-82 Redefinition of non-configurable JavaScript object properties
 Mozilla Foundation Security Advisory 2015-83 Overflow issues in libstagefright
  Mozilla Foundation Security Advisory 2015-84 Arbitrary file overwriting through Mozilla Maintenance Service with hard links
 Mozilla Foundation Security Advisory 2015-85 Out-of-bounds write with Updater and malicious MAR file
 Mozilla Foundation Security Advisory 2015-86 Feed protocol with POST bypasses mixed content protections
  Mozilla Foundation Security Advisory 2015-87 Crash when using shared memory in JavaScript
  Mozilla Foundation Security Advisory 2015-88 Heap overflow in gdk-pixbuf when scaling bitmap images
 Mozilla Foundation Security Advisory 2015-89 Buffer overflows on Libvpx when decoding WebM video
 Mozilla Foundation Security Advisory 2015-90 Vulnerabilities found through code inspection
 Mozilla Foundation Security Advisory 2015-91 Mozilla Content Security Policy allows for asterisk wildcards in violation of CSP specification
 Mozilla Foundation Security Advisory 2015-92 Use-after-free in XMLHttpRequest with shared workers
 Mozilla Foundation Security Advisory 2015-93 Integer overflows in libstagefright while processing MP4 video metadata
  Mozilla Foundation Security Advisory 2015-94 Use-after-free when resizing canvas element during restyling
  Mozilla Foundation Security Advisory 2015-95 Add-on notification bypass through data URLs

libvirt / qemu multiple security vulnerabilities
updated since 03.08.2015
Published:31.08.2015
Source:
SecurityVulns ID:14620
Type:library
Threat Level:
6/10
Description:Multiple memory corruptions.
Affected:QEMU : qemu 2.2
CVE:CVE-2015-5745
 CVE-2015-5225 (Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface.)
 CVE-2015-5166 (Use-after-free vulnerability in QEMU in Xen 4.5.x and earlier does not completely unplug emulated block devices, which allows local HVM guest users to gain privileges by unplugging a block device twice.)
 CVE-2015-5165 (The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.)
 CVE-2015-5158
 CVE-2015-5154 (Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.)
 CVE-2015-3214 (The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.)
Original documentdocumentUBUNTU, [USN-2724-1] QEMU vulnerabilities (31.08.2015)
 documentUBUNTU, [USN-2692-1] QEMU vulnerabilities (03.08.2015)

FreeBSD privilege escalation
Published:31.08.2015
Source:
SecurityVulns ID:14668
Type:local
Threat Level:
6/10
Description:Privilege escalation because of imcomplete context switching on exception handling.
Affected:FREEBSD : FreeBSD 10.1
 FREEBSD : FreeBSD 9.3
CVE:CVE-2015-5675
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-15:21.amd64 (31.08.2015)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod