6913 lines
243 KiB
XML
6913 lines
243 KiB
XML
|
<vuln vid="751823d4-f189-11de-9344-00248c9b4be7">
|
||
|
<topic>drupal -- multiple cross-site scripting</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>drupal5</name>
|
||
|
<range><lt>5.21</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>drupal6</name>
|
||
|
<range><lt>6.15</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Drupal Team reports:</p>
|
||
|
<blockquote cite="http://drupal.org/node/661586">
|
||
|
<p>The Contact module does not correctly handle certain user input
|
||
|
when displaying category information. Users privileged to create
|
||
|
contact categories can insert arbitrary HTML and script code into the
|
||
|
contact module administration page. Such a cross-site scripting attack
|
||
|
may lead to the malicious user gaining administrative access.</p>
|
||
|
<p>The Menu module does not correctly handle certain user input when
|
||
|
displaying the menu administration overview. Users privileged to
|
||
|
create new menus can insert arbitrary HTML and script code into the
|
||
|
menu module administration page. Such a cross-site scripting attack
|
||
|
may lead to the malicious user gaining administrative access.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-4370</cvename>
|
||
|
<url>http://drupal.org/node/661586</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-12-16</discovery>
|
||
|
<entry>2009-12-25</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="4d6076fe-ee7a-11de-9cd0-001a926c7637">
|
||
|
<topic>fuser -- missing user's privileges check</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>fuser</name>
|
||
|
<range><lt>1142334561_2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Denis Barov reports:</p>
|
||
|
<blockquote>
|
||
|
<p>sysutils/fuser allows user to send any signal to any process when
|
||
|
installed with suid bit.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<freebsdpr>ports/141852</freebsdpr>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-09-15</discovery>
|
||
|
<entry>2009-12-21</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="4465c897-ee5c-11de-b6ef-00215c6a37bb">
|
||
|
<topic>monkey -- improper input validation vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>monkey</name>
|
||
|
<range><lt>0.9.3</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Census Labs reports:</p>
|
||
|
<blockquote cite="http://census-labs.com/news/2009/12/14/monkey-httpd/">
|
||
|
<p>We have discovered a remotely exploitable
|
||
|
"improper input validation" vulnerability in the Monkey
|
||
|
web server that allows an attacker to perform denial of
|
||
|
service attacks by repeatedly crashing worker threads
|
||
|
that process HTTP requests.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://census-labs.com/news/2009/12/14/monkey-httpd/</url>
|
||
|
<url>http://groups.google.com/group/monkeyd/browse_thread/thread/055b4e9b83973861/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-12-14</discovery>
|
||
|
<entry>2009-12-21</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="39a25a63-eb5c-11de-b650-00215c6a37bb">
|
||
|
<topic>php -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>php5</name>
|
||
|
<range><lt>5.2.12</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>PHP developers reports:</p>
|
||
|
<blockquote cite="http://www.php.net/releases/5_2_12.php">
|
||
|
<p>This release focuses on improving the stability of the
|
||
|
PHP 5.2.x branch with over 60 bug fixes, some of which
|
||
|
are security related. All users of PHP 5.2 are encouraged
|
||
|
to upgrade to this release.</p>
|
||
|
<p>Security Enhancements and Fixes in PHP 5.2.12:</p>
|
||
|
<ul>
|
||
|
<li>Fixed a safe_mode bypass in tempnam() identified by
|
||
|
Grzegorz Stachowiak. (CVE-2009-3557, Rasmus)</li>
|
||
|
<li>Fixed a open_basedir bypass in posix_mkfifo()
|
||
|
identified by Grzegorz Stachowiak. (CVE-2009-3558, Rasmus)</li>
|
||
|
<li>Added "max_file_uploads" INI directive, which can
|
||
|
be set to limit the number of file uploads per-request
|
||
|
to 20 by default, to prevent possible DOS via temporary
|
||
|
file exhaustion, identified by Bogdan Calin.
|
||
|
(CVE-2009-4017, Ilia)</li>
|
||
|
<li>Added protection for $_SESSION from interrupt
|
||
|
corruption and improved "session.save_path" check,
|
||
|
identified by Stefan Esser. (CVE-2009-4143, Stas)</li>
|
||
|
<li>Fixed bug #49785 (insufficient input string
|
||
|
validation of htmlspecialchars()). (CVE-2009-4142,
|
||
|
Moriyoshi, hello at iwamot dot com)</li>
|
||
|
</ul>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3557</cvename>
|
||
|
<cvename>CVE-2009-3558</cvename>
|
||
|
<cvename>CVE-2009-4017</cvename>
|
||
|
<cvename>CVE-2009-4142</cvename>
|
||
|
<cvename>CVE-2009-4143</cvename>
|
||
|
<url>http://www.php.net/releases/5_2_12.php</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-12-17</discovery>
|
||
|
<entry>2009-12-17</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="e7bc5600-eaa0-11de-bd9c-00215c6a37bb">
|
||
|
<topic>postgresql -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>postgresql-client</name>
|
||
|
<name>postgresql-server</name>
|
||
|
<range><ge>7.4</ge><lt>7.4.27</lt></range>
|
||
|
<range><ge>8.0</ge><lt>8.0.23</lt></range>
|
||
|
<range><ge>8.1</ge><lt>8.1.19</lt></range>
|
||
|
<range><ge>8.2</ge><lt>8.2.15</lt></range>
|
||
|
<range><ge>8.3</ge><lt>8.3.9</lt></range>
|
||
|
<range><ge>8.4</ge><lt>8.4.2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>PostgreSQL project reports:</p>
|
||
|
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4034">
|
||
|
<p>PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23,
|
||
|
8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9,
|
||
|
and 8.4.x before 8.4.2 does not properly handle a '\0' character
|
||
|
in a domain name in the subject's Common Name (CN) field of an
|
||
|
X.509 certificate, which (1) allows man-in-the-middle attackers
|
||
|
to spoof arbitrary SSL-based PostgreSQL servers via a crafted
|
||
|
server certificate issued by a legitimate Certification Authority,
|
||
|
and (2) allows remote attackers to bypass intended client-hostname
|
||
|
restrictions via a crafted client certificate issued by a legitimate
|
||
|
Certification Authority, a related issue to CVE-2009-2408.</p>
|
||
|
</blockquote>
|
||
|
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4136">
|
||
|
<p>PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23,
|
||
|
8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9,
|
||
|
and 8.4.x before 8.4.2 does not properly manage session-local
|
||
|
state during execution of an index function by a database
|
||
|
superuser, which allows remote authenticated users to gain
|
||
|
privileges via a table with crafted index functions, as
|
||
|
demonstrated by functions that modify (1) search_path or
|
||
|
(2) a prepared statement, a related issue to CVE-2007-6600
|
||
|
and CVE-2009-3230.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-4034</cvename>
|
||
|
<cvename>CVE-2009-4136</cvename>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-11-20</discovery>
|
||
|
<entry>2009-12-17</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="5486669e-ea9f-11de-bd9c-00215c6a37bb">
|
||
|
<topic>tptest -- pwd Remote Stack Buffer Overflow</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>tptest</name>
|
||
|
<range><gt>0</gt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SecurityFocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/33785">
|
||
|
<p>TPTEST is prone to a remote stack-based buffer-overflow
|
||
|
vulnerability. An attacker can exploit this issue to
|
||
|
execute arbitrary code within the context of the affected
|
||
|
application. Failed exploit attempts will result in a
|
||
|
denial-of-service condition.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>33785</bid>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-16</discovery>
|
||
|
<entry>2009-12-17</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="01c57d20-ea26-11de-bd39-00248c9b4be7">
|
||
|
<topic>mozilla -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>firefox</name>
|
||
|
<range><gt>3.5.*,1</gt><lt>3.5.6,1</lt></range>
|
||
|
<range><gt>3.*,1</gt><lt>3.0.16,1</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>linux-firefox</name>
|
||
|
<range><lt>3.0.16,1</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>seamonkey</name>
|
||
|
<name>linux-seamonkey</name>
|
||
|
<range><lt>2.0.1</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>thunderbird</name>
|
||
|
<range><ge>3.0</ge><lt>3.0.1</lt></range>
|
||
|
</package>
|
||
|
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Mozilla Project reports:</p>
|
||
|
<blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
|
||
|
<p>MFSA 2009-71 GeckoActiveXObject exception messages can be used to
|
||
|
enumerate installed COM objects</p>
|
||
|
<p>MFSA 2009-70 Privilege escalation via chrome window.opener</p>
|
||
|
<p>MFSA 2009-69 Location bar spoofing vulnerabilities</p>
|
||
|
<p>MFSA 2009-68 NTLM reflection vulnerability</p>
|
||
|
<p>MFSA 2009-67 Integer overflow, crash in libtheora video
|
||
|
library</p>
|
||
|
<p>MFSA 2009-66 Memory safety fixes in liboggplay media library</p>
|
||
|
<p>MFSA 2009-65 Crashes with evidence of memory corruption (rv:1.9.1.6/
|
||
|
1.9.0.16)</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3388</cvename>
|
||
|
<cvename>CVE-2009-3389</cvename>
|
||
|
<cvename>CVE-2009-3979</cvename>
|
||
|
<cvename>CVE-2009-3980</cvename>
|
||
|
<cvename>CVE-2009-3981</cvename>
|
||
|
<cvename>CVE-2009-3982</cvename>
|
||
|
<cvename>CVE-2009-3983</cvename>
|
||
|
<cvename>CVE-2009-3984</cvename>
|
||
|
<cvename>CVE-2009-3985</cvename>
|
||
|
<cvename>CVE-2009-3986</cvename>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-71.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-70.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-69.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-68.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-67.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-66.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-65.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-12-16</discovery>
|
||
|
<entry>2009-12-16</entry>
|
||
|
<modified>2010-01-21</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="1b3f854b-e4bd-11de-b276-000d8787e1be">
|
||
|
<topic>freeradius -- remote packet of death vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>freeradius</name>
|
||
|
<range><lt>1.1.8</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>freeRADIUS Vulnerability Notifications reports:</p>
|
||
|
<blockquote cite="http://freeradius.org/security.html">
|
||
|
<p>2009.09.09 v1.1.7 - Anyone who can send packets to
|
||
|
the server can crash it by sending a Tunnel-Password
|
||
|
attribute in an Access-Request packet. This
|
||
|
vulnerability is not otherwise exploitable. We have
|
||
|
released 1.1.8 to correct this vulnerability.</p>
|
||
|
<p>This issue is similar to the previous Tunnel-Password
|
||
|
issue noted below. The vulnerable versions are 1.1.3
|
||
|
through 1.1.7. Version 2.x is not affected.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3111</cvename>
|
||
|
<url>http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3111</url>
|
||
|
<url>http://freeradius.org/security.html</url>
|
||
|
<url>http://www.milw0rm.com/exploits/9642</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-09-09</discovery>
|
||
|
<entry>2009-12-14</entry>
|
||
|
<modified>2009-12-14</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="bec38383-e6cb-11de-bdd4-000c2930e89b">
|
||
|
<topic>pligg -- Cross-Site Scripting and Cross-Site Request Forgery</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>pligg</name>
|
||
|
<range><lt>1.0.3b</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/37349">
|
||
|
<p>Russ McRee has discovered some vulnerabilities in Pligg, which can
|
||
|
be exploited by malicious people to conduct cross-site scripting and
|
||
|
request forgery attacks.</p>
|
||
|
<p>Input passed via the "Referer" HTTP header to various scripts (e.g.
|
||
|
admin/admin_config.php, admin/admin_modules.php, delete.php, editlink.php,
|
||
|
submit.php, submit_groups.php, user_add_remove_links.php, and
|
||
|
user_settings.php) is not properly sanitised before being returned to
|
||
|
the user. This can be exploited to execute arbitrary HTML and script
|
||
|
code in a user's browser session in context of an affected site.</p>
|
||
|
<p>The application allows users to perform certain actions via HTTP
|
||
|
requests without performing any validity checks to verify the requests.
|
||
|
This can be exploited to e.g. create an arbitrary user with administrative
|
||
|
privileges if a logged-in administrative user visits a malicious web
|
||
|
site.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-4786</cvename>
|
||
|
<cvename>CVE-2009-4787</cvename>
|
||
|
<cvename>CVE-2009-4788</cvename>
|
||
|
<url>http://secunia.com/advisories/37349/</url>
|
||
|
<url>http://www.pligg.com/blog/775/pligg-cms-1-0-3-release/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-12-02</discovery>
|
||
|
<entry>2009-12-12</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="fcbf56dd-e667-11de-920a-00248c9b4be7">
|
||
|
<topic>piwik -- php code execution</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>piwik</name>
|
||
|
<range><lt>0.5.1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/37649">
|
||
|
<p>Stefan Esser has reported a vulnerability in Piwik, which can be
|
||
|
exploited by malicious people to compromise a vulnerable system.</p>
|
||
|
<p>The vulnerability is caused due to the core/Cookie.php script using
|
||
|
"unserialize()" with user controlled input. This can be exploited to
|
||
|
e.g. execute arbitrary PHP code via the "__wakeup()" or "__destruct()"
|
||
|
methods of a serialized object passed via an HTTP cookie.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-4137</cvename>
|
||
|
<url>http://secunia.com/advisories/37649/</url>
|
||
|
<url>http://www.sektioneins.de/de/advisories/advisory-032009-piwik-cookie-unserialize-vulnerability/index.html</url>
|
||
|
<url>http://piwik.org/blog/2009/12/piwik-response-to-shocking-news-in-php-exploitation/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-12-10</discovery>
|
||
|
<entry>2009-12-11</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="30211c45-e52a-11de-b5cd-00e0815b8da8">
|
||
|
<topic>dovecot -- Insecure directory permissions</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>dovecot</name>
|
||
|
<range><ge>1.2.*</ge><lt>1.2.8</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Dovecot author reports:</p>
|
||
|
<blockquote cite="http://www.dovecot.org/list/dovecot-news/2009-November/000143.html">
|
||
|
<p>Dovecot v1.2.x had been creating base_dir (and its parents if
|
||
|
necessary) with 0777 permissions. The base_dir's permissions get
|
||
|
changed to 0755 automatically at startup, but you may need to
|
||
|
chmod the parent directories manually.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3897</cvename>
|
||
|
<bid>37084</bid>
|
||
|
<url>http://secunia.com/advisories/37443</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-11-20</discovery>
|
||
|
<entry>2009-12-10</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="3c1a672e-e508-11de-9f4a-001b2134ef46">
|
||
|
<topic>linux-flashplugin -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>linux-flashplugin</name>
|
||
|
<range><lt>9.0r260</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>linux-f8-flashplugin</name>
|
||
|
<name>linux-f10-flashplugin</name>
|
||
|
<range><lt>10.0r42</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Adobe Product Security Incident Response Team reports:</p>
|
||
|
<blockquote cite="http://www.adobe.com/support/security/bulletins/apsb09-19.html">
|
||
|
<p>Critical vulnerabilities have been identified in Adobe
|
||
|
Flash Player version 10.0.32.18 and earlier. These
|
||
|
vulnerabilities could cause the application to crash and
|
||
|
could potentially allow an attacker to take control of the
|
||
|
affected system.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3794</cvename>
|
||
|
<cvename>CVE-2009-3796</cvename>
|
||
|
<cvename>CVE-2009-3797</cvename>
|
||
|
<cvename>CVE-2009-3798</cvename>
|
||
|
<cvename>CVE-2009-3799</cvename>
|
||
|
<cvename>CVE-2009-3800</cvename>
|
||
|
<cvename>CVE-2009-3951</cvename>
|
||
|
<url>http://www.zerodayinitiative.com/advisories/ZDI-09-092/</url>
|
||
|
<url>http://www.zerodayinitiative.com/advisories/ZDI-09-093/</url>
|
||
|
<url>http://www.adobe.com/support/security/bulletins/apsb09-19.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-07-14</discovery>
|
||
|
<entry>2009-12-09</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="eab8c3bd-e50c-11de-9cd0-001a926c7637">
|
||
|
<topic>ruby -- heap overflow vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>ruby</name>
|
||
|
<range><ge>1.9.1,1</ge><lt>1.9.1.376,1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>The official ruby site reports:</p>
|
||
|
<blockquote cite="http://www.ruby-lang.org/en/news/2009/12/07/heap-overflow-in-string/">
|
||
|
<p>There is a heap overflow vulnerability in String#ljust,
|
||
|
String#center and String#rjust. This has allowed an attacker to run
|
||
|
arbitrary code in some rare cases.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-4124</cvename>
|
||
|
<url>http://www.ruby-lang.org/en/news/2009/12/07/heap-overflow-in-string/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-11-30</discovery>
|
||
|
<entry>2009-12-09</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="714c1406-e4cf-11de-883a-003048590f9e">
|
||
|
<topic>rt -- Session fixation vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>rt</name>
|
||
|
<range><lt>3.8.6</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/37546">
|
||
|
<p>A vulnerability has been reported in RT, which can be exploited by
|
||
|
malicious people to conduct session fixation attacks.
|
||
|
The vulnerability is caused due to an error in the handling of
|
||
|
sessions and can be exploited to hijack another user's session by
|
||
|
tricking the user into logging in after following a specially crafted
|
||
|
link.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>37162</bid>
|
||
|
<cvename>CVE-2009-3585</cvename>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-12-01</discovery>
|
||
|
<entry>2009-12-09</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="5f030587-e39a-11de-881e-001aa0166822">
|
||
|
<topic>expat2 -- Parser crash with specially formatted UTF-8 sequences</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>expat2</name>
|
||
|
<name>linux-f10-expat</name>
|
||
|
<range><lt>2.0.1_1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>CVE reports:</p>
|
||
|
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720">
|
||
|
<p>The updatePosition function in lib/xmltok_impl.c in
|
||
|
libexpat in Expat 2.0.1, as used in Python, PyXML,
|
||
|
w3c-libwww, and other software, allows context-dependent
|
||
|
attackers to cause a denial of service (application crash)
|
||
|
via an XML document with crafted UTF-8 sequences that
|
||
|
trigger a buffer over-read.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3720</cvename>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-01-17</discovery>
|
||
|
<entry>2009-12-08</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="e9fca207-e399-11de-881e-001aa0166822">
|
||
|
<topic>expat2 -- buffer over-read and crash</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>expat2</name>
|
||
|
<range><lt>2.0.1_1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>CVE reports:</p>
|
||
|
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560">
|
||
|
<p>The big2_toUtf8 function in lib/xmltok.c in libexpat in
|
||
|
Expat 2.0.1, as used in the XML-Twig module for Perl, allows
|
||
|
context-dependent attackers to cause a denial of service
|
||
|
(application crash) via an XML document with malformed UTF-8
|
||
|
sequences that trigger a buffer over-read, related to the
|
||
|
doProlog function in lib/xmlparse.c.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3560</cvename>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-10-05</discovery>
|
||
|
<entry>2009-12-08</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="6431c4db-deb4-11de-9078-0030843d3802">
|
||
|
<topic>opera -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>opera</name>
|
||
|
<range><lt>10.10.20091120</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>linux-opera</name>
|
||
|
<range><lt>10.10</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Opera Team reports:</p>
|
||
|
<blockquote cite="http://www.opera.com/docs/changelogs/unix/1010/">
|
||
|
<ul>
|
||
|
<li>Fixed a heap buffer overflow in string to number conversion</li>
|
||
|
<li>Fixed an issue where error messages could leak onto unrelated
|
||
|
sites</li>
|
||
|
<li>Fixed a moderately severe issue, as reported by Chris Evans of
|
||
|
the Google Security Team; details will be disclosed at a later
|
||
|
date.</li>
|
||
|
</ul>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0689</cvename>
|
||
|
<cvename>CVE-2009-4071</cvename>
|
||
|
<url>http://www.opera.com/support/kb/view/941/</url>
|
||
|
<url>http://www.opera.com/support/kb/view/942/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-11-23</discovery>
|
||
|
<entry>2009-12-01</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="77c14729-dc5e-11de-92ae-02e0184b8d35">
|
||
|
<topic>libtool -- Library Search Path Privilege Escalation Issue</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>libtool</name>
|
||
|
<range><lt>2.2.6b</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia.com</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/37414/">
|
||
|
<p>Do not attempt to load an unqualified module.la file from the
|
||
|
current directory (by default) since doing so is insecure and is
|
||
|
not compliant with the documentation.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3736</cvename>
|
||
|
<url>http://secunia.com/advisories/37414/</url>
|
||
|
<url>http://lists.gnu.org/archive/html/libtool/2009-11/msg00059.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-11-25</discovery>
|
||
|
<entry>2009-11-28</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="94edff42-d93d-11de-a434-0211d880e350">
|
||
|
<topic>libvorbis -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>libvorbis</name>
|
||
|
<range><lt>1.2.3_1,3</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>The Ubuntu security team reports:</p>
|
||
|
<blockquote cite="http://www.ubuntu.com/usn/usn-861-1">
|
||
|
<p>It was discovered that libvorbis did not correctly
|
||
|
handle certain malformed vorbis files. If a user were
|
||
|
tricked into opening a specially crafted vorbis file
|
||
|
with an application that uses libvorbis, an attacker
|
||
|
could cause a denial of service or possibly execute
|
||
|
arbitrary code with the user's privileges.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-1420</cvename>
|
||
|
<cvename>CVE-2009-3379</cvename>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-11-24</discovery>
|
||
|
<entry>2009-11-24</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="92ca92c1-d859-11de-89f9-001517351c22">
|
||
|
<topic>bugzilla -- information leak</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>bugzilla</name>
|
||
|
<range><gt>3.3.1</gt><lt>3.4.4</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>A Bugzilla Security Advisory reports:</p>
|
||
|
<blockquote cite="http://www.bugzilla.org/security/3.4.3/">
|
||
|
<p>When a bug is in a group, none of its information
|
||
|
(other than its status and resolution) should be visible
|
||
|
to users outside that group. It was discovered that
|
||
|
as of 3.3.2, Bugzilla was showing the alias of the bug
|
||
|
(a very short string used as a shortcut for looking up
|
||
|
the bug) to users outside of the group, if the protected
|
||
|
bug ended up in the "Depends On" or "Blocks" list of any
|
||
|
other bug.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3386</cvename>
|
||
|
<url>http://www.bugzilla.org/security/3.4.3/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-11-18</discovery>
|
||
|
<entry>2009-11-23</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="04104985-d846-11de-84e4-00215af774f0">
|
||
|
<topic>cacti -- cross-site scripting issues</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>cacti</name>
|
||
|
<range><lt>0.8.7e4</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>The cacti development team reports:</p>
|
||
|
<blockquote cite="http://docs.cacti.net/#cross-site_scripting_fixes">
|
||
|
<p>The Cross-Site Scripting patch has been posted.</p>
|
||
|
<p>This patch addresses cross-site scripting issues reported
|
||
|
by Moritz Naumann.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-4032</cvename>
|
||
|
<url>http://docs.cacti.net/#cross-site_scripting_fixes</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-11-21</discovery>
|
||
|
<entry>2009-11-23</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="0640198a-d117-11de-b667-0030843d3802">
|
||
|
<topic>wordpress -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>wordpress</name>
|
||
|
<range><lt>2.8.6,1</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>de-wordpress</name>
|
||
|
<range><lt>2.8.6</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/37332/">
|
||
|
<p>The security issue is caused due to the wp_check_filetype()
|
||
|
function in /wp-includes/functions.php improperly validating uploaded
|
||
|
files. This can be exploited to execute arbitrary PHP code by
|
||
|
uploading a malicious PHP script with multiple extensions.</p>
|
||
|
<p>Successful exploitation of this vulnerability requires that Apache
|
||
|
is not configured to handle the mime-type for media files with an e.g.
|
||
|
"gif", "jpg", "png", "tif", "wmv" extension.</p>
|
||
|
<p>Input passed via certain parameters to press-this.php is not
|
||
|
properly sanitised before being displayed to the user. This can be
|
||
|
exploited to insert arbitrary HTML and script code, which will be
|
||
|
executed in a user's browser session in context of an affected site
|
||
|
when the malicious data is being viewed.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3890</cvename>
|
||
|
<cvename>CVE-2009-3891</cvename>
|
||
|
<url>http://wordpress.org/development/2009/11/wordpress-2-8-6-security-release/</url>
|
||
|
<url>http://secunia.com/advisories/37332/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-11-12</discovery>
|
||
|
<entry>2009-11-14</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="68bda678-caab-11de-a97e-be89dfd1042e">
|
||
|
<topic>p5-HTML-Parser -- denial of service</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>p5-HTML-Parser</name>
|
||
|
<range><lt>3.63</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>CVE reports:</p>
|
||
|
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3627">
|
||
|
<p>The decode_entities function in util.c in HTML-Parser before
|
||
|
3.63 allows context-dependent attackers to cause a denial of service
|
||
|
(infinite loop) via an incomplete SGML numeric character reference,
|
||
|
which triggers generation of an invalid UTF-8 character.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>36807</bid>
|
||
|
<cvename>CVE-2009-3627</cvename>
|
||
|
<url>http://secunia.com/advisories/37155</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-10-23</discovery>
|
||
|
<entry>2009-11-06</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="4e8344a3-ca52-11de-8ee8-00215c6a37bb">
|
||
|
<topic>gd -- '_gdGetColors' remote buffer overflow vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>gd</name>
|
||
|
<range><lt>2.0.35_2,1</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>php5-gd</name>
|
||
|
<range><lt>5.2.11_2</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>php4-gd</name>
|
||
|
<range><lt>4.4.9_4</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>CVE reports:</p>
|
||
|
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546">
|
||
|
<p>The _gdGetColors function in gd_gd.c in PHP 5.2.11 and
|
||
|
5.3.0, and the GD Graphics Library 2.x, does not properly
|
||
|
verify a certain colorsTotal structure member, which might
|
||
|
allow remote attackers to conduct buffer overflow or buffer
|
||
|
over-read attacks via a crafted GD file, a different
|
||
|
vulnerability than CVE-2009-3293.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>36712</bid>
|
||
|
<cvename>CVE-2009-3546</cvename>
|
||
|
<url>http://secunia.com/advisories/37069</url>
|
||
|
<url>http://secunia.com/advisories/37080</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-10-15</discovery>
|
||
|
<entry>2009-11-05</entry>
|
||
|
<modified>2010-06-17</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="6693bad2-ca50-11de-8ee8-00215c6a37bb">
|
||
|
<topic>typo3 -- multiple vulnerabilities in TYPO3 Core</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>typo3</name>
|
||
|
<range><lt>4.2.10</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>TYPO3 develop team reports:</p>
|
||
|
<blockquote cite="http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-016/">
|
||
|
<p>Affected versions: TYPO3 versions 4.0.13 and below, 4.1.12
|
||
|
and below, 4.2.9 and below, 4.3.0beta1 and below.</p>
|
||
|
<p>SQL injection, Cross-site scripting (XSS), Information
|
||
|
disclosure, Frame hijacking, Remote shell command execution
|
||
|
and Insecure Install Tool authentication/session handling.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>36801</bid>
|
||
|
<cvename>CVE-2009-3628</cvename>
|
||
|
<cvename>CVE-2009-3629</cvename>
|
||
|
<cvename>CVE-2009-3630</cvename>
|
||
|
<cvename>CVE-2009-3631</cvename>
|
||
|
<cvename>CVE-2009-3632</cvename>
|
||
|
<cvename>CVE-2009-3633</cvename>
|
||
|
<cvename>CVE-2009-3634</cvename>
|
||
|
<cvename>CVE-2009-3635</cvename>
|
||
|
<cvename>CVE-2009-3636</cvename>
|
||
|
<url>http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-016/</url>
|
||
|
<url>http://secunia.com/advisories/37122/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-10-22</discovery>
|
||
|
<entry>2009-11-05</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="3149ab1c-c8b9-11de-b87b-0011098ad87f">
|
||
|
<topic>vlc -- stack overflow in MPA, AVI and ASF demuxer</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>vlc</name>
|
||
|
<range><ge>0.5.0</ge><lt>1.0.2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>VideoLAN reports:</p>
|
||
|
<blockquote cite="http://www.videolan.org/security/sa0901.html">
|
||
|
<p>When parsing a MP4, ASF or AVI file with an overly deep box
|
||
|
structure, a stack overflow might occur. It would overwrite the
|
||
|
return address and thus redirect the execution flow.</p>
|
||
|
<p>If successful, a malicious third party could trigger execution
|
||
|
of arbitrary code within the context of the VLC media player.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://www.videolan.org/security/sa0901.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-09-14</discovery>
|
||
|
<entry>2009-11-03</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="6f358f5a-c7ea-11de-a9f3-0030843d3802">
|
||
|
<topic>KDE -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>kdebase-runtime</name>
|
||
|
<range><ge>4.0.*</ge><lt>4.3.1_2</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>kdelibs</name>
|
||
|
<range><ge>4.0.*</ge><lt>4.3.1_5</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>oCERT reports:</p>
|
||
|
<blockquote cite="http://www.ocert.org/advisories/ocert-2009-015.html">
|
||
|
<p>Ark input sanitization errors: The KDE archiving tool, Ark,
|
||
|
performs insufficient validation which leads to specially crafted
|
||
|
archive files, using unknown MIME types, to be rendered using a KHTML
|
||
|
instance, this can trigger uncontrolled XMLHTTPRequests to remote
|
||
|
sites.</p>
|
||
|
<p>IO Slaves input sanitization errors: KDE protocol handlers perform
|
||
|
insufficient input validation, an attacker can craft malicious URI
|
||
|
that would trigger JavaScript execution. Additionally the 'help://'
|
||
|
protocol handler suffer from directory traversal. It should be noted
|
||
|
that the scope of this issue is limited as the malicious URIs cannot
|
||
|
be embedded in Internet hosted content.</p>
|
||
|
<p>KMail input sanitization errors: The KDE mail client, KMail, performs
|
||
|
insufficient validation which leads to specially crafted email
|
||
|
attachments, using unknown MIME types, to be rendered using a KHTML
|
||
|
instance, this can trigger uncontrolled XMLHTTPRequests to remote
|
||
|
sites.</p>
|
||
|
<p>The exploitation of these vulnerabilities is unlikely according to
|
||
|
Portcullis and KDE but the execution of active content is nonetheless
|
||
|
unexpected and might pose a threat.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://www.ocert.org/advisories/ocert-2009-015.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-10-30</discovery>
|
||
|
<entry>2009-11-02</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="2fda6bd2-c53c-11de-b157-001999392805">
|
||
|
<topic>opera -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>opera</name>
|
||
|
<range><lt>10.01.20091019</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>linux-opera</name>
|
||
|
<range><lt>10.01</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Opera Team Reports:</p>
|
||
|
<blockquote cite="http://www.opera.com/docs/changelogs/unix/1001/">
|
||
|
<ul>
|
||
|
<li>Fixed an issue where certain domain names could allow execution
|
||
|
of arbitrary code, as reported by Chris Weber of Casaba Security</li>
|
||
|
<li>Fixed an issue where scripts can run on the feed subscription
|
||
|
page, as reported by Inferno</li>
|
||
|
</ul>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3831</cvename>
|
||
|
<url>http://www.opera.com/support/kb/view/938/</url>
|
||
|
<url>http://www.opera.com/support/kb/view/939/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-10-28</discovery>
|
||
|
<entry>2009-10-31</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="83d7d149-b965-11de-a515-0022156e8794">
|
||
|
<topic>Enhanced cTorrent -- stack-based overflow</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>ctorrent</name>
|
||
|
<range><lt>3.3.2_2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Securityfocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/34584">
|
||
|
<p>cTorrent and dTorrent are prone to a remote buffer-overflow
|
||
|
vulnerability because the software fails to properly
|
||
|
bounds-check user-supplied input before copying it to an
|
||
|
insufficiently sized memory buffer.</p>
|
||
|
<p>Successful exploits allow remote attackers to execute
|
||
|
arbitrary machine code in the context of a vulnerable
|
||
|
application. Failed exploit attempts will likely result in
|
||
|
denial-of-service conditions.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>34584</bid>
|
||
|
<cvename>CVE-2009-1759</cvename>
|
||
|
<url>http://sourceforge.net/tracker/?func=detail&aid=2782875&group_id=202532&atid=981959</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-10-15</discovery>
|
||
|
<entry>2009-10-28</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="c87aa2d2-c3c4-11de-ab08-000f20797ede">
|
||
|
<topic>mozilla -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>firefox</name>
|
||
|
<range><gt>3.5.*,1</gt><lt>3.5.4,1</lt></range>
|
||
|
<range><gt>3.*,1</gt><lt>3.0.15,1</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>linux-firefox</name>
|
||
|
<range><lt>3.0.15</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>seamonkey</name>
|
||
|
<name>linux-seamonkey</name>
|
||
|
<range><lt>2.0</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Mozilla Foundation reports:</p>
|
||
|
<blockquote cite="http://www.mozilla.org/security/announce/">
|
||
|
<p>MFSA 2009-64 Crashes with evidence of memory
|
||
|
corruption (rv:1.9.1.4/ 1.9.0.15)</p>
|
||
|
<p>MFSA 2009-63 Upgrade media libraries to fix memory
|
||
|
safety bugs</p>
|
||
|
<p>MFSA 2009-62 Download filename spoofing with RTL
|
||
|
override</p>
|
||
|
<p>MFSA 2009-61 Cross-origin data theft through
|
||
|
document.getSelection()</p>
|
||
|
<p>MFSA 2009-59 Heap buffer overflow in string to
|
||
|
number conversion</p>
|
||
|
<p>MFSA 2009-57 Chrome privilege escalation in
|
||
|
XPCVariant::VariantDataToJS()</p>
|
||
|
<p>MFSA 2009-56 Heap buffer overflow in GIF color map
|
||
|
parser</p>
|
||
|
<p>MFSA 2009-55 Crash in proxy auto-configuration
|
||
|
regexp parsing</p>
|
||
|
<p>MFSA 2009-54 Crash with recursive web-worker calls</p>
|
||
|
<p>MFSA 2009-53 Local downloaded file tampering</p>
|
||
|
<p>MFSA 2009-52 Form history vulnerable to stealing</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3380</cvename>
|
||
|
<cvename>CVE-2009-3381</cvename>
|
||
|
<cvename>CVE-2009-3382</cvename>
|
||
|
<cvename>CVE-2009-3383</cvename>
|
||
|
<cvename>CVE-2009-3379</cvename>
|
||
|
<cvename>CVE-2009-3378</cvename>
|
||
|
<cvename>CVE-2009-3377</cvename>
|
||
|
<cvename>CVE-2009-3376</cvename>
|
||
|
<cvename>CVE-2009-3375</cvename>
|
||
|
<cvename>CVE-2009-1563</cvename>
|
||
|
<cvename>CVE-2009-3374</cvename>
|
||
|
<cvename>CVE-2009-3373</cvename>
|
||
|
<cvename>CVE-2009-3372</cvename>
|
||
|
<cvename>CVE-2009-3371</cvename>
|
||
|
<cvename>CVE-2009-3274</cvename>
|
||
|
<cvename>CVE-2009-3370</cvename>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-64.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-63.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-62.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-61.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-59.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-57.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-56.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-55.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-54.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-53.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-52.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-10-27</discovery>
|
||
|
<entry>2009-10-28</entry>
|
||
|
<modified>2009-12-14</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="2544f543-c178-11de-b175-001cc0377035">
|
||
|
<topic>elinks -- buffer overflow vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>elinks</name>
|
||
|
<range><lt>0.11.4</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SecurityFocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/36574/discuss">
|
||
|
<p>ELinks is prone to an off-by-one buffer-overflow vulnerability
|
||
|
because the application fails to accurately reference the last
|
||
|
element of a buffer.</p>
|
||
|
<p>Attackers may leverage this issue to execute arbitrary code in
|
||
|
the context of the application. Failed attacks will cause
|
||
|
denial-of-service conditions.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>36574</bid>
|
||
|
<cvename>CVE-2008-7224</cvename>
|
||
|
<mlist msgid="20080204235429.GA28006@diku.dk">http://linuxfromscratch.org/pipermail/elinks-users/2008-February/001604.html</mlist>
|
||
|
<url>http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=380347</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2006-07-29</discovery>
|
||
|
<entry>2009-10-25</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="692ab645-bf5d-11de-849b-00151797c2d4">
|
||
|
<topic>squidGuard -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>squidGuard</name>
|
||
|
<range><lt>1.4_2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SquidGuard website reports:</p>
|
||
|
<blockquote cite="http://www.squidguard.org/Downloads/Patches/1.4/Readme.Patch-20091015">
|
||
|
<p>Patch 20091015 fixes one buffer overflow problem
|
||
|
in sgLog.c when overlong URLs are requested.
|
||
|
SquidGuard will then go into emergency mode were
|
||
|
no blocking occurs. This is not required in this
|
||
|
situation.</p>
|
||
|
</blockquote>
|
||
|
<blockquote cite="http://www.squidguard.org/Downloads/Patches/1.4/Readme.Patch-20091019">
|
||
|
<p>Patch 20091019 fixes two bypass problems with URLs
|
||
|
which length is close to the limit defined by MAX_BUF
|
||
|
(default: 4096) in squidGuard and MAX_URL (default:
|
||
|
4096 in squid 2.x and 8192 in squid 3.x) in squid.
|
||
|
For this kind of URLs the proxy request exceeds MAX_BUF
|
||
|
causing squidGuard to complain about not being able to
|
||
|
parse the squid request. Increasing the buffer limit
|
||
|
to be higher than the one defined in MAX_URL solves the
|
||
|
issue.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3700</cvename>
|
||
|
<cvename>CVE-2009-3826</cvename>
|
||
|
<url>http://www.squidguard.org/Downloads/Patches/1.4/Readme.Patch-20091015</url>
|
||
|
<url>http://www.squidguard.org/Downloads/Patches/1.4/Readme.Patch-20091019</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-10-15</discovery>
|
||
|
<entry>2009-10-22</entry>
|
||
|
<modified>2010-05-06</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="8581189c-bd5f-11de-8709-0017a4cccfc6">
|
||
|
<topic>Xpdf -- Multiple Vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>xpdf</name>
|
||
|
<range><lt>3.02_11</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SecurityFocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/archive/1/507261">
|
||
|
<p>Some vulnerabilities have been reported in Xpdf, which can be
|
||
|
exploited by malicious people to potentially compromise a user's
|
||
|
system.</p>
|
||
|
<p>1) Multiple integer overflows in "SplashBitmap::SplashBitmap()"
|
||
|
can be exploited to cause heap-based buffer overflows.</p>
|
||
|
<p>2) An integer overflow error in "ObjectStream::ObjectStream()"
|
||
|
can be exploited to cause a heap-based buffer overflow.</p>
|
||
|
<p>3) Multiple integer overflows in "Splash::drawImage()" can be
|
||
|
exploited to cause heap-based buffer overflows.</p>
|
||
|
<p>4) An integer overflow error in "PSOutputDev::doImageL1Sep()"
|
||
|
can be exploited to cause a heap-based buffer overflow when
|
||
|
converting a PDF document to a PS file.</p>
|
||
|
<p>Successful exploitation of the vulnerabilities may allow execution
|
||
|
of arbitrary code by tricking a user into opening a specially crafted
|
||
|
PDF file.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://www.securityfocus.com/archive/1/507261</url>
|
||
|
<url>http://secunia.com/advisories/37053/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-10-14</discovery>
|
||
|
<entry>2009-10-20</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="87917d6f-ba76-11de-bac2-001a4d563a0f">
|
||
|
<topic>django -- denial-of-service attack</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>py23-django</name>
|
||
|
<name>py24-django</name>
|
||
|
<name>py25-django</name>
|
||
|
<name>py26-django</name>
|
||
|
<name>py30-django</name>
|
||
|
<name>py31-django</name>
|
||
|
<range><lt>1.1.1</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>py23-django-devel</name>
|
||
|
<name>py24-django-devel</name>
|
||
|
<name>py25-django-devel</name>
|
||
|
<name>py26-django-devel</name>
|
||
|
<name>py30-django-devel</name>
|
||
|
<name>py31-django-devel</name>
|
||
|
<range><lt>11603,1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Django project reports:</p>
|
||
|
<blockquote cite="http://www.djangoproject.com/weblog/2009/oct/09/security/">
|
||
|
<p>Django's forms library includes field types which perform
|
||
|
regular-expression-based validation of email addresses and
|
||
|
URLs. Certain addresses/URLs could trigger a pathological
|
||
|
performance case in these regular expression, resulting in
|
||
|
the server process/thread becoming unresponsive, and consuming
|
||
|
excessive CPU over an extended period of time. If deliberately
|
||
|
triggered, this could result in an effectively
|
||
|
denial-of-service attack.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3695</cvename>
|
||
|
<url>http://www.djangoproject.com/weblog/2009/oct/09/security/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-10-09</discovery>
|
||
|
<entry>2009-10-16</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="4769914e-b844-11de-b159-0030843d3802">
|
||
|
<topic>phpmyadmin -- XSS and SQL injection vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>phpMyAdmin</name>
|
||
|
<range><lt>3.2.2.1</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>phpMyAdmin211</name>
|
||
|
<range><lt>2.11.9.6</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>phpMyAdmin Team reports:</p>
|
||
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2009-6.php">
|
||
|
<p>Cross-site scripting (XSS) vulnerability allows remote attackers to
|
||
|
inject arbitrary web script or HTML via a crafted MySQL table name.</p>
|
||
|
<p>SQL injection vulnerability allows remote attackers to inject SQL via
|
||
|
various interface parameters of the PDF schema generator feature.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3696</cvename>
|
||
|
<cvename>CVE-2009-3697</cvename>
|
||
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2009-6.php</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-10-13</discovery>
|
||
|
<entry>2009-10-13</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="437a68cf-b752-11de-b6eb-00e0815b8da8">
|
||
|
<topic>php5 -- Multiple security issues</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>php5</name>
|
||
|
<range><lt>5.2.11</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Vendor reports</p>
|
||
|
<blockquote cite="http://www.php.net/releases/5_2_11.php">
|
||
|
<p>Security Enhancements and Fixes in PHP 5.2.11:
|
||
|
Fixed certificate validation inside
|
||
|
php_openssl_apply_verification_policy.
|
||
|
Fixed sanity check for the color index in imagecolortransparent.
|
||
|
Added missing sanity checks around exif processing.
|
||
|
Fixed bug 44683 popen crashes when an invalid mode is passed.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://www.php.net/releases/5_2_11.php</url>
|
||
|
<cvename>CVE-2009-3291</cvename>
|
||
|
<cvename>CVE-2009-3292</cvename>
|
||
|
<cvename>CVE-2009-3293</cvename>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-09-17</discovery>
|
||
|
<entry>2009-10-12</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="ebeed063-b328-11de-b6a5-0030843d3802">
|
||
|
<topic>virtualbox -- privilege escalation</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>virtualbox</name>
|
||
|
<range><lt>3.0.51.r22902_2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Sun reports:</p>
|
||
|
<blockquote cite="http://sunsolve.sun.com/search/document.do?assetkey=1-66-268188-1">
|
||
|
<p>A security vulnerability in the VBoxNetAdpCtl configuration tool
|
||
|
for certain Sun VirtualBox 3.0 packages may allow local unprivileged
|
||
|
users who are authorized to run VirtualBox to execute arbitrary
|
||
|
commands with root privileges.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3692</cvename>
|
||
|
<url>http://sunsolve.sun.com/search/document.do?assetkey=1-66-268188-1</url>
|
||
|
<url>http://secunia.com/advisories/36929</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-10-07</discovery>
|
||
|
<entry>2009-10-07</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="50383bde-b25b-11de-8c83-02e0185f8d72">
|
||
|
<topic>FreeBSD -- Devfs / VFS NULL pointer race condition</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>FreeBSD</name>
|
||
|
<range><ge>6.3</ge><lt>6.3_13</lt></range>
|
||
|
<range><ge>6.4</ge><lt>6.4_7</lt></range>
|
||
|
<range><ge>7.1</ge><lt>7.1_8</lt></range>
|
||
|
<range><ge>7.2</ge><lt>7.2_4</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<h1>Problem Description:</h1>
|
||
|
<p>Due to the interaction between devfs and VFS, a race condition
|
||
|
exists where the kernel might dereference a NULL pointer.</p>
|
||
|
<h1>Impact:</h1>
|
||
|
<p>Successful exploitation of the race condition can lead to local
|
||
|
kernel privilege escalation, kernel data corruption and/or
|
||
|
crash.</p>
|
||
|
<p>To exploit this vulnerability, an attacker must be able to run
|
||
|
code with user privileges on the target system.</p>
|
||
|
<h1>Workaround:</h1>
|
||
|
<p>An errata note, FreeBSD-EN-09:05.null has been released
|
||
|
simultaneously to this advisory, and contains a kernel patch
|
||
|
implementing a workaround for a more broad class of
|
||
|
vulnerabilities. However, prior to those changes, no workaround
|
||
|
is available.</p>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<freebsdsa>SA-09:14.devfs</freebsdsa>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-10-02</discovery>
|
||
|
<entry>2009-10-06</entry>
|
||
|
<modified>2016-08-09</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="90d2e58f-b25a-11de-8c83-02e0185f8d72">
|
||
|
<topic>FreeBSD -- kqueue pipe race conditions</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>FreeBSD</name>
|
||
|
<range><ge>6.3</ge><lt>6.4_7</lt></range>
|
||
|
<range><ge>6.4</ge><lt>6.3_13</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<h1>Problem Description</h1>
|
||
|
<p>A race condition exists in the pipe close() code relating
|
||
|
to kqueues, causing use-after-free for kernel memory, which
|
||
|
may lead to an exploitable NULL pointer vulnerability in the
|
||
|
kernel, kernel memory corruption, and other unpredictable
|
||
|
results.</p>
|
||
|
<h1>Impact:</h1>
|
||
|
<p>Successful exploitation of the race condition can lead to
|
||
|
local kernel privilege escalation, kernel data corruption
|
||
|
and/or crash.</p>
|
||
|
<p>To exploit this vulnerability, an attacker must be able to
|
||
|
run code on the target system.</p>
|
||
|
<h1>Workaround</h1>
|
||
|
<p>An errata notice, FreeBSD-EN-09:05.null has been released
|
||
|
simultaneously to this advisory, and contains a kernel patch
|
||
|
implementing a workaround for a more broad class of
|
||
|
vulnerabilities. However, prior to those changes, no
|
||
|
workaround is available.</p>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<freebsdsa>SA-09:13.pipe</freebsdsa>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-10-02</discovery>
|
||
|
<entry>2009-10-06</entry>
|
||
|
<modified>2016-08-09</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="beb6f4a8-add5-11de-8b55-0030843d3802">
|
||
|
<topic>mybb -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>mybb</name>
|
||
|
<range><lt>1.4.9</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>mybb team reports:</p>
|
||
|
<blockquote cite="http://blog.mybboard.net/2009/09/21/mybb-1-4-9-released-security-update/">
|
||
|
<p>Input passed via avatar extensions is not properly sanitised before
|
||
|
being used in SQL queries. This can be exploited to manipulate SQL
|
||
|
queries by uploading specially named avatars.</p>
|
||
|
<p>The script allows to sign up with usernames containing zero width
|
||
|
space characters, which can be exploited to e.g. conduct spoofing
|
||
|
attacks.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>36460</bid>
|
||
|
<url>http://dev.mybboard.net/issues/464</url>
|
||
|
<url>http://dev.mybboard.net/issues/418</url>
|
||
|
<url>http://secunia.com/advisories/36803</url>
|
||
|
<url>http://blog.mybboard.net/2009/09/21/mybb-1-4-9-released-security-update/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-09-21</discovery>
|
||
|
<entry>2009-09-30</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="bad1b090-a7ca-11de-873f-0030843d3802">
|
||
|
<topic>drupal -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>drupal5</name>
|
||
|
<range><lt>5.20</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>drupal6</name>
|
||
|
<range><lt>6.14</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Drupal Team reports:</p>
|
||
|
<blockquote cite="http://drupal.org/node/579482">
|
||
|
<p>The core OpenID module does not correctly implement Form API for
|
||
|
the form that allows one to link user accounts with OpenID
|
||
|
identifiers. A malicious user is therefore able to use cross site
|
||
|
request forgeries to add attacker controlled OpenID identities to
|
||
|
existing accounts. These OpenID identities can then be used to gain
|
||
|
access to the affected accounts.</p>
|
||
|
<p>The OpenID module is not a compliant implementation of the OpenID
|
||
|
Authentication 2.0 specification. An implementation error allows a
|
||
|
user to access the account of another user when they share the same
|
||
|
OpenID 2.0 provider.</p>
|
||
|
<p>File uploads with certain extensions are not correctly processed by
|
||
|
the File API. This may lead to the creation of files that are
|
||
|
executable by Apache. The .htaccess that is saved into the files
|
||
|
directory by Drupal should normally prevent execution. The files are
|
||
|
only executable when the server is configured to ignore the directives
|
||
|
in the .htaccess file.</p>
|
||
|
<p>Drupal doesn't regenerate the session ID when an anonymous user
|
||
|
follows the one time login link used to confirm email addresses and
|
||
|
reset forgotten passwords. This enables a malicious user to fix and
|
||
|
reuse the session id of a victim under certain circumstances.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://drupal.org/node/579482</url>
|
||
|
<url>http://secunia.com/advisories/36787/</url>
|
||
|
<url>http://secunia.com/advisories/36786/</url>
|
||
|
<url>http://secunia.com/advisories/36781/</url>
|
||
|
<url>http://secunia.com/advisories/36776/</url>
|
||
|
<url>http://secunia.com/advisories/36785/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-09-17</discovery>
|
||
|
<entry>2009-09-22</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="113cd7e9-a4e2-11de-84af-001195e39404">
|
||
|
<topic>fwbuilder -- security issue in temporary file handling</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>fwbuilder</name>
|
||
|
<range><lt>3.0.7</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Firewall Builder release notes reports:</p>
|
||
|
<blockquote cite="http://www.fwbuilder.org/docs/firewall_builder_release_notes.html#3.0.7">
|
||
|
<p>Vadim Kurland (vadim.kurland@fwbuilder.org) reports:</p>
|
||
|
<p>Fwbuilder and libfwbuilder 3.0.4 through to 3.0.6 generate
|
||
|
iptables scripts with a security issue when also used to
|
||
|
generate static routing configurations.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-4664</cvename>
|
||
|
<url>http://www.fwbuilder.org/docs/firewall_builder_release_notes.html#3.0.7</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-09-18</discovery>
|
||
|
<entry>2009-09-18</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="b9ec7fe3-a38a-11de-9c6b-003048818f40">
|
||
|
<topic>bugzilla -- two SQL injections, sensitive data exposure</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>bugzilla</name>
|
||
|
<range><gt>3.3.1</gt><lt>3.4.2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>A Bugzilla Security Advisory reports:</p>
|
||
|
<blockquote cite="http://www.bugzilla.org/security/3.4/">
|
||
|
<ul>
|
||
|
<li>It is possible to inject raw SQL into the Bugzilla
|
||
|
database via the "Bug.create" and "Bug.search" WebService
|
||
|
functions.</li>
|
||
|
<li>When a user would change his password, his new password would
|
||
|
be exposed in the URL field of the browser if he logged in right
|
||
|
after changing his password.</li>
|
||
|
</ul>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3125</cvename>
|
||
|
<cvename>CVE-2009-3165</cvename>
|
||
|
<cvename>CVE-2009-3166</cvename>
|
||
|
<url>http://www.bugzilla.org/security/3.0.8/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-09-11</discovery>
|
||
|
<entry>2009-09-17</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="ee23aa09-a175-11de-96c0-0011098ad87f">
|
||
|
<topic>horde-base -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>horde-base</name>
|
||
|
<range><lt>3.3.5</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>The Horde team reports:</p>
|
||
|
<blockquote cite="http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.558&r2=1.515.2.559">
|
||
|
<p>An error within the form library when handling image form fields can
|
||
|
be exploited to overwrite arbitrary local files.</p>
|
||
|
<p>An error exists within the MIME Viewer library when rendering unknown
|
||
|
text parts. This can be exploited to execute arbitrary HTML and script
|
||
|
code in a user's browser session in context of an affected site if
|
||
|
malicious data is viewed.</p>
|
||
|
<p>The preferences system does not properly sanitise numeric preference
|
||
|
types. This can be exploited to execute arbitrary HTML and script code
|
||
|
in a user's browser session in contact of an affected site.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://bugs.horde.org/ticket/?id=8311</url>
|
||
|
<url>http://bugs.horde.org/ticket/?id=8399</url>
|
||
|
<url>http://secunia.com/advisories/36665/</url>
|
||
|
<url>http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.558&r2=1.515.2.559</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-05-28</discovery>
|
||
|
<entry>2009-09-14</entry>
|
||
|
<modified>2009-09-22</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="152b27f0-a158-11de-990c-e5b1d4c882e0">
|
||
|
<topic>nginx -- remote denial of service vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>nginx</name>
|
||
|
<range><lt>0.7.62</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>nginx-devel</name>
|
||
|
<range><lt>0.8.15</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>nginx development team reports:</p>
|
||
|
<blockquote cite="http://nginx.net/CHANGES">
|
||
|
<p>A segmentation fault might occur in worker process while
|
||
|
specially crafted request handling.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-2629</cvename>
|
||
|
<url>http://nginx.net/CHANGES</url>
|
||
|
<mlist msgid="20090914155338.GA2529@ngolde.de">http://lists.debian.org/debian-security-announce/2009/msg00205.html</mlist>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-09-14</discovery>
|
||
|
<entry>2009-09-14</entry>
|
||
|
<modified>2009-09-15</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="6e8f54af-a07d-11de-a649-000c2955660f">
|
||
|
<topic>ikiwiki -- insufficient blacklisting in teximg plugin</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>ikiwiki</name>
|
||
|
<range><lt>3.1415926</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>The IkiWiki development team reports:</p>
|
||
|
<blockquote cite="http://ikiwiki.info/security/#index35h2">
|
||
|
<p>IkiWikis teximg plugin's blacklisting of insecure TeX commands
|
||
|
is insufficient; it can be bypassed and used to read arbitrary
|
||
|
files.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-2944</cvename>
|
||
|
<url>http://ikiwiki.info/security/#index35h2</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-08-28</discovery>
|
||
|
<entry>2009-09-13</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="b46f3a1e-a052-11de-a649-000c2955660f">
|
||
|
<topic>xapian-omega -- cross-site scripting vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>xapian-omega</name>
|
||
|
<range><lt>1.0.16</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Olly Betts reports:</p>
|
||
|
<blockquote cite="http://lists.xapian.org/pipermail/xapian-discuss/2009-September/007115.html">
|
||
|
<p>There's a cross-site scripting issue in Omega - exception
|
||
|
messages don't currently get HTML entities escaped, but can
|
||
|
contain CGI parameter values in some cases.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-2947</cvename>
|
||
|
<url>http://lists.xapian.org/pipermail/xapian-discuss/2009-September/007115.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-09-09</discovery>
|
||
|
<entry>2009-09-13</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="922d2398-9e2d-11de-a998-0030843d3802">
|
||
|
<topic>mozilla firefox -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>firefox</name>
|
||
|
<range><gt>3.5.*,1</gt><lt>3.5.3,1</lt></range>
|
||
|
<range><gt>3.*,1</gt><lt>3.0.13,1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Mozilla Foundation reports:</p>
|
||
|
<blockquote cite="http://www.mozilla.org/security/announce/">
|
||
|
<p>MFSA 2009-51 Chrome privilege escalation with FeedWriter</p>
|
||
|
<p>MFSA 2009-50 Location bar spoofing via tall line-height Unicode
|
||
|
characters</p>
|
||
|
<p>MFSA 2009-49 TreeColumns dangling pointer vulnerability</p>
|
||
|
<p>MFSA 2009-48 Insufficient warning for PKCS11 module installation
|
||
|
and removal</p>
|
||
|
<p>MFSA 2009-47 Crashes with evidence of memory corruption
|
||
|
(rv:1.9.1.3/1.9.0.14)</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3069</cvename>
|
||
|
<cvename>CVE-2009-3070</cvename>
|
||
|
<cvename>CVE-2009-3071</cvename>
|
||
|
<cvename>CVE-2009-3072</cvename>
|
||
|
<cvename>CVE-2009-3073</cvename>
|
||
|
<cvename>CVE-2009-3074</cvename>
|
||
|
<cvename>CVE-2009-3075</cvename>
|
||
|
<cvename>CVE-2009-3076</cvename>
|
||
|
<cvename>CVE-2009-3077</cvename>
|
||
|
<cvename>CVE-2009-3078</cvename>
|
||
|
<cvename>CVE-2009-3079</cvename>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-47.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-48.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-49.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-50.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-51.html</url>
|
||
|
<url>http://secunia.com/advisories/36671/2/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-09-10</discovery>
|
||
|
<entry>2009-09-10</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="012b495c-9d51-11de-8d20-001bd3385381">
|
||
|
<topic>cyrus-imapd -- Potential buffer overflow in Sieve</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>cyrus-imapd</name>
|
||
|
<range><gt>2.2.0</gt><lt>2.2.13_6</lt></range>
|
||
|
<range><gt>2.3.0</gt><lt>2.3.14_2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>The Cyrus IMAP Server ChangeLog states:</p>
|
||
|
<blockquote cite="http://cyrusimap.web.cmu.edu/imapd/changes.html">
|
||
|
<p>Fixed CERT VU#336053 - Potential buffer overflow in Sieve.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-2632</cvename>
|
||
|
<bid>36296</bid>
|
||
|
<url>http://www.kb.cert.org/vuls/id/336053</url>
|
||
|
<url>http://www.debian.org/security/2009/dsa-1881</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-09-02</discovery>
|
||
|
<entry>2009-09-09</entry>
|
||
|
<modified>2009-09-14</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="24aa9970-9ccd-11de-af10-000c29a67389">
|
||
|
<topic>silc-toolkit -- Format string vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>silc-toolkit</name>
|
||
|
<range><lt>1.1.9</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SILC Changlog reports:</p>
|
||
|
<blockquote cite="http://silcnet.org/docs/changelog/SILC%20Toolkit%201.1.10">
|
||
|
<p>An unspecified format string vulnerability exists in
|
||
|
silc-toolkit.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3051</cvename>
|
||
|
<url>http://silcnet.org/docs/changelog/SILC%20Toolkit%201.1.10</url>
|
||
|
<url>http://www.openwall.com/lists/oss-security/2009/09/03/5</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-08-07</discovery>
|
||
|
<entry>2009-09-08</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="4582948a-9716-11de-83a5-001999392805">
|
||
|
<topic>opera -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>opera</name>
|
||
|
<range><lt>10.00.20090830</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>opera-devel</name>
|
||
|
<range><le>10.00.b3_1,1</le></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>linux-opera</name>
|
||
|
<range><lt>10.00</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Opera Team Reports:</p>
|
||
|
<blockquote cite="http://www.opera.com/docs/changelogs/freebsd/1000/">
|
||
|
<ul>
|
||
|
<li>Issue where sites using revoked intermediate certificates might be shown as secure</li>
|
||
|
<li>Issue where the collapsed address bar didn't show the current domain</li>
|
||
|
<li>Issue where pages could trick users into uploading files</li>
|
||
|
<li>Some IDNA characters not correctly displaying in the address bar</li>
|
||
|
<li>Issue where Opera accepts nulls and invalid wild-cards in certificates</li>
|
||
|
</ul>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://www.opera.com/support/search/view/929/</url>
|
||
|
<url>http://www.opera.com/support/search/view/930/</url>
|
||
|
<url>http://www.opera.com/support/search/view/931/</url>
|
||
|
<url>http://www.opera.com/support/search/view/932/</url>
|
||
|
<url>http://www.opera.com/support/search/view/934/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-09-01</discovery>
|
||
|
<entry>2009-09-04</entry>
|
||
|
<modified>2009-10-29</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="80aa98e0-97b4-11de-b946-0030843d3802">
|
||
|
<topic>dnsmasq -- TFTP server remote code injection vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>dnsmasq</name>
|
||
|
<range><lt>2.50</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Simon Kelley reports:</p>
|
||
|
<blockquote cite="http://www.thekelleys.org.uk/dnsmasq/CHANGELOG">
|
||
|
<p>Fix security problem which allowed any host permitted to
|
||
|
do TFTP to possibly compromise dnsmasq by remote buffer
|
||
|
overflow when TFTP enabled.</p>
|
||
|
<p>Fix a problem which allowed a malicious TFTP client to
|
||
|
crash dnsmasq.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>36121</bid>
|
||
|
<bid>36120</bid>
|
||
|
<cvename>CVE-2009-2957</cvename>
|
||
|
<cvename>CVE-2009-2958</cvename>
|
||
|
<url>http://www.coresecurity.com/content/dnsmasq-vulnerabilities</url>
|
||
|
<url>https://rhn.redhat.com/errata/RHSA-2009-1238.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-08-31</discovery>
|
||
|
<entry>2009-09-02</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="e15f2356-9139-11de-8f42-001aa0166822">
|
||
|
<topic>apache22 -- several vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>apache</name>
|
||
|
<range><gt>2.2.0</gt><lt>2.2.12</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Apache ChangeLog reports:</p>
|
||
|
<blockquote cite="http://www.apache.org/dist/httpd/CHANGES_2.2.12">
|
||
|
<p>CVE-2009-1891: Fix a potential Denial-of-Service attack against mod_deflate or other modules.</p>
|
||
|
<p>CVE-2009-1195: Prevent the "Includes" Option from being enabled in an .htaccess file if the AllowOverride restrictions do not permit it.</p>
|
||
|
<p>CVE-2009-1890: Fix a potential Denial-of-Service attack against mod_proxy in a reverse proxy configuration.</p>
|
||
|
<p>CVE-2009-1191: mod_proxy_ajp: Avoid delivering content from a previous request which failed to send a request body.</p>
|
||
|
<p>CVE-2009-0023, CVE-2009-1955, CVE-2009-1956: The bundled copy of the APR-util library has been updated, fixing three different security issues which may affect particular configurations and third-party modules (was already fixed in 2.2.11_5).</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-1891</cvename><!-- vul: 2.2.11 -->
|
||
|
<cvename>CVE-2009-1195</cvename><!-- vul: 2.2.x to 2.2.11 -->
|
||
|
<cvename>CVE-2009-1890</cvename><!-- ok: 2.3.3 -->
|
||
|
<cvename>CVE-2009-1191</cvename><!-- vul: 2.2.11 -->
|
||
|
<cvename>CVE-2009-0023</cvename><!-- ok: apr 1.3.5 -->
|
||
|
<cvename>CVE-2009-1955</cvename><!-- ok: apr-util 1.3.7 -->
|
||
|
<cvename>CVE-2009-1956</cvename><!-- ok: apr-util 1.3.5 -->
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-07-28</discovery><!-- release date of 2.2.12 -->
|
||
|
<entry>2009-08-25</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="59e7af2d-8db7-11de-883b-001e3300a30d">
|
||
|
<topic>pidgin -- MSN overflow parsing SLP messages</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>pidgin</name>
|
||
|
<name>libpurple</name>
|
||
|
<name>finch</name>
|
||
|
<range><lt>2.5.9</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/36384">
|
||
|
<p>A vulnerability has been reported in Pidgin, which can be
|
||
|
exploited by malicious people to potentially compromise a user's
|
||
|
system.</p>
|
||
|
<p>The vulnerability is caused due to an error in the
|
||
|
"msn_slplink_process_msg()" function when processing MSN SLP
|
||
|
messages and can be exploited to corrupt memory.</p>
|
||
|
<p>Successful exploitation may allow execution of arbitrary
|
||
|
code.</p>
|
||
|
<p>The vulnerability is reported in versions 2.5.8 and prior.
|
||
|
Other versions may also be affected.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-2694</cvename>
|
||
|
<url>http://secunia.com/advisories/36384/</url>
|
||
|
<url>http://www.pidgin.im/news/security/?id=34</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-08-18</discovery>
|
||
|
<entry>2009-08-20</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="b31a1088-460f-11de-a11a-0022156e8794">
|
||
|
<topic>GnuTLS -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>gnutls</name>
|
||
|
<range><lt>2.6.6</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>gnutls-devel</name>
|
||
|
<range><lt>2.7.8</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SecurityFocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/34783/discuss">
|
||
|
<p>GnuTLS is prone to multiple remote vulnerabilities:</p>
|
||
|
<ul>
|
||
|
<li>A remote code-execution vulnerability.</li>
|
||
|
<li>A denial-of-service vulnerability.</li>
|
||
|
<li>A signature-generation vulnerability.</li>
|
||
|
<li>A signature-verification vulnerability.</li>
|
||
|
</ul>
|
||
|
<p>An attacker can exploit these issues to potentially execute
|
||
|
arbitrary code, trigger denial-of-service conditions, carry
|
||
|
out attacks against data signed with weak signatures, and
|
||
|
cause clients to accept expired or invalid certificates from
|
||
|
servers.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-1415</cvename>
|
||
|
<cvename>CVE-2009-1416</cvename>
|
||
|
<cvename>CVE-2009-1417</cvename>
|
||
|
<bid>34783</bid>
|
||
|
<url>http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3515</url>
|
||
|
<url>http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3516</url>
|
||
|
<url>http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3517</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-05-21</discovery>
|
||
|
<entry>2009-08-17</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="856a6f84-8b30-11de-8062-00e0815b8da8">
|
||
|
<topic>GnuTLS -- improper SSL certificate verification</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>gnutls</name>
|
||
|
<range><lt>2.8.3</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>gnutls-devel</name>
|
||
|
<range><lt>2.9.0</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>GnuTLS reports:</p>
|
||
|
<blockquote cite="http://article.gmane.org/gmane.network.gnutls.general/1733">
|
||
|
<p>By using a NUL byte in CN/SAN fields, it was possible to fool
|
||
|
GnuTLS into 1) not printing the entire CN/SAN field value when
|
||
|
printing a certificate and 2) cause incorrect positive matches
|
||
|
when matching a hostname against a certificate.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-2730</cvename>
|
||
|
<url>http://article.gmane.org/gmane.network.gnutls.general/1733</url>
|
||
|
<url>http://secunia.com/advisories/36266</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-08-11</discovery>
|
||
|
<entry>2009-08-17</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="86ada694-8b30-11de-b9d0-000c6e274733">
|
||
|
<topic>memcached -- memcached stats maps Information Disclosure Weakness</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>memcached</name>
|
||
|
<range><lt>1.2.8</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/34915/">
|
||
|
<p>A weakness has been reported in memcached, which can be exploited
|
||
|
by malicious people to disclose system information.</p>
|
||
|
<p>The weakness is caused due to the application disclosing the
|
||
|
content of /proc/self/maps if a stats maps command is received.
|
||
|
This can be exploited to disclose e.g. the addresses of allocated
|
||
|
memory regions.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-1255</cvename>
|
||
|
<url>http://secunia.com/advisories/34915/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-04-29</discovery>
|
||
|
<entry>2009-08-17</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="2430e9c3-8741-11de-938e-003048590f9e">
|
||
|
<topic>wordpress -- remote admin password reset vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>wordpress</name>
|
||
|
<range><lt>2.8.4,1</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>de-wordpress</name>
|
||
|
<range><lt>2.8.4</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>wordpress-mu</name>
|
||
|
<range><lt>2.8.4a</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>WordPress reports:</p>
|
||
|
<blockquote cite="http://wordpress.org/development/2009/08/2-8-4-security-release/">
|
||
|
<p>A specially crafted URL could be requested that would allow an
|
||
|
attacker to bypass a security check to verify a user requested a
|
||
|
password reset. As a result, the first account without a key in the
|
||
|
database (usually the admin account) would have its password reset and
|
||
|
a new password would be emailed to the account owner.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-2762</cvename>
|
||
|
<url>http://wordpress.org/development/2009/08/2-8-4-security-release/</url>
|
||
|
<url>http://www.milw0rm.com/exploits/9410</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-08-10</discovery>
|
||
|
<entry>2009-08-12</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="5179d85c-8683-11de-91b9-0022157515b2">
|
||
|
<topic>fetchmail -- improper SSL certificate subject verification</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>fetchmail</name>
|
||
|
<range><lt>6.3.11</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Matthias Andree reports:</p>
|
||
|
<blockquote cite="http://www.fetchmail.info/fetchmail-SA-2009-01.txt">
|
||
|
<p>Moxie Marlinspike demonstrated in July 2009 that some CAs would
|
||
|
sign certificates that contain embedded NUL characters in the
|
||
|
Common Name or subjectAltName fields of ITU-T X.509
|
||
|
certificates.</p>
|
||
|
<p>Applications that would treat such X.509 strings as
|
||
|
NUL-terminated C strings (rather than strings that contain an
|
||
|
explicit length field) would only check the part up to and
|
||
|
excluding the NUL character, so that certificate names such as
|
||
|
www.good.example\0www.bad.example.com would be mistaken as a
|
||
|
certificate name for www.good.example. fetchmail also had this
|
||
|
design and implementation flaw.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-2666</cvename>
|
||
|
<url>http://www.fetchmail.info/fetchmail-SA-2009-01.txt</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-08-06</discovery>
|
||
|
<entry>2009-08-11</entry>
|
||
|
<modified>2009-08-13</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="739b94a4-838b-11de-938e-003048590f9e">
|
||
|
<topic>joomla15 -- com_mailto Timeout Issue</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>joomla15</name>
|
||
|
<range><lt>1.5.14</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Joomla! Security Center reports:</p>
|
||
|
<blockquote cite="http://developer.joomla.org/security/news/303-20090723-core-com-mailto-timeout-issue.html">
|
||
|
<p>In com_mailto, it was possible to bypass timeout protection against
|
||
|
sending automated emails.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://developer.joomla.org/security.html</url>
|
||
|
<url>http://secunia.com/advisories/36097/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-07-22</discovery>
|
||
|
<entry>2009-08-07</entry>
|
||
|
<modified>2009-08-11</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="bce1f76d-82d0-11de-88ea-001a4d49522b">
|
||
|
<topic>subversion -- heap overflow vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>subversion</name>
|
||
|
<name>subversion-freebsd</name>
|
||
|
<name>p5-subversion</name>
|
||
|
<name>py-subversion</name>
|
||
|
<range><lt>1.6.4</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>A Subversion Security Advisory reports:</p>
|
||
|
<blockquote cite="http://subversion.tigris.org/security/CVE-2009-2411-advisory.txt">
|
||
|
<p>Subversion clients and servers have multiple heap
|
||
|
overflow issues in the parsing of binary deltas. This is
|
||
|
related to an allocation vulnerability in the APR library
|
||
|
used by Subversion.</p>
|
||
|
<p>Clients with commit access to a vulnerable server can
|
||
|
cause a remote heap overflow; servers can cause a heap
|
||
|
overflow on vulnerable clients that try to do a checkout
|
||
|
or update.</p>
|
||
|
<p>This can lead to a DoS (an exploit has been tested) and
|
||
|
to arbitrary code execution (no exploit tested, but the
|
||
|
possibility is clear).</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-2411</cvename>
|
||
|
<url>http://subversion.tigris.org/security/CVE-2009-2411-advisory.txt</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-08-06</discovery>
|
||
|
<entry>2009-08-06</entry>
|
||
|
<modified>2009-08-07</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="d67b517d-8214-11de-88ea-001a4d49522b">
|
||
|
<topic>bugzilla -- product name information leak</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>bugzilla</name>
|
||
|
<range><gt>3.3.4</gt><lt>3.4.1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>A Bugzilla Security Advisory reports:</p>
|
||
|
<blockquote cite="http://www.bugzilla.org/security/3.4/">
|
||
|
<p>Normally, users are only supposed to see products that
|
||
|
they can file bugs against in the "Product" drop-down on
|
||
|
the bug-editing page. Instead, users were being shown all
|
||
|
products, even those that they normally could not see. Any
|
||
|
user who could edit any bug could see all product
|
||
|
names.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://www.bugzilla.org/security/3.4/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-07-30</discovery>
|
||
|
<entry>2009-08-05</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="49e8f2ee-8147-11de-a994-0030843d3802">
|
||
|
<topic>mozilla -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>firefox</name>
|
||
|
<name>linux-firefox</name>
|
||
|
<range><lt>3.*,1</lt></range>
|
||
|
<range><gt>3.*,1</gt><lt>3.0.13,1</lt></range>
|
||
|
<range><gt>3.5.*,1</gt><lt>3.5.2,1</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>linux-firefox-devel</name>
|
||
|
<range><lt>3.5.2</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>seamonkey</name>
|
||
|
<name>linux-seamonkey</name>
|
||
|
<range><lt>1.1.18</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>linux-seamonkey-devel</name>
|
||
|
<range><gt>0</gt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>thunderbird</name>
|
||
|
<name>linux-thunderbird</name>
|
||
|
<range><lt>2.0.0.23</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Mozilla Project reports:</p>
|
||
|
<blockquote cite="http://www.mozilla.org/security/announce/">
|
||
|
<p>MFSA 2009-38: Data corruption with SOCKS5 reply containing DNS name
|
||
|
longer than 15 characters</p>
|
||
|
<p>MFSA 2009-42: Compromise of SSL-protected communication</p>
|
||
|
<p>MFSA 2009-43: Heap overflow in certificate regexp parsing</p>
|
||
|
<p>MFSA 2009-44: Location bar and SSL indicator spoofing via window.open()
|
||
|
on invalid URL</p>
|
||
|
<p>MFSA 2009-45: Crashes with evidence of memory corruption
|
||
|
(rv:1.9.1.2/1.9.0.13)</p>
|
||
|
<p>MFSA 2009-46: Chrome privilege escalation due to incorrectly cached
|
||
|
wrapper</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-2404</cvename>
|
||
|
<cvename>CVE-2009-2408</cvename>
|
||
|
<cvename>CVE-2009-2454</cvename>
|
||
|
<cvename>CVE-2009-2470</cvename>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-38.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-42.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-43.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-44.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-45.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-46.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-08-03</discovery>
|
||
|
<entry>2009-08-04</entry>
|
||
|
<modified>2009-09-04</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="4e306850-811f-11de-8a67-000c29a67389">
|
||
|
<topic>silc-client -- Format string vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>silc-client</name>
|
||
|
<name>silc-irssi-client</name>
|
||
|
<range><lt>1.1.8</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SILC changelog reports:</p>
|
||
|
<blockquote cite="http://silcnet.org/docs/changelog/SILC%20Client%201.1.8">
|
||
|
<p>An unspecified format string vulnerability exists in
|
||
|
silc-client.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-3051</cvename>
|
||
|
<url>http://silcnet.org/docs/changelog/SILC%20Client%201.1.8</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-07-31</discovery>
|
||
|
<entry>2009-08-04</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="0d0237d0-7f68-11de-984d-0011098ad87f">
|
||
|
<topic>SquirrelMail -- Plug-ins compromise</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>squirrelmail-multilogin-plugin</name>
|
||
|
<range><ge>2.3.4</ge><lt>2.3.4_2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<h1>Problem Description:</h1>
|
||
|
<p>The SquirrelMail Web Server has been compromised, and three plugins
|
||
|
are affected.</p>
|
||
|
<p>The port of squirrelmail-sasql-plugin is safe (right MD5), and
|
||
|
change_pass is not in the FreeBSD ports tree, but multilogin has a
|
||
|
wrong MD5.</p>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://sourceforge.net/mailarchive/message.php?msg_name=4A727634.3080008%40squirrelmail.org</url>
|
||
|
<url>http://squirrelmail.org/index.php</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-07-31</discovery>
|
||
|
<entry>2009-08-02</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="83725c91-7c7e-11de-9672-00e0815b8da8">
|
||
|
<topic>BIND -- Dynamic update message remote DoS</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>bind9</name>
|
||
|
<range><lt>9.3.6.1.1</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>bind9-sdb-postgresql</name>
|
||
|
<name>bind9-sdb-ldap</name>
|
||
|
<range><lt>9.4.3.3</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>FreeBSD</name>
|
||
|
<range><ge>6.3</ge><lt>6.3_12</lt></range>
|
||
|
<range><ge>6.4</ge><lt>6.4_6</lt></range>
|
||
|
<range><ge>7.1</ge><lt>7.1_7</lt></range>
|
||
|
<range><ge>7.2</ge><lt>7.2_3</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<h1>Problem Description:</h1>
|
||
|
<p>When named(8) receives a specially crafted dynamic update
|
||
|
message an internal assertion check is triggered which causes
|
||
|
named(8) to exit.</p>
|
||
|
<p>To trigger the problem, the dynamic update message must contains
|
||
|
a record of type "ANY" and at least one resource record set (RRset)
|
||
|
for this fully qualified domain name (FQDN) must exist on the
|
||
|
server.</p>
|
||
|
<h1>Impact:</h1>
|
||
|
<p>An attacker which can send DNS requests to a nameserver can cause
|
||
|
it to exit, thus creating a Denial of Service situation.</p>
|
||
|
<h1>Workaround:</h1>
|
||
|
<p>No generally applicable workaround is available, but some firewalls
|
||
|
may be able to prevent nsupdate DNS packets from reaching the
|
||
|
nameserver.</p>
|
||
|
<p>NOTE WELL: Merely configuring named(8) to ignore dynamic updates
|
||
|
is NOT sufficient to protect it from this vulnerability.</p>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0696</cvename>
|
||
|
<freebsdsa>SA-09:12.bind</freebsdsa>
|
||
|
<url>http://www.kb.cert.org/vuls/id/725188</url>
|
||
|
<url>https://www.isc.org/node/474</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-07-28</discovery>
|
||
|
<entry>2009-08-01</entry>
|
||
|
<modified>2009-08-04</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="708c65a5-7c58-11de-a994-0030843d3802">
|
||
|
<topic>mono -- XML signature HMAC truncation spoofing</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>mono</name>
|
||
|
<range><lt>2.4.2.2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/35852/">
|
||
|
<p>A security issue has been reported in Mono, which can be
|
||
|
exploited by malicious people to conduct spoofing attacks.</p>
|
||
|
<p>The security issue is caused due to an error when processing
|
||
|
certain XML signatures.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0217</cvename>
|
||
|
<url>http://secunia.com/advisories/35852/</url>
|
||
|
<url>http://www.kb.cert.org/vuls/id/466161</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-07-15</discovery>
|
||
|
<entry>2009-07-29</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="e1156e90-7ad6-11de-b26a-0048543d60ce">
|
||
|
<topic>squid -- several remote denial of service vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>squid</name>
|
||
|
<range><ge>3.0.1</ge><lt>3.0.17</lt></range>
|
||
|
<range><ge>3.1.0.1</ge><lt>3.1.0.12</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Squid security advisory 2009:2 reports:</p>
|
||
|
<blockquote cite="http://www.squid-cache.org/Advisories/SQUID-2009_2.txt">
|
||
|
<p>Due to incorrect buffer limits and related bound checks Squid
|
||
|
is vulnerable to a denial of service attack when processing
|
||
|
specially crafted requests or responses.</p>
|
||
|
<p>Due to incorrect data validation Squid is vulnerable to a
|
||
|
denial of service attack when processing specially crafted
|
||
|
responses.</p>
|
||
|
<p>These problems allow any trusted client or external server to
|
||
|
perform a denial of service attack on the Squid service.</p>
|
||
|
</blockquote>
|
||
|
<p>Squid-2.x releases are not affected.</p>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-2621</cvename>
|
||
|
<cvename>CVE-2009-2622</cvename>
|
||
|
<url>http://www.squid-cache.org/Advisories/SQUID-2009_2.txt</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-07-27</discovery>
|
||
|
<entry>2009-07-27</entry>
|
||
|
<modified>2009-08-06</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="c1ef9b33-72a6-11de-82ea-0030843d3802">
|
||
|
<topic>mozilla -- corrupt JIT state after deep return from native function</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>firefox</name>
|
||
|
<range><ge>3.5.*,1</ge><lt>3.5.1,1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Mozilla Project reports:</p>
|
||
|
<blockquote cite="http://www.mozilla.org/security/announce/2009/mfsa2009-41.html">
|
||
|
<p>Firefox user zbyte reported a crash that we determined could result
|
||
|
in an exploitable memory corruption problem. In certain cases after a
|
||
|
return from a native function, such as escape(), the Just-in-Time
|
||
|
(JIT) compiler could get into a corrupt state. This could be exploited
|
||
|
by an attacker to run arbitrary code such as installing malware.</p>
|
||
|
<p>This vulnerability does not affect earlier versions of Firefox
|
||
|
which do not support the JIT feature.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-2477</cvename>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-41.html</url>
|
||
|
<url>http://www.kb.cert.org/vuls/id/443060</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-07-16</discovery>
|
||
|
<entry>2009-07-17</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="c444c8b7-7169-11de-9ab7-000c29a67389">
|
||
|
<topic>isc-dhcp-client -- Stack overflow vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>isc-dhcp31-client</name>
|
||
|
<range><le>3.1.1</le></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>isc-dhcp30-client</name>
|
||
|
<range><lt>3.0.7_1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>US-CERT reports:</p>
|
||
|
<blockquote cite="http://www.kb.cert.org/vuls/id/410676">
|
||
|
<p>The ISC DHCP dhclient application contains a stack buffer
|
||
|
overflow, which may allow a remote, unauthenticated attacker to
|
||
|
execute arbitrary code with root privileges.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0692</cvename>
|
||
|
<url>https://www.isc.org/node/468</url>
|
||
|
<url>http://secunia.com/advisories/35785</url>
|
||
|
<url>http://www.kb.cert.org/vuls/id/410676</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-07-14</discovery>
|
||
|
<entry>2009-07-15</entry>
|
||
|
<modified>2009-07-21</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="be927298-6f97-11de-b444-001372fd0af2">
|
||
|
<topic>drupal -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>drupal5</name>
|
||
|
<range><lt>5.19</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>drupal6</name>
|
||
|
<range><lt>6.13</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>The Drupal Security Team reports:</p>
|
||
|
<blockquote cite="http://drupal.org/node/507572">
|
||
|
<p>Cross-site scripting</p>
|
||
|
<p>The Forum module does not correctly handle certain arguments
|
||
|
obtained from the URL. By enticing a suitably privileged user
|
||
|
to visit a specially crafted URL, a malicious user is able to
|
||
|
insert arbitrary HTML and script code into forum pages. Such a
|
||
|
cross-site scripting attack may lead to the malicious user
|
||
|
gaining administrative access. Wikipedia has more information
|
||
|
about cross-site scripting (XSS).</p>
|
||
|
<p>User signatures have no separate input format, they use the
|
||
|
format of the comment with which they are displayed. A user
|
||
|
will no longer be able to edit a comment when an administrator
|
||
|
changes the comment's input format to a format that is not
|
||
|
accessible to the user. However they will still be able to
|
||
|
modify their signature, which will then be processed by the new
|
||
|
input format.</p>
|
||
|
<p>If the new format is very permissive, via their signature, the
|
||
|
user may be able to insert arbitrary HTML and script code into
|
||
|
pages or, when the PHP filter is enabled for the new format,
|
||
|
execute PHP code. This issue affects Drupal 6.x only.</p>
|
||
|
<p>When an anonymous user fails to login due to mistyping his
|
||
|
username or password, and the page he is on contains a sortable
|
||
|
table, the (incorrect) username and password are included in
|
||
|
links on the table. If the user visits these links the password
|
||
|
may then be leaked to external sites via the HTTP referer.</p>
|
||
|
<p>In addition, if the anonymous user is enticed to visit the site
|
||
|
via a specially crafted URL while the Drupal page cache is
|
||
|
enabled, a malicious user might be able to retrieve the
|
||
|
(incorrect) username and password from the page cache.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-2372</cvename>
|
||
|
<cvename>CVE-2009-2374</cvename>
|
||
|
<cvename>CVE-2009-2373</cvename>
|
||
|
<url>http://drupal.org/node/507572</url>
|
||
|
<url>http://secunia.com/advisories/35681</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-07-01</discovery>
|
||
|
<entry>2009-07-13</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="70372cda-6771-11de-883a-00e0815b8da8">
|
||
|
<topic>nfsen -- remote command execution</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>nfsen</name>
|
||
|
<range><lt>1.3.2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>nfsen reports:</p>
|
||
|
<blockquote cite="http://sourceforge.net/forum/forum.php?forum_id=967583">
|
||
|
<p>Due to double input checking, a remote command execution security
|
||
|
bug exists in all NfSen versions 1.3 and 1.3.1. Users are
|
||
|
requested to update to nfsen-1.3.2.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://sourceforge.net/forum/forum.php?forum_id=967583</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-06-18</discovery>
|
||
|
<entry>2009-07-03</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="ba73f494-65a8-11de-aef5-001c2514716c">
|
||
|
<topic>phpmyadmin -- XSS vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>phpMyAdmin</name>
|
||
|
<range><lt>3.2.0.1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>The phpMyAdmin project reports:</p>
|
||
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2009-5.php">
|
||
|
<p>It was possible to conduct an XSS attack via a crafted
|
||
|
SQL bookmark.</p>
|
||
|
<p>All 3.x releases on which the "bookmarks" feature is
|
||
|
active are affected, previous versions are not.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-2284</cvename>
|
||
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2009-5.php</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-06-30</discovery>
|
||
|
<entry>2009-06-30</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="3ebd4cb5-657f-11de-883a-00e0815b8da8">
|
||
|
<topic>nagios -- Command Injection Vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>nagios</name>
|
||
|
<range><le>3.0.6_1</le></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>nagios2</name>
|
||
|
<range><le>2.12_3</le></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>nagios-devel</name>
|
||
|
<range><le>3.1.0_1</le></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/35543?">
|
||
|
<p>A vulnerability has been reported in Nagios, which can be
|
||
|
exploited by malicious users to potentially compromise a
|
||
|
vulnerable system.</p>
|
||
|
<p>Input passed to the "ping" parameter in statuswml.cgi is not
|
||
|
properly sanitised before being used to invoke the ping command.
|
||
|
This can be exploited to inject and execute arbitrary shell
|
||
|
commands.</p>
|
||
|
<p>Successful exploitation requires access to the ping feature
|
||
|
of the WAP interface.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-2288</cvename>
|
||
|
<url>http://secunia.com/advisories/35543</url>
|
||
|
<url>http://tracker.nagios.org/view.php?id=15</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-05-29</discovery>
|
||
|
<entry>2009-06-30</entry>
|
||
|
<modified>2009-07-13</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="f59dda75-5ff4-11de-a13e-00e0815b8da8">
|
||
|
<topic>tor-devel -- DNS resolution vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>tor-devel</name>
|
||
|
<range><lt>0.2.1.15-rc</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>The Tor Project reports:</p>
|
||
|
<blockquote cite="https://git.torproject.org/checkout/tor/master/ChangeLog">
|
||
|
<p>A malicious exit relay could convince a controller that the
|
||
|
client's DNS question resolves to an internal IP address.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>https://git.torproject.org/checkout/tor/master/ChangeLog</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-06-20</discovery>
|
||
|
<entry>2009-06-23</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="c14aa48c-5ab7-11de-bc9b-0030843d3802">
|
||
|
<topic>cscope -- multiple buffer overflows</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>cscope</name>
|
||
|
<range><lt>15.7a</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/34978">
|
||
|
<p>Some vulnerabilities have been reported in Cscope, which
|
||
|
potentially can be exploited by malicious people to compromise a
|
||
|
user's system.</p>
|
||
|
<p>The vulnerabilities are caused due to various boundary errors,
|
||
|
which can be exploited to cause buffer overflows when parsing
|
||
|
specially crafted files or directories.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>34805</bid>
|
||
|
<cvename>CVE-2009-0148</cvename>
|
||
|
<url>http://secunia.com/advisories/34978</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-05-31</discovery>
|
||
|
<entry>2009-06-16</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="91a2066b-5ab6-11de-bc9b-0030843d3802">
|
||
|
<topic>cscope -- buffer overflow</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>cscope</name>
|
||
|
<range><lt>15.6</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SecurityFocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/34832">
|
||
|
<p>Attackers may leverage this issue to execute arbitrary code
|
||
|
in the context of the application. Failed attacks will cause
|
||
|
denial-of-service conditions.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>34832</bid>
|
||
|
<cvename>CVE-2009-1577</cvename>
|
||
|
<url>http://cscope.cvs.sourceforge.net/viewvc/cscope/cscope/src/find.c?view=log#rev1.19</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-05-31</discovery>
|
||
|
<entry>2009-06-16</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="bdccd14b-5aac-11de-a438-003048590f9e">
|
||
|
<topic>joomla -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>joomla15</name>
|
||
|
<range><lt>1.5.11</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/35278/">
|
||
|
<p>Some vulnerabilities have been reported in Joomla!, which can be
|
||
|
exploited by malicious users to conduct script insertion attacks and
|
||
|
by malicious people to conduct cross-site scripting attacks.</p>
|
||
|
<p>Certain unspecified input is not properly sanitised before being
|
||
|
used. This can be exploited to insert arbitrary HTML and script code,
|
||
|
which will be executed in a user's browser session in the context of
|
||
|
an affected site when the malicious data is displayed.</p>
|
||
|
<p>Certain unspecified input passed to the user view of the com_users
|
||
|
core component is not properly sanitised before being returned to the
|
||
|
user. This can be exploited to execute arbitrary HTML and script code
|
||
|
in a user's browser session in context of an affected site.</p>
|
||
|
<p>Input passed via certain parameters to the "JA_Purity" template is
|
||
|
not properly sanitised before being returned to the user. This can be
|
||
|
exploited to execute arbitrary HTML and script code in a user's
|
||
|
browser session in context of an affected site.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-1938</cvename>
|
||
|
<cvename>CVE-2009-1939</cvename>
|
||
|
<cvename>CVE-2009-1940</cvename>
|
||
|
<url>http://secunia.com/advisories/35278/</url>
|
||
|
<url>http://www.joomla.org/announcements/release-news/5235-joomla-1511-security-release-now-available.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-06-03</discovery>
|
||
|
<entry>2009-06-16</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="b1ca65e6-5aaf-11de-bc9b-0030843d3802">
|
||
|
<topic>pidgin -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>pidgin</name>
|
||
|
<name>libpurple</name>
|
||
|
<name>finch</name>
|
||
|
<range><lt>2.5.6</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/35194/">
|
||
|
<p>Some vulnerabilities and weaknesses have been reported in Pidgin,
|
||
|
which can be exploited by malicious people to cause a DoS or to
|
||
|
potentially compromise a user's system.</p>
|
||
|
<p>A truncation error in the processing of MSN SLP messages can be
|
||
|
exploited to cause a buffer overflow.</p>
|
||
|
<p>A boundary error in the XMPP SOCKS5 "bytestream" server when
|
||
|
initiating an outgoing file transfer can be exploited to cause a
|
||
|
buffer overflow.</p>
|
||
|
<p>A boundary error exists in the implementation of the
|
||
|
"PurpleCircBuffer" structure. This can be exploited to corrupt memory
|
||
|
and cause a crash via specially crafted XMPP or Sametime
|
||
|
packets.</p>
|
||
|
<p>A boundary error in the "decrypt_out()" function can be exploited
|
||
|
to cause a stack-based buffer overflow with 8 bytes and crash the
|
||
|
application via a specially crafted QQ packet.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>35067</bid>
|
||
|
<cvename>CVE-2009-1373</cvename>
|
||
|
<cvename>CVE-2009-1374</cvename>
|
||
|
<cvename>CVE-2009-1375</cvename>
|
||
|
<cvename>CVE-2009-1376</cvename>
|
||
|
<url>http://secunia.com/advisories/35194/</url>
|
||
|
<url>http://www.pidgin.im/news/security/?id=29</url>
|
||
|
<url>http://www.pidgin.im/news/security/?id=30</url>
|
||
|
<url>http://www.pidgin.im/news/security/?id=32</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-06-03</discovery>
|
||
|
<entry>2009-06-16</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="d9b01c08-59b3-11de-828e-00e0815b8da8">
|
||
|
<topic>git -- denial of service vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>git</name>
|
||
|
<range><lt>1.6.3.2_1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SecurityFocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/35338/discuss">
|
||
|
<p>Git is prone to a denial-of-service vulnerability because it
|
||
|
fails to properly handle some client requests.</p>
|
||
|
<p>Attackers can exploit this issue to cause a daemon process to
|
||
|
enter an infinite loop. Repeated exploits may consume excessive
|
||
|
system resources, resulting in a denial of service condition.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>35338</bid>
|
||
|
<cvename>CVE-2009-2108</cvename>
|
||
|
<url>https://www.redhat.com/archives/fedora-security-list/2009-June/msg00000.html</url>
|
||
|
<url>http://article.gmane.org/gmane.comp.version-control.git/120724</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-06-04</discovery>
|
||
|
<entry>2009-06-15</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="62e0fbe5-5798-11de-bb78-001cc0377035">
|
||
|
<topic>ruby -- BigDecimal denial of service vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>ruby</name>
|
||
|
<name>ruby+pthreads</name>
|
||
|
<name>ruby+pthreads+oniguruma</name>
|
||
|
<name>ruby+oniguruma</name>
|
||
|
<range><ge>1.8.*,1</ge><lt>1.8.7.160_1,1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>The official ruby site reports:</p>
|
||
|
<blockquote cite="http://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal/">
|
||
|
<p>A denial of service (DoS) vulnerability was found on the
|
||
|
BigDecimal standard library of Ruby. Conversion from BigDecimal
|
||
|
objects into Float numbers had a problem which enables attackers
|
||
|
to effectively cause segmentation faults.</p>
|
||
|
<p>An attacker can cause a denial of service by causing BigDecimal
|
||
|
to parse an insanely large number, such as:</p>
|
||
|
<p><code>BigDecimal("9E69999999").to_s("F")</code></p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>35278</bid>
|
||
|
<cvename>CVE-2009-1904</cvename>
|
||
|
<url>http://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-06-09</discovery>
|
||
|
<entry>2009-06-13</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="da185955-5738-11de-b857-000f20797ede">
|
||
|
<topic>mozilla -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>firefox</name>
|
||
|
<range><lt>2.0.0.20_8,1</lt></range>
|
||
|
<range><gt>3.*,1</gt><lt>3.0.11,1</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>linux-firefox</name>
|
||
|
<name>linux-firefox-devel</name>
|
||
|
<range><lt>3.0.11</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>thunderbird</name>
|
||
|
<name>linux-thunderbird</name>
|
||
|
<range><lt>2.0.0.22</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>seamonkey</name>
|
||
|
<name>linux-seamonkey</name>
|
||
|
<range><lt>1.1.17</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Mozilla Foundation reports:</p>
|
||
|
<blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/firefox30.html">
|
||
|
<p>MFSA 2009-32 JavaScript chrome privilege escalation</p>
|
||
|
<p>MFSA 2009-31 XUL scripts bypass content-policy checks</p>
|
||
|
<p>MFSA 2009-30 Incorrect principal set for file: resources
|
||
|
loaded via location bar</p>
|
||
|
<p>MFSA 2009-29 Arbitrary code execution using event listeners
|
||
|
attached to an element whose owner document is null</p>
|
||
|
<p>MFSA 2009-28 Race condition while accessing the private data
|
||
|
of a NPObject JS wrapper class object</p>
|
||
|
<p>MFSA 2009-27 SSL tampering via non-200 responses to proxy
|
||
|
CONNECT requests</p>
|
||
|
<p>MFSA 2009-26 Arbitrary domain cookie access by local file:
|
||
|
resources</p>
|
||
|
<p>MFSA 2009-25 URL spoofing with invalid unicode characters</p>
|
||
|
<p>MFSA 2009-24 Crashes with evidence of memory corruption (rv:1.9.0.11)</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-1392</cvename>
|
||
|
<cvename>CVE-2009-1832</cvename>
|
||
|
<cvename>CVE-2009-1833</cvename>
|
||
|
<cvename>CVE-2009-1834</cvename>
|
||
|
<cvename>CVE-2009-1835</cvename>
|
||
|
<cvename>CVE-2009-1836</cvename>
|
||
|
<cvename>CVE-2009-1837</cvename>
|
||
|
<cvename>CVE-2009-1838</cvename>
|
||
|
<cvename>CVE-2009-1839</cvename>
|
||
|
<cvename>CVE-2009-1840</cvename>
|
||
|
<cvename>CVE-2009-1841</cvename>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-24.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-25.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-26.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-27.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-28.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-29.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-30.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-31.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-32.html</url>
|
||
|
<url>http://secunia.com/advisories/35331/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-06-11</discovery>
|
||
|
<entry>2009-06-12</entry>
|
||
|
<modified>2009-12-12</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="eb9212f7-526b-11de-bbf2-001b77d09812">
|
||
|
<topic>apr -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>apr</name>
|
||
|
<range><lt>1.3.5.1.3.7</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>apache</name>
|
||
|
<range><ge>2.2.0</ge><lt>2.2.11_5</lt></range>
|
||
|
<range><ge>2.0.0</ge><lt>2.0.63_3</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/35284/">
|
||
|
<p>Some vulnerabilities have been reported in APR-util, which
|
||
|
can be exploited by malicious users and malicious people to
|
||
|
cause a DoS (Denial of Service).</p>
|
||
|
<p>A vulnerability is caused due to an error in the processing
|
||
|
of XML files and can be exploited to exhaust all available
|
||
|
memory via a specially crafted XML file containing a
|
||
|
predefined entity inside an entity definition.</p>
|
||
|
<p>A vulnerability is caused due to an error within the
|
||
|
"apr_strmatch_precompile()" function in
|
||
|
strmatch/apr_strmatch.c, which can be exploited to crash an
|
||
|
application using the library.</p>
|
||
|
</blockquote>
|
||
|
<p>RedHat reports:</p>
|
||
|
<blockquote cite="https://bugzilla.redhat.com/show_bug.cgi?id=3D504390">
|
||
|
<p>A single NULL byte buffer overflow flaw was found in
|
||
|
apr-util's apr_brigade_vprintf() function.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>35221</bid>
|
||
|
<cvename>CVE-2009-1955</cvename>
|
||
|
<cvename>CVE-2009-1956</cvename>
|
||
|
<cvename>CVE-2009-0023</cvename>
|
||
|
<url>http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3</url>
|
||
|
<url>http://secunia.com/advisories/35284/</url>
|
||
|
<url>https://bugzilla.redhat.com/show_bug.cgi?id=3D504390</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-06-05</discovery>
|
||
|
<entry>2009-06-08</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="4f838b74-50a1-11de-b01f-001c2514716c">
|
||
|
<topic>dokuwiki -- Local File Inclusion with register_globals on</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>dokuwiki</name>
|
||
|
<range><lt>20090214_2</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>dokuwiki-devel</name>
|
||
|
<range><gt>0</gt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>DokuWiki reports:</p>
|
||
|
<blockquote cite="http://bugs.splitbrain.org/index.php?do=details&task_id=1700">
|
||
|
<p>A security hole was discovered which allows an attacker
|
||
|
to include arbitrary files located on the attacked DokuWiki
|
||
|
installation. The included file is executed in the PHP context.
|
||
|
This can be escalated by introducing malicious code through
|
||
|
uploading file via the media manager or placing PHP code in
|
||
|
editable pages.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-1960</cvename>
|
||
|
<url>http://bugs.splitbrain.org/index.php?do=details&task_id=1700</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-05-26</discovery>
|
||
|
<entry>2009-06-04</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="82b55df8-4d5a-11de-8811-0030843d3802">
|
||
|
<topic>openssl -- denial of service in DTLS implementation</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>openssl</name>
|
||
|
<range><ge>0.9.8</ge><lt>0.9.8k_1</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>linux-f10-openssl</name>
|
||
|
<range><ge>0.9.8f</ge><lt>0.9.8m</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/35128/">
|
||
|
<p>Some vulnerabilities have been reported in OpenSSL, which can be
|
||
|
exploited by malicious people to cause a DoS.</p>
|
||
|
<p>The library does not limit the number of buffered DTLS records with
|
||
|
a future epoch. This can be exploited to exhaust all available memory
|
||
|
via specially crafted DTLS packets.</p>
|
||
|
<p>An error when processing DTLS messages can be exploited to exhaust
|
||
|
all available memory by sending a large number of out of sequence
|
||
|
handshake messages.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-1377</cvename>
|
||
|
<cvename>CVE-2009-1378</cvename>
|
||
|
<url>http://secunia.com/advisories/35128/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-05-18</discovery>
|
||
|
<entry>2009-05-30</entry>
|
||
|
<modified>2014-04-10</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="399f4cd7-4d59-11de-8811-0030843d3802">
|
||
|
<topic>eggdrop -- denial of service vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>eggdrop</name>
|
||
|
<range><lt>1.6.19_2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/35104/">
|
||
|
<p>The vulnerability is caused due to an error in the processing of
|
||
|
private messages within the server module
|
||
|
(/mod/server.mod/servrmsg.c). This can be exploited to cause a
|
||
|
crash by sending a specially crafted message to the bot.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>34985</bid>
|
||
|
<cvename>CVE-2009-1789</cvename>
|
||
|
<url>http://www.eggheads.org/news/2009/05/14/35</url>
|
||
|
<url>http://secunia.com/advisories/35104/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-05-15</discovery>
|
||
|
<entry>2009-05-30</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="a2d4a330-4d54-11de-8811-0030843d3802">
|
||
|
<topic>wireshark -- PCNFSD Dissector Denial of Service Vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>ethereal</name>
|
||
|
<name>ethereal-lite</name>
|
||
|
<name>tethereal</name>
|
||
|
<name>tethereal-lite</name>
|
||
|
<name>wireshark</name>
|
||
|
<name>wireshark-lite</name>
|
||
|
<range><lt>1.0.8</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/35201/">
|
||
|
<p>A vulnerability has been reported in Wireshark, which can be
|
||
|
exploited by malicious people to cause a DoS.</p>
|
||
|
<p>The vulnerability is caused due to an error in the PCNFSD dissector
|
||
|
and can be exploited to cause a crash via a specially crafted PCNFSD
|
||
|
packet.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-1829</cvename>
|
||
|
<url>http://secunia.com/advisories/35201/</url>
|
||
|
<url>http://www.wireshark.org/security/wnpa-sec-2009-03.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-05-21</discovery>
|
||
|
<entry>2009-05-30</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="6355efdb-4d4d-11de-8811-0030843d3802">
|
||
|
<topic>libsndfile -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>libsndfile</name>
|
||
|
<range><lt>1.0.20</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/35076/">
|
||
|
<p>Two vulnerabilities have been reported in libsndfile, which can be
|
||
|
exploited by malicious people to compromise an application using the
|
||
|
library.</p>
|
||
|
<p>A boundary error exists within the "voc_read_header()" function in
|
||
|
src/voc.c. This can be exploited to cause a heap-based buffer overflow
|
||
|
via a specially crafted VOC file.</p>
|
||
|
<p>A boundary error exists within the "aiff_read_header()" function in
|
||
|
src/aiff.c. This can be exploited to cause a heap-based buffer overflow
|
||
|
via a specially crafted AIFF file.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-1788</cvename>
|
||
|
<cvename>CVE-2009-1791</cvename>
|
||
|
<url>http://secunia.com/advisories/35076/</url>
|
||
|
<url>http://www.trapkit.de/advisories/TKADV2009-006.txt</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-05-15</discovery>
|
||
|
<entry>2009-05-30</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="80f13884-4d4c-11de-8811-0030843d3802">
|
||
|
<topic>slim -- local disclosure of X authority magic cookie</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>slim</name>
|
||
|
<range><lt>1.3.1_3</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/35132/">
|
||
|
<p>A security issue has been reported in SLiM, which can be
|
||
|
exploited by malicious, local users to disclose sensitive
|
||
|
information.</p>
|
||
|
<p>The security issue is caused due to the application
|
||
|
generating the X authority file by passing the X authority
|
||
|
cookie via the command line to "xauth". This can be exploited
|
||
|
to disclose the X authority cookie by consulting the process
|
||
|
list and e.g. gain access the user's display.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>35015</bid>
|
||
|
<cvename>CVE-2009-1756</cvename>
|
||
|
<url>http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529306</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-05-20</discovery>
|
||
|
<entry>2009-05-30</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="4175c811-f690-4898-87c5-755b3cf1bac6">
|
||
|
<topic>ntp -- stack-based buffer overflow</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>ntp</name>
|
||
|
<range><lt>4.2.4p7</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>US-CERT reports:</p>
|
||
|
<blockquote cite="http://www.kb.cert.org/vuls/id/853097">
|
||
|
<p>ntpd contains a stack buffer overflow which may allow a remote
|
||
|
unauthenticated attacker to execute arbitrary code on a vulnerable
|
||
|
system or create a denial of service.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>35017</bid>
|
||
|
<cvename>CVE-2009-0159</cvename>
|
||
|
<cvename>CVE-2009-1252</cvename>
|
||
|
<url>http://www.kb.cert.org/vuls/id/853097</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-05-06</discovery>
|
||
|
<entry>2009-05-20</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="5ed2f96b-33b7-4863-8c6b-540d22344424">
|
||
|
<topic>imap-uw -- University of Washington IMAP c-client Remote Format String Vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>imap-uw</name>
|
||
|
<range><lt>2007e</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SecurityFocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/33795">
|
||
|
<p>University of Washington IMAP c-client is prone to a remote
|
||
|
format-string vulnerability because the software fails to adequately
|
||
|
sanitize user-supplied input before passing it as the
|
||
|
format-specifier to a formatted-printing function.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>33795</bid>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-17</discovery>
|
||
|
<entry>2009-05-21</entry>
|
||
|
<modified>2009-05-22</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="37a8603d-4494-11de-bea7-000c29a67389">
|
||
|
<topic>nsd -- buffer overflow vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>nsd</name>
|
||
|
<range><lt>3.2.2</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>nsd2</name>
|
||
|
<range><lt>2.3.7_1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>NLnet Labs:</p>
|
||
|
<blockquote cite="http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html">
|
||
|
<p>A one-byte buffer overflow has been reported in NSD. The
|
||
|
problem affects all versions 2.0.0 to 3.2.1. The bug allows
|
||
|
a carefully crafted exploit to bring down your DNS server. It
|
||
|
is highly unlikely that this one byte overflow can lead to
|
||
|
other (system) exploits.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-1755</cvename>
|
||
|
<url>http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-05-19</discovery>
|
||
|
<entry>2009-05-19</entry>
|
||
|
<modified>2009-05-22</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="48e14d86-42f1-11de-ad22-000e35248ad7">
|
||
|
<topic>libxine -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>libxine</name>
|
||
|
<range><lt>1.1.16.3</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>xine developers report:</p>
|
||
|
<blockquote cite="http://sourceforge.net/project/shownotes.php?group_id=9655&release_id=673233">
|
||
|
<ul>
|
||
|
<li>Fix another possible int overflow in the 4XM demuxer.
|
||
|
(ref. TKADV2009-004, CVE-2009-0385)</li>
|
||
|
<li>Fix an integer overflow in the Quicktime demuxer.</li>
|
||
|
</ul>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0385</cvename>
|
||
|
<cvename>CVE-2009-1274</cvename>
|
||
|
<url>http://trapkit.de/advisories/TKADV2009-004.txt</url>
|
||
|
<url>http://trapkit.de/advisories/TKADV2009-005.txt</url>
|
||
|
<url>http://sourceforge.net/project/shownotes.php?release_id=660071</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-04-04</discovery>
|
||
|
<entry>2009-05-17</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="51d1d428-42f0-11de-ad22-000e35248ad7">
|
||
|
<topic>libxine -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>libxine</name>
|
||
|
<range><lt>1.1.16.2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Multiple vulnerabilities were fixed in libxine 1.1.16.2.</p>
|
||
|
<p>Tobias Klein reports:</p>
|
||
|
<blockquote cite="http://trapkit.de/advisories/TKADV2009-004.txt">
|
||
|
<p>FFmpeg contains a type conversion vulnerability while
|
||
|
parsing malformed 4X movie files. The vulnerability may be
|
||
|
exploited by a (remote) attacker to execute arbitrary code in
|
||
|
the context of FFmpeg or an application using the FFmpeg
|
||
|
library.</p>
|
||
|
<p>Note: A similar issue also affects xine-lib < version
|
||
|
1.1.16.2.</p>
|
||
|
</blockquote>
|
||
|
<p>xine developers report:</p>
|
||
|
<blockquote cite="http://sourceforge.net/project/shownotes.php?group_id=9655&release_id=660071">
|
||
|
<ul>
|
||
|
<li>Fix broken size checks in various input plugins (ref.
|
||
|
CVE-2008-5239).</li>
|
||
|
<li>More malloc checking (ref. CVE-2008-5240).</li>
|
||
|
</ul>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0698</cvename>
|
||
|
<cvename>CVE-2008-5234</cvename>
|
||
|
<cvename>CVE-2008-5240</cvename>
|
||
|
<url>http://trapkit.de/advisories/TKADV2009-004.txt</url>
|
||
|
<url>http://sourceforge.net/project/shownotes.php?release_id=660071</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-15</discovery>
|
||
|
<entry>2009-05-17</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="1e8031be-4258-11de-b67a-0030843d3802">
|
||
|
<topic>php -- ini database truncation inside dba_replace() function</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>php4-dba</name>
|
||
|
<range><lt>4.4.9_1</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>php5-dba</name>
|
||
|
<range><lt>5.2.7</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>securityfocus research reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/archive/1/498746/30/0/threaded">
|
||
|
<p>A bug that leads to the emptying of the INI file contents if
|
||
|
the database key was not found exists in PHP dba extension in
|
||
|
versions 5.2.6, 4.4.9 and earlier.</p>
|
||
|
<p>Function dba_replace() are not filtering strings key and value.
|
||
|
There is a possibility for the destruction of the file.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-7068</cvename>
|
||
|
<url>http://www.securityfocus.com/archive/1/498746/30/0/threaded</url>
|
||
|
<url>http://securityreason.com/achievement_securityalert/58</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-11-28</discovery>
|
||
|
<entry>2009-05-16</entry>
|
||
|
<modified>2013-06-16</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="6a245f31-4254-11de-b67a-0030843d3802">
|
||
|
<topic>libwmf -- embedded GD library Use-After-Free vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>libwmf</name>
|
||
|
<range><lt>0.2.8.4_3</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/34901">
|
||
|
<p>A vulnerability has been reported in libwmf, which can be exploited
|
||
|
by malicious people to cause a DoS (Denial of Service) or compromise
|
||
|
an application using the library.</p>
|
||
|
<p>The vulnerability is caused due to a use-after-free error within the
|
||
|
embedded GD library, which can be exploited to cause a crash or
|
||
|
potentially to execute arbitrary code via a specially crafted WMF
|
||
|
file.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>34792</bid>
|
||
|
<cvename>CVE-2009-1364</cvename>
|
||
|
<url>https://bugzilla.redhat.com/show_bug.cgi?id=496864</url>
|
||
|
<url>https://rhn.redhat.com/errata/RHSA-2009-0457.html</url>
|
||
|
<url>http://secunia.com/advisories/34901/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-05-05</discovery>
|
||
|
<entry>2009-05-16</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="48aab1d0-4252-11de-b67a-0030843d3802">
|
||
|
<topic>libwmf -- integer overflow vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>libwmf</name>
|
||
|
<range><lt>0.2.8.4_3</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/20921">
|
||
|
<p>infamous41md has reported a vulnerability in libwmf, which
|
||
|
potentially can be exploited by malicious people to compromise an
|
||
|
application using the vulnerable library.</p>
|
||
|
<p>The vulnerability is caused due to an integer overflow error when
|
||
|
allocating memory based on a value taken directly from a WMF file
|
||
|
without performing any checks. This can be exploited to cause a
|
||
|
heap-based buffer overflow when a specially crafted WMF file is
|
||
|
processed.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>18751</bid>
|
||
|
<cvename>CVE-2006-3376</cvename>
|
||
|
<url>http://secunia.com/advisories/20921/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2006-07-03</discovery>
|
||
|
<entry>2009-05-16</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="bfe218a5-4218-11de-b67a-0030843d3802">
|
||
|
<topic>moinmoin -- cross-site scripting vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>moinmoin</name>
|
||
|
<range><lt>1.8.3</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/34821/">
|
||
|
<p>Input passed via multiple parameters to action/AttachFile.py is not
|
||
|
properly sanitised before being returned to the user. This can be
|
||
|
exploited to execute arbitrary HTML and script code in a user's
|
||
|
browser session in the context of an affected site.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-1482</cvename>
|
||
|
<url>http://secunia.com/advisories/34821/</url>
|
||
|
<url>http://moinmo.in/SecurityFixes</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-04-21</discovery>
|
||
|
<entry>2009-05-16</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="4a638895-41b7-11de-b1cc-00219b0fc4d8">
|
||
|
<topic>mod_perl -- cross-site scripting</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>mod_perl</name>
|
||
|
<range><lt>1.31</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>mod_perl2</name>
|
||
|
<range><lt>2.05</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/3459796">
|
||
|
<p>Certain input passed to the "Apache::Status" and "Apache2::Status"
|
||
|
modules is not properly sanitised before being returned to the user.
|
||
|
This can be exploited to execute arbitrary HTML and script code in a
|
||
|
user's browser session in context of an affected website.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0796</cvename>
|
||
|
<url>http://secunia.com/advisories/34597</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-28</discovery>
|
||
|
<entry>2009-05-16</entry>
|
||
|
<modified>2009-05-16</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="a6605f4b-4067-11de-b444-001372fd0af2">
|
||
|
<topic>drupal -- cross-site scripting</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>drupal5</name>
|
||
|
<range><lt>5.18</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>drupal6</name>
|
||
|
<range><lt>6.12</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>The Drupal Security Team reports:</p>
|
||
|
<blockquote cite="http://drupal.org/node/461886">
|
||
|
<p>When outputting user-supplied data Drupal strips potentially
|
||
|
dangerous HTML attributes and tags or escapes characters which
|
||
|
have a special meaning in HTML. This output filtering secures the
|
||
|
site against cross site scripting attacks via user input.</p>
|
||
|
<p>Certain byte sequences that are valid in the UTF-8 specification
|
||
|
are potentially dangerous when interpreted as UTF-7. Internet
|
||
|
Explorer 6 and 7 may decode these characters as UTF-7 if they
|
||
|
appear before the <meta http-equiv="Content-Type" /> tag that
|
||
|
specifies the page content as UTF-8, despite the fact that Drupal
|
||
|
also sends a real HTTP header specifying the content as UTF-8.
|
||
|
This enables attackers to execute cross site scripting attacks
|
||
|
with UTF-7. SA-CORE-2009-005 - Drupal core - Cross site scripting
|
||
|
contained an incomplete fix for the issue. HTML exports of books
|
||
|
are still vulnerable, which means that anyone with edit
|
||
|
permissions for pages in outlines is able to insert arbitrary HTML
|
||
|
and script code in these exports.</p>
|
||
|
<p>Additionally, the taxonomy module allows users with the
|
||
|
'administer taxonomy' permission to inject arbitrary HTML and
|
||
|
script code in the help text of any vocabulary.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://drupal.org/node/461886</url>
|
||
|
<url>http://secunia.com/advisories/35045</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-05-13</discovery>
|
||
|
<entry>2009-05-14</entry>
|
||
|
<modified>2009-05-16</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="14ab174c-40ef-11de-9fd5-001bd3385381">
|
||
|
<topic>cyrus-sasl -- buffer overflow vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>cyrus-sasl</name>
|
||
|
<range><lt>2.1.23</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>US-CERT reports:</p>
|
||
|
<blockquote cite="http://www.kb.cert.org/vuls/id/238019">
|
||
|
<p>The sasl_encode64() function converts a string into
|
||
|
base64. The Cyrus SASL library contains buffer overflows
|
||
|
that occur because of unsafe use of the sasl_encode64()
|
||
|
function.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0688</cvename>
|
||
|
<url>http://www.kb.cert.org/vuls/id/238019</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-04-08</discovery>
|
||
|
<entry>2009-05-15</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="fc4d0ae8-3fa3-11de-a3fd-0030843d3802">
|
||
|
<topic>moinmoin -- multiple cross site scripting vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>moinmoin</name>
|
||
|
<range><lt>1.8.2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33593/">
|
||
|
<p>Some vulnerabilities have been reported in MoinMoin, which can be
|
||
|
exploited by malicious people to conduct cross-site scripting attacks.</p>
|
||
|
<p>Input passed to multiple parameters in action/AttachFile.py is not
|
||
|
properly sanitised before being returned to the user. This can be
|
||
|
exploited to execute arbitrary HTML and script code in a user's
|
||
|
browser session in the context of an affected site.</p>
|
||
|
<p>Certain input passed to security/antispam.py is not properly
|
||
|
sanitised before being returned to the user. This can be exploited to
|
||
|
execute arbitrary HTML and script code in a user's browser session in
|
||
|
the context of an affected site.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0260</cvename>
|
||
|
<cvename>CVE-2009-0312</cvename>
|
||
|
<url>http://moinmo.in/SecurityFixes</url>
|
||
|
<url>http://secunia.com/advisories/33593</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-01-21</discovery>
|
||
|
<entry>2009-05-13</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="f0f97b94-3f95-11de-a3fd-0030843d3802">
|
||
|
<topic>ghostscript -- buffer overflow vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>ghostscript8</name>
|
||
|
<name>ghostscript8-nox11</name>
|
||
|
<range><lt>8.64</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SecurityFocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/34340/discuss">
|
||
|
<p>Ghostscript is prone to a remote buffer-overflow vulnerability
|
||
|
because it fails to properly bounds-check user-supplied input before
|
||
|
copying it into a finite-sized buffer.</p>
|
||
|
<p>Exploiting this issue allows remote attackers to overwrite a
|
||
|
sensitive memory buffer with arbitrary data, potentially allowing them
|
||
|
to execute malicious machine code in the context of the affected
|
||
|
application. This vulnerability may facilitate the compromise of
|
||
|
affected computers.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>34340</bid>
|
||
|
<cvename>CVE-2008-6679</cvename>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-03</discovery>
|
||
|
<entry>2009-05-13</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="4b172278-3f46-11de-becb-001cc0377035">
|
||
|
<topic>pango -- integer overflow</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>pango</name>
|
||
|
<name>linux-pango</name>
|
||
|
<name>linux-f8-pango</name>
|
||
|
<name>linux-f10-pango</name>
|
||
|
<range><lt>1.24</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>oCERT reports:</p>
|
||
|
<blockquote cite="http://www.ocert.org/advisories/ocert-2009-001.html">
|
||
|
<p>Pango suffers from a multiplicative integer overflow which
|
||
|
may lead to a potentially exploitable, heap overflow depending
|
||
|
on the calling conditions.</p>
|
||
|
<p>For example, this vulnerability is remotely reachable in Firefox
|
||
|
by creating an overly large document.location value but only results
|
||
|
in a process-terminating, allocation error (denial of service).</p>
|
||
|
<p>The affected function is pango_glyph_string_set_size. An overflow
|
||
|
check when doubling the size neglects the overflow possible on the
|
||
|
subsequent allocation.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>34870</bid>
|
||
|
<cvename>CVE-2009-1194</cvename>
|
||
|
<url>http://secunia.com/advisories/35021/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-22</discovery>
|
||
|
<entry>2009-05-13</entry>
|
||
|
<modified>2009-10-01</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="defce068-39aa-11de-a493-001b77d09812">
|
||
|
<topic>wireshark -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>ethereal</name>
|
||
|
<name>ethereal-lite</name>
|
||
|
<name>tethereal</name>
|
||
|
<name>tethereal-lite</name>
|
||
|
<name>wireshark</name>
|
||
|
<name>wireshark-lite</name>
|
||
|
<range><lt>1.0.7</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Wireshark team reports:</p>
|
||
|
<blockquote cite="http://www.wireshark.org/security/wnpa-sec-2009-02.html">
|
||
|
<p>Wireshark 1.0.7 fixes the following vulnerabilities:</p>
|
||
|
<ul>
|
||
|
<li>The PROFINET dissector was vulnerable to a format
|
||
|
string overflow. (Bug 3382) Versions affected: 0.99.6 to
|
||
|
1.0.6, CVE-2009-1210.</li>
|
||
|
<li>The Check Point High-Availability Protocol (CPHAP)
|
||
|
dissector could crash. (Bug 3269) Versions affected: 0.9.6
|
||
|
to 1.0.6; CVE-2009-1268.</li>
|
||
|
<li>Wireshark could crash while loading a Tektronix .rf5
|
||
|
file. (Bug 3366) Versions affected: 0.99.6 to 1.0.6,
|
||
|
CVE-2009-1269.</li>
|
||
|
</ul>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>34291</bid>
|
||
|
<bid>34457</bid>
|
||
|
<cvename>CVE-2009-1210</cvename>
|
||
|
<cvename>CVE-2009-1268</cvename>
|
||
|
<cvename>CVE-2009-1269</cvename>
|
||
|
<url>http://www.wireshark.org/security/wnpa-sec-2009-02.html</url>
|
||
|
<url>http://secunia.com/advisories/34542</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-04-06</discovery>
|
||
|
<entry>2009-05-09</entry>
|
||
|
<modified>2009-05-13</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="736e55bc-39bb-11de-a493-001b77d09812">
|
||
|
<topic>cups -- remote code execution and DNS rebinding</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>cups-base</name>
|
||
|
<range><lt>1.3.10</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Gentoo security team summarizes:</p>
|
||
|
<blockquote cite="http://www.gentoo.org/security/en/glsa/glsa-200904-20.xml">
|
||
|
<p>The following issues were reported in CUPS:</p>
|
||
|
<ul>
|
||
|
<li>iDefense reported an integer overflow in the
|
||
|
_cupsImageReadTIFF() function in the "imagetops" filter,
|
||
|
leading to a heap-based buffer overflow (CVE-2009-0163).</li>
|
||
|
<li>Aaron Siegel of Apple Product Security reported that the
|
||
|
CUPS web interface does not verify the content of the "Host"
|
||
|
HTTP header properly (CVE-2009-0164).</li>
|
||
|
<li>Braden Thomas and Drew Yao of Apple Product Security
|
||
|
reported that CUPS is vulnerable to CVE-2009-0146,
|
||
|
CVE-2009-0147 and CVE-2009-0166, found earlier in xpdf and
|
||
|
poppler.</li>
|
||
|
</ul>
|
||
|
<p>A remote attacker might send or entice a user to send a
|
||
|
specially crafted print job to CUPS, possibly resulting in the
|
||
|
execution of arbitrary code with the privileges of the
|
||
|
configured CUPS user -- by default this is "lp", or a Denial
|
||
|
of Service. Furthermore, the web interface could be used to
|
||
|
conduct DNS rebinding attacks.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>34571</bid>
|
||
|
<bid>34665</bid>
|
||
|
<bid>34568</bid>
|
||
|
<cvename>CVE-2009-0163</cvename>
|
||
|
<cvename>CVE-2009-0164</cvename>
|
||
|
<cvename>CVE-2009-0146</cvename>
|
||
|
<cvename>CVE-2009-0147</cvename>
|
||
|
<cvename>CVE-2009-0166</cvename>
|
||
|
<url>http://www.cups.org/articles.php?L582</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-05-05</discovery>
|
||
|
<entry>2009-05-07</entry>
|
||
|
<modified>2009-05-13</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="fbc8413f-2f7a-11de-9a3f-001b77d09812">
|
||
|
<topic>FreeBSD -- remotely exploitable crash in OpenSSL</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>FreeBSD</name>
|
||
|
<range><ge>6.3</ge><lt>6.3_10</lt></range>
|
||
|
<range><ge>6.4</ge><lt>6.4_4</lt></range>
|
||
|
<range><ge>7.0</ge><lt>7.0_12</lt></range>
|
||
|
<range><ge>7.1</ge><lt>7.1_5</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<h1>Problem Description</h1>
|
||
|
<p>The function ASN1_STRING_print_ex does not properly validate
|
||
|
the lengths of BMPString or UniversalString objects before
|
||
|
attempting to print them.</p>
|
||
|
<h1>Impact</h1>
|
||
|
<p>An application which attempts to print a BMPString or
|
||
|
UniversalString which has an invalid length will crash as a
|
||
|
result of OpenSSL accessing invalid memory locations. This
|
||
|
could be used by an attacker to crash a remote application.</p>
|
||
|
<h1>Workaround</h1>
|
||
|
<p>No workaround is available, but applications which do not use
|
||
|
the ASN1_STRING_print_ex function (either directly or indirectly)
|
||
|
are not affected.</p>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<freebsdsa>SA-09:08.openssl</freebsdsa>
|
||
|
<cvename>CVE-2009-0590</cvename>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-03-25</discovery>
|
||
|
<entry>2009-05-07</entry>
|
||
|
<modified>2009-05-13</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="2748fdde-3a3c-11de-bbc5-00e0815b8da8">
|
||
|
<topic>quagga -- Denial of Service</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>quagga</name>
|
||
|
<range><lt>0.99.11_3</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Debian Security Team reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/archive/1/503220">
|
||
|
<p>It was discovered that Quagga, an IP routing daemon, could
|
||
|
no longer process the Internet routing table due to broken
|
||
|
handling of multiple 4-byte AS numbers in an AS path. If such
|
||
|
a prefix is received, the BGP daemon crashes with an assert
|
||
|
failure leading to a denial of service.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>34656</bid>
|
||
|
<mlist msgid="Pine.LNX.4.64.0904301931590.24373@nacho.alt.net">http://lists.quagga.net/pipermail/quagga-dev/2009-April/006541.html</mlist>
|
||
|
<cvename>CVE-2009-1572</cvename>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-05-04</discovery>
|
||
|
<entry>2009-05-06</entry>
|
||
|
<modified>2009-05-07</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="e3e30d99-58a8-4a3f-8059-a8b7cd59b881">
|
||
|
<topic>openfire -- Openfire No Password Changes Security Bypass</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>openfire</name>
|
||
|
<range><lt>3.6.4</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/34984/">
|
||
|
<p>A vulnerability has been reported in Openfire which can
|
||
|
be exploited by malicious users to bypass certain security
|
||
|
restrictions. The vulnerability is caused due to Openfire
|
||
|
not properly respecting the no password changes setting which
|
||
|
can be exploited to change passwords by sending jabber:iq:auth
|
||
|
passwd_change requests to the server.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-1596</cvename>
|
||
|
<url>http://secunia.com/advisories/34984/</url>
|
||
|
<url>http://www.igniterealtime.org/issues/browse/JM-1532</url>
|
||
|
<url>http://www.igniterealtime.org/community/message/190288#190288</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-05-04</discovery>
|
||
|
<entry>2009-05-04</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="7a1ab8d4-35c1-11de-9672-0030843d3802">
|
||
|
<topic>drupal -- cross site scripting</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>drupal5</name>
|
||
|
<range><lt>5.17</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>drupal6</name>
|
||
|
<range><lt>6.11</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Drupal Security Team reports:</p>
|
||
|
<blockquote cite="http://drupal.org/node/449078">
|
||
|
<p>When outputting user-supplied data Drupal strips potentially
|
||
|
dangerous HTML attributes and tags or escapes characters which have a
|
||
|
special meaning in HTML. This output filtering secures the site
|
||
|
against cross site scripting attacks via user input.</p>
|
||
|
<p>Certain byte sequences that are valid in the UTF-8 specification
|
||
|
are potentially dangerous when interpreted as UTF-7. Internet Explorer
|
||
|
6 and 7 may decode these characters as UTF-7 if they appear before the
|
||
|
meta http-equiv="Content-Type" tag that specifies the page content
|
||
|
as UTF-8, despite the fact that Drupal also sends a real HTTP header
|
||
|
specifying the content as UTF-8. This behaviour enables malicious
|
||
|
users to insert and execute Javascript in the context of the website
|
||
|
if site visitors are allowed to post content.</p>
|
||
|
<p>In addition, Drupal core also has a very limited information
|
||
|
disclosure vulnerability under very specific conditions. If a user is
|
||
|
tricked into visiting the site via a specially crafted URL and then
|
||
|
submits a form (such as the search box) from that page, the
|
||
|
information in their form submission may be directed to a third-party
|
||
|
site determined by the URL and thus disclosed to the third party. The
|
||
|
third party site may then execute a CSRF attack against the submitted
|
||
|
form.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-1575</cvename>
|
||
|
<cvename>CVE-2009-1576</cvename>
|
||
|
<url>http://drupal.org/node/449078</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-04-30</discovery>
|
||
|
<entry>2009-04-30</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="3b18e237-2f15-11de-9672-0030843d3802">
|
||
|
<topic>mozilla -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>firefox</name>
|
||
|
<range><lt>2.0.0.20_7,1</lt></range>
|
||
|
<range><gt>3.*,1</gt><lt>3.0.9,1</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>linux-firefox</name>
|
||
|
<name>linux-firefox-devel</name>
|
||
|
<range><lt>3.0.9</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>linux-seamonkey-devel</name>
|
||
|
<range><gt>0</gt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>seamonkey</name>
|
||
|
<name>linux-seamonkey</name>
|
||
|
<range><lt>1.1.17</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>thunderbird</name>
|
||
|
<name>linux-thunderbird</name>
|
||
|
<range><lt>2.0.0.22</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Mozilla Foundation reports:</p>
|
||
|
<blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
|
||
|
<p>MFSA 2009-22: Firefox allows Refresh header to redirect to
|
||
|
javascript: URIs</p>
|
||
|
<p>MFSA 2009-21: POST data sent to wrong site when saving web page
|
||
|
with embedded frame</p>
|
||
|
<p>MFSA 2009-20: Malicious search plugins can inject code into
|
||
|
arbitrary sites</p>
|
||
|
<p>MFSA 2009-19: Same-origin violations in XMLHttpRequest and
|
||
|
XPCNativeWrapper.toString</p>
|
||
|
<p>MFSA 2009-18: XSS hazard using third-party stylesheets and XBL
|
||
|
bindings</p>
|
||
|
<p>MFSA 2009-17: Same-origin violations when Adobe Flash loaded via
|
||
|
view-source: scheme</p>
|
||
|
<p>MFSA 2009-16: jar: scheme ignores the content-disposition: header
|
||
|
on the inner URI</p>
|
||
|
<p>MFSA 2009-15: URL spoofing with box drawing character</p>
|
||
|
<p>MFSA 2009-14 Crashes with evidence of memory corruption
|
||
|
(rv:1.9.0.9)</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>34656</bid>
|
||
|
<cvename>CVE-2009-1303</cvename>
|
||
|
<cvename>CVE-2009-1306</cvename>
|
||
|
<cvename>CVE-2009-1307</cvename>
|
||
|
<cvename>CVE-2009-1308</cvename>
|
||
|
<cvename>CVE-2009-1309</cvename>
|
||
|
<cvename>CVE-2009-1312</cvename>
|
||
|
<cvename>CVE-2009-1311</cvename>
|
||
|
<cvename>CVE-2009-1302</cvename>
|
||
|
<cvename>CVE-2009-1304</cvename>
|
||
|
<cvename>CVE-2009-1305</cvename>
|
||
|
<cvename>CVE-2009-1310</cvename>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-22.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-21.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-20.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-19.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-18.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-17.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-16.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-15.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-14.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-04-21</discovery>
|
||
|
<entry>2009-04-22</entry>
|
||
|
<modified>2009-12-12</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="50d233d9-374b-46ce-922d-4e6b3f777bef">
|
||
|
<topic>poppler -- Poppler Multiple Vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>poppler</name>
|
||
|
<range><lt>0.10.6</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite=" http://secunia.com/advisories/34746/">
|
||
|
<p>Some vulnerabilities have been reported in Poppler which can be
|
||
|
exploited by malicious people to potentially compromise an
|
||
|
application using the library.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://secunia.com/advisories/34746/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-04-17</discovery>
|
||
|
<entry>2009-04-18</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="a21037d5-2c38-11de-ab3b-0017a4cccfc6">
|
||
|
<topic>xpdf -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>xpdf</name>
|
||
|
<range><lt>3.02_11</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://www.vupen.com/english/advisories/2009/1065">
|
||
|
<p>Some vulnerabilities have been reported in Xpdf, which can be
|
||
|
exploited by malicious people to potentially compromise a user's
|
||
|
system.</p>
|
||
|
<p>A boundary error exists when decoding JBIG2 symbol dictionary
|
||
|
segments. This can be exploited to cause a heap-based buffer
|
||
|
overflow and potentially execute arbitrary code.</p>
|
||
|
<p>Multiple integer overflows in the JBIG2 decoder can be
|
||
|
exploited to potentially execute arbitrary code.</p>
|
||
|
<p>Multiple boundary errors in the JBIG2 decoder can be
|
||
|
exploited to cause buffer overflows and potentially execute
|
||
|
arbitrary code.</p>
|
||
|
<p>Multiple errors in the JBIG2 decoder can be exploited can be
|
||
|
exploited to free arbitrary memory and potentially execute arbitrary
|
||
|
code.</p>
|
||
|
<p>Multiple unspecified input validation errors in the JBIG2 decoder can
|
||
|
be exploited to potentially execute arbitrary code.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0146</cvename>
|
||
|
<cvename>CVE-2009-0147</cvename>
|
||
|
<cvename>CVE-2009-0166</cvename>
|
||
|
<cvename>CVE-2009-0799</cvename>
|
||
|
<cvename>CVE-2009-0800</cvename>
|
||
|
<cvename>CVE-2009-1179</cvename>
|
||
|
<cvename>CVE-2009-1180</cvename>
|
||
|
<cvename>CVE-2009-1181</cvename>
|
||
|
<cvename>CVE-2009-1182</cvename>
|
||
|
<cvename>CVE-2009-1183</cvename>
|
||
|
<url>http://secunia.com/advisories/34291</url>
|
||
|
<url>http://www.vupen.com/english/advisories/2009/1065</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-04-16</discovery>
|
||
|
<entry>2009-04-18</entry>
|
||
|
<modified>2009-04-18</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="20b4f284-2bfc-11de-bdeb-0030843d3802">
|
||
|
<topic>freetype2 -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>freetype2</name>
|
||
|
<range><lt>2.3.9_1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/34723/">
|
||
|
<p>Some vulnerabilities have been reported in FreeType, which can be
|
||
|
exploited by malicious people to potentially compromise an application
|
||
|
using the library.</p>
|
||
|
<p>An integer overflow error within the "cff_charset_compute_cids()"
|
||
|
function in cff/cffload.c can be exploited to potentially cause a
|
||
|
heap-based buffer overflow via a specially crafted font.</p>
|
||
|
<p>Multiple integer overflow errors within validation functions in
|
||
|
sfnt/ttcmap.c can be exploited to bypass length validations and
|
||
|
potentially cause buffer overflows via specially crafted fonts.</p>
|
||
|
<p>An integer overflow error within the "ft_smooth_render_generic()"
|
||
|
function in smooth/ftsmooth.c can be exploited to potentially cause a
|
||
|
heap-based buffer overflow via a specially crafted font.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0946</cvename>
|
||
|
<url>http://secunia.com/advisories/34723/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-04-16</discovery>
|
||
|
<entry>2009-04-18</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="cf91c1e4-2b6d-11de-931b-00e0815b8da8">
|
||
|
<topic>ejabberd -- cross-site scripting vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>ejabberd</name>
|
||
|
<range><lt>2.0.4</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SecurityFocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/34133">
|
||
|
<p>The ejabberd application is prone to a cross-site scripting
|
||
|
vulnerability.</p>
|
||
|
<p>An attacker may leverage this issue to execute arbitrary script code
|
||
|
in the browser of an unsuspecting user in the context of the affected
|
||
|
site and to steal cookie-based authentication credentials.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>34133</bid>
|
||
|
<cvename>CVE-2009-0934</cvename>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-03-16</discovery>
|
||
|
<entry>2009-04-17</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="872ae5be-29c0-11de-bdeb-0030843d3802">
|
||
|
<topic>ziproxy -- multiple vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>ziproxy</name>
|
||
|
<range><lt>2.7.0</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Ziproxy Developers reports:</p>
|
||
|
<blockquote cite="http://www.kb.cert.org/vuls/id/MAPG-7N9GN8">
|
||
|
<p>Multiple HTTP proxy implementations are prone to an
|
||
|
information-disclosure vulnerability related to the interpretation of
|
||
|
the 'Host' HTTP header. Specifically, this issue occurs when the proxy
|
||
|
makes a forwarding decision based on the 'Host' HTTP header instead of
|
||
|
the destination IP address.</p>
|
||
|
<p>Attackers may exploit this issue to obtain sensitive information
|
||
|
such as internal intranet webpages. Additional attacks may also be
|
||
|
possible.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>33858</bid>
|
||
|
<cvename>CVE-2009-0804</cvename>
|
||
|
<url>http://www.kb.cert.org/vuls/id/MAPG-7N9GN8</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-23</discovery>
|
||
|
<entry>2009-04-15</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="1a0e4cc6-29bf-11de-bdeb-0030843d3802">
|
||
|
<topic>phpmyadmin -- insufficient output sanitizing when generating configuration file</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>phpMyAdmin</name>
|
||
|
<range><lt>3.1.3.2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>phpMyAdmin Team reports:</p>
|
||
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2009-4.php">
|
||
|
<p>Setup script used to generate configuration can be fooled using a
|
||
|
crafted POST request to include arbitrary PHP code in generated
|
||
|
configuration file. Combined with ability to save files on server,
|
||
|
this can allow unauthenticated users to execute arbitrary PHP code.
|
||
|
This issue is on different parameters than PMASA-2009-3 and it was
|
||
|
missed out of our radar because it was not existing in 2.11.x
|
||
|
branch.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-1285</cvename>
|
||
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2009-4.php</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-04-14</discovery>
|
||
|
<entry>2009-04-15</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="03d22656-2690-11de-8226-0030843d3802">
|
||
|
<topic>drupal6-cck -- cross-site scripting</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>drupal6-cck</name>
|
||
|
<range><lt>2.2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Drupal CCK plugin developer reports:</p>
|
||
|
<blockquote cite="http://drupal.org/node/406520">
|
||
|
<p>The Node reference and User reference sub-modules, which
|
||
|
are part of the Content Construction Kit (CCK) project, lets
|
||
|
administrators define node fields that are references to other
|
||
|
nodes or to users. When displaying a node edit form, the
|
||
|
titles of candidate referenced nodes or names of candidate
|
||
|
referenced users are not properly filtered, allowing malicious
|
||
|
users to inject arbitrary code on those pages. Such a cross
|
||
|
site scripting (XSS) attack may lead to a malicious user
|
||
|
gaining full administrative access.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>34172</bid>
|
||
|
<cvename>CVE-2009-1069</cvename>
|
||
|
<url>http://drupal.org/node/406520</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-03-23</discovery>
|
||
|
<entry>2009-04-11</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="0fe73a4a-1b18-11de-8226-0030843d3802">
|
||
|
<topic>pivot-weblog -- file deletion vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>pivot-weblog</name>
|
||
|
<range><lt>1.40.7</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/34302">
|
||
|
<p>A vulnerability has been discovered in Pivot, which can be
|
||
|
exploited by malicious people to delete certain files.</p>
|
||
|
<p>Input passed to the "refkey" parameter in
|
||
|
extensions/bbclone_tools/count.php is not properly sanitised
|
||
|
before being used to delete files. This can be exploited to
|
||
|
delete files with the permissions of the web server via directory
|
||
|
traversal sequences passed within the "refkey" parameter.</p>
|
||
|
<p>NOTE: Users with the "Advanced" user level are able to include and
|
||
|
execute uploaded PHP code via the "pivot_path" parameter in
|
||
|
extensions/bbclone_tools/getkey.php when
|
||
|
extensions/bbclone_tools/hr_conf.php can be deleted.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>34160</bid>
|
||
|
<url>http://secunia.com/advisories/34302/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-03-18</discovery>
|
||
|
<entry>2009-03-27</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="06f9174f-190f-11de-b2f0-001c2514716c">
|
||
|
<topic>phpmyadmin -- insufficient output sanitizing when generating configuration file</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>phpMyAdmin211</name>
|
||
|
<range><lt>2.11.9.5</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>phpMyAdmin</name>
|
||
|
<range><lt>3.1.3.1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>phpMyAdmin reports:</p>
|
||
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2009-3.php">
|
||
|
<p>Setup script used to generate configuration can be fooled
|
||
|
using a crafted POST request to include arbitrary PHP code
|
||
|
in generated configuration file.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-1151</cvename>
|
||
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2009-3.php</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-03-24</discovery>
|
||
|
<entry>2009-03-25</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="6bb6188c-17b2-11de-ae4d-0030843d3802">
|
||
|
<topic>amarok -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>amarok</name>
|
||
|
<range><lt>1.4.10_3</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33505">
|
||
|
<p>Tobias Klein has reported some vulnerabilities in Amarok, which
|
||
|
potentially can be exploited by malicious people to compromise a
|
||
|
user's system.</p>
|
||
|
<p>Two integer overflow errors exist within the
|
||
|
"Audible::Tag::readTag()" function in
|
||
|
src/metadata/audible/audibletag.cpp. These can be exploited to cause
|
||
|
heap-based buffer overflows via specially crafted Audible Audio
|
||
|
files.</p>
|
||
|
<p>Two errors within the "Audible::Tag::readTag()" function in
|
||
|
src/metadata/audible/audibletag.cpp can be exploited to corrupt
|
||
|
arbitrary memory via specially crafted Audible Audio files.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>33210</bid>
|
||
|
<cvename>CVE-2009-0135</cvename>
|
||
|
<cvename>CVE-2009-0136</cvename>
|
||
|
<url>http://www.debian.org/security/2009/dsa-1706</url>
|
||
|
<url>http://secunia.com/advisories/33505</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-01-12</discovery>
|
||
|
<entry>2009-03-23</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="f6f19735-9245-4918-8a60-87948ebb4907">
|
||
|
<topic>wireshark -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>ethereal</name>
|
||
|
<name>ethereal-lite</name>
|
||
|
<name>tethereal</name>
|
||
|
<name>tethereal-lite</name>
|
||
|
<name>wireshark</name>
|
||
|
<name>wireshark-lite</name>
|
||
|
<range><lt>1.0.6</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Vendor reports:</p>
|
||
|
<blockquote cite="http://www.wireshark.org/security/wnpa-sec-2009-01.html">
|
||
|
<p>On non-Windows systems Wireshark could crash if the HOME
|
||
|
environment variable contained sprintf-style string formatting
|
||
|
characters. Wireshark could crash while reading a malformed
|
||
|
NetScreen snoop file. Wireshark could crash while reading a
|
||
|
Tektronix K12 text capture file.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0599</cvename>
|
||
|
<cvename>CVE-2009-0600</cvename>
|
||
|
<cvename>CVE-2009-0601</cvename>
|
||
|
<url>http://www.wireshark.org/security/wnpa-sec-2009-01.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-06</discovery>
|
||
|
<entry>2009-03-22</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="72cba7b0-13cd-11de-a964-0030843d3802">
|
||
|
<topic>netatalk -- arbitrary command execution in papd daemon</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>netatalk</name>
|
||
|
<range><lt>2.0.3_5,1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33227/">
|
||
|
<p>A vulnerability has been reported in Netatalk, which potentially
|
||
|
can be exploited by malicious users to compromise a vulnerable system.</p>
|
||
|
<p>The vulnerability is caused due to the papd daemon improperly
|
||
|
sanitising several received parameters before passing them in a call
|
||
|
to popen(). This can be exploited to execute arbitrary commands via
|
||
|
a specially crafted printing request.</p>
|
||
|
<p>Successful exploitation requires that a printer is configured to
|
||
|
pass arbitrary values as parameters to a piped command.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>32925</bid>
|
||
|
<cvename>CVE-2008-5718</cvename>
|
||
|
<url>http://secunia.com/advisories/33227/</url>
|
||
|
<url>http://www.openwall.com/lists/oss-security/2009/01/13/3</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-12-19</discovery>
|
||
|
<entry>2009-03-18</entry>
|
||
|
<modified>2009-03-18</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="37a365ed-1269-11de-a964-0030843d3802">
|
||
|
<topic>gstreamer-plugins-good -- multiple memory overflows</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>gstreamer-plugins-good</name>
|
||
|
<range><ge>0.10.9,3</ge><lt>0.10.12,3</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33650/">
|
||
|
<p>Tobias Klein has reported some vulnerabilities in GStreamer Good
|
||
|
Plug-ins, which can potentially be exploited by malicious people to
|
||
|
compromise a vulnerable system.</p>
|
||
|
<p>A boundary error occurs within the "qtdemux_parse_samples()"
|
||
|
function in gst/gtdemux/qtdemux.c when performing QuickTime "ctts"
|
||
|
Atom parsing. This can be exploited to cause a heap-based buffer
|
||
|
overflow via a specially crafted QuickTime media file.</p>
|
||
|
<p>An array indexing error exists in the "qtdemux_parse_samples()"
|
||
|
function in gst/gtdemux/qtdemux.c when performing QuickTime "stss"
|
||
|
Atom parsing. This can be exploited to corrupt memory via a specially
|
||
|
crafted QuickTime media file.</p>
|
||
|
<p>A boundary error occurs within the "qtdemux_parse_samples()"
|
||
|
function in gst/gtdemux/qtdemux.c when performing QuickTime "stts"
|
||
|
Atom parsing. This can be exploited to cause a heap-based buffer
|
||
|
overflow via a specially crafted QuickTime media file.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0386</cvename>
|
||
|
<cvename>CVE-2009-0387</cvename>
|
||
|
<cvename>CVE-2009-0397</cvename>
|
||
|
<url>http://secunia.com/advisories/33650/</url>
|
||
|
<url>http://trapkit.de/advisories/TKADV2009-003.txt</url>
|
||
|
<url>http://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-01-22</discovery>
|
||
|
<entry>2009-03-16</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="c5af0747-1262-11de-a964-0030843d3802">
|
||
|
<topic>libsndfile -- CAF processing integer overflow vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>libsndfile</name>
|
||
|
<range><lt>1.0.19</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33980/">
|
||
|
<p>The vulnerability is caused due to an integer overflow error in the
|
||
|
processing of CAF description chunks. This can be exploited to cause a
|
||
|
heap-based buffer overflow by tricking the user into processing a
|
||
|
specially crafted CAF audio file.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0186</cvename>
|
||
|
<url>http://secunia.com/advisories/33980/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-03-03</discovery>
|
||
|
<entry>2009-03-16</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="6733e1bf-125f-11de-a964-0030843d3802">
|
||
|
<topic>ffmpeg -- 4xm processing memory corruption vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>ffmpeg</name>
|
||
|
<range><lt>2008.07.27_9</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33711/">
|
||
|
<p>Tobias Klein has reported a vulnerability in FFmpeg, which
|
||
|
potentially can be exploited by malicious people to compromise an
|
||
|
application using the library.</p>
|
||
|
<p>The vulnerability is caused due to a signedness error within the
|
||
|
"fourxm_read_header()" function in libavformat/4xm.c. This can be
|
||
|
exploited to corrupt arbitrary memory via a specially crafted 4xm
|
||
|
file.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>33502</bid>
|
||
|
<cvename>CVE-2009-0385</cvename>
|
||
|
<url>http://secunia.com/advisories/33711/</url>
|
||
|
<url>http://trapkit.de/advisories/TKADV2009-004.txt</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-01-28</discovery>
|
||
|
<entry>2009-03-16</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="35c0b572-125a-11de-a964-0030843d3802">
|
||
|
<topic>roundcube -- webmail script insertion and php code injection</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>roundcube</name>
|
||
|
<range><lt>0.2.1,1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33622/">
|
||
|
<p>Some vulnerabilities have been reported in RoundCube Webmail, which
|
||
|
can be exploited by malicious users to compromise a vulnerable system
|
||
|
and by malicious people to conduct script insertion attacks and
|
||
|
compromise a vulnerable system.</p>
|
||
|
<p>The HTML "background" attribute within e.g. HTML emails is not
|
||
|
properly sanitised before being used. This can be exploited to execute
|
||
|
arbitrary HTML and script code in a user's browser session in context
|
||
|
of an affected site if a malicious email is viewed.</p>
|
||
|
<p>Input passed via a vCard is not properly sanitised before being
|
||
|
used in a call to "preg_replace()" with the "e" modifier in
|
||
|
program/include/rcube_vcard.php. This can be exploited to inject and
|
||
|
execute arbitrary PHP code by e.g. tricking a user into importing a
|
||
|
malicious vCard file.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0413</cvename>
|
||
|
<url>http://secunia.com/advisories/33622/</url>
|
||
|
<url>http://sourceforge.net/forum/forum.php?forum_id=927958</url>
|
||
|
<url>http://trac.roundcube.net/changeset/2245</url>
|
||
|
<url>http://trac.roundcube.net/ticket/1485689</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-01-21</discovery>
|
||
|
<entry>2009-03-16</entry>
|
||
|
<modified>2009-03-26</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="ca0841ff-1254-11de-a964-0030843d3802">
|
||
|
<topic>proftpd -- multiple sql injection vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>proftpd</name>
|
||
|
<name>proftpd-mysql</name>
|
||
|
<range><lt>1.3.2</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>proftpd-devel</name>
|
||
|
<range><le>1.3.20080922</le></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33842/">
|
||
|
<p>Some vulnerabilities have been reported in ProFTPD, which can be
|
||
|
exploited by malicious people to conduct SQL injection attacks.</p>
|
||
|
<p>The application improperly sets the character encoding prior to
|
||
|
performing SQL queries. This can be exploited to manipulate SQL
|
||
|
queries by injecting arbitrary SQL code in an environment using a
|
||
|
multi-byte character encoding.</p>
|
||
|
<p>An error exists in the "mod_sql" module when processing e.g. user
|
||
|
names containing '%' characters. This can be exploited to bypass input
|
||
|
sanitation routines and manipulate SQL queries by injecting arbitrary
|
||
|
SQL code.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0542</cvename>
|
||
|
<cvename>CVE-2009-0543</cvename>
|
||
|
<url>http://secunia.com/advisories/33842/</url>
|
||
|
<url>http://bugs.proftpd.org/show_bug.cgi?id=3173</url>
|
||
|
<url>http://bugs.proftpd.org/show_bug.cgi?id=3124</url>
|
||
|
<url>http://milw0rm.com/exploits/8037</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-06</discovery>
|
||
|
<entry>2009-03-16</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="03140526-1250-11de-a964-0030843d3802">
|
||
|
<topic>zabbix -- php frontend multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>zabbix</name>
|
||
|
<range><lt>1.6.2_1,1</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>zabbix-agent</name>
|
||
|
<range><lt>1.6.2_1,2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/34091/">
|
||
|
<p>Some vulnerabilities have been reported in the ZABBIX PHP frontend,
|
||
|
which can be exploited by malicious people to conduct cross-site
|
||
|
request forgery attacks and malicious users to disclose sensitive
|
||
|
information and compromise a vulnerable system.</p>
|
||
|
<p>Input appended to and passed via the "extlang" parameter to the
|
||
|
"calc_exp2()" function in include/validate.inc.php is not properly
|
||
|
sanitised before being used. This can be exploited to inject and
|
||
|
execute arbitrary PHP code.</p>
|
||
|
<p>The application allows users to perform certain actions via HTTP
|
||
|
requests without performing any validity checks to verify the
|
||
|
requests. This can be exploited to e.g. create users by enticing a
|
||
|
logged in administrator to visit a malicious web page.</p>
|
||
|
<p>Input passed to the "srclang" parameter in locales.php (when "next"
|
||
|
is set to a non-NULL value) is not properly verified before being used
|
||
|
to include files. This can be exploited to include arbitrary files
|
||
|
from local resources via directory traversal attacks and URL-encoded
|
||
|
NULL bytes.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://secunia.com/advisories/34091/</url>
|
||
|
<url>http://www.ush.it/team/ush/hack-zabbix_162/adv.txt</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-03-04</discovery>
|
||
|
<entry>2009-03-16</entry>
|
||
|
<modified>2009-03-23</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="a2074ac6-124c-11de-a964-0030843d3802">
|
||
|
<topic>php-mbstring -- php mbstring buffer overflow vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>php4-mbstring</name>
|
||
|
<range><lt>4.4.9</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>php5-mbstring</name>
|
||
|
<range><lt>5.2.9</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SecurityFocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/32948">
|
||
|
<p>PHP is prone to a buffer-overflow vulnerability because it fails to
|
||
|
perform boundary checks before copying user-supplied data to
|
||
|
insufficiently sized memory buffers. The issue affects the 'mbstring'
|
||
|
extension included in the standard distribution.</p>
|
||
|
<p>An attacker can exploit this issue to execute arbitrary machine
|
||
|
code in the context of the affected webserver. Failed exploit attempts
|
||
|
will likely crash the webserver, denying service to legitimate
|
||
|
users.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>32948</bid>
|
||
|
<cvename>CVE-2008-5557</cvename>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-12-21</discovery>
|
||
|
<entry>2009-03-16</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="4ce3c20b-124b-11de-a964-0030843d3802">
|
||
|
<topic>phppgadmin -- directory traversal with register_globals enabled</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>phppgadmin</name>
|
||
|
<range><lt>4.2.2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33014">
|
||
|
<p>Dun has discovered a vulnerability in phpPgAdmin, which can be
|
||
|
exploited by malicious people to disclose sensitive information.</p>
|
||
|
<p>Input passed via the "_language" parameter to libraries/lib.inc.php
|
||
|
is not properly sanitised before being used to include files. This can
|
||
|
be exploited to include arbitrary files from local resources via
|
||
|
directory traversal attacks and URL-encoded NULL bytes.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>32670</bid>
|
||
|
<cvename>CVE-2008-5587</cvename>
|
||
|
<url>http://secunia.com/advisories/33014</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-12-08</discovery>
|
||
|
<entry>2009-03-16</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="8c5205b4-11a0-11de-a964-0030843d3802">
|
||
|
<topic>opera -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>opera</name>
|
||
|
<name>linux-opera</name>
|
||
|
<range><lt>9.64</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Opera Team reports:</p>
|
||
|
<blockquote cite="http://www.opera.com/docs/changelogs/freebsd/964/">
|
||
|
<p>An unspecified error in the processing of JPEG images can be
|
||
|
exploited to trigger a memory corruption.</p>
|
||
|
<p>An error can be exploited to execute arbitrary script code in a
|
||
|
different domain via unspecified plugins.</p>
|
||
|
<p>An unspecified error has a "moderately severe" impact. No further
|
||
|
information is available.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0914</cvename>
|
||
|
<cvename>CVE-2009-0915</cvename>
|
||
|
<url>http://www.opera.com/docs/changelogs/freebsd/964/</url>
|
||
|
<url>http://secunia.com/advisories/34135/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-03-15</discovery>
|
||
|
<entry>2009-03-15</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="e848a92f-0e7d-11de-92de-000bcdc1757a">
|
||
|
<topic>epiphany -- untrusted search path vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>epiphany</name>
|
||
|
<range><lt>2.24.2.1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>CVE Mitre reports:</p>
|
||
|
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5985">
|
||
|
<p>Untrusted search path vulnerability in the Python interface in
|
||
|
Epiphany 2.22.3, and possibly other versions, allows local users to
|
||
|
execute arbitrary code via a Trojan horse Python file in the current
|
||
|
working directory, related to a vulnerability in the PySys_SetArgv
|
||
|
function (CVE-2008-5983).</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-5985</cvename>
|
||
|
<cvename>CVE-2008-5983</cvename>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-01-26</discovery>
|
||
|
<entry>2009-03-11</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="f1892066-0e74-11de-92de-000bcdc1757a">
|
||
|
<topic>apache -- Cross-site scripting vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>apache</name>
|
||
|
<range><gt>2.2.0</gt><lt>2.2.9_2</lt></range>
|
||
|
<range><gt>2.0.0</gt><lt>2.0.63_2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>CVE Mitre reports:</p>
|
||
|
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939">
|
||
|
<p>Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the
|
||
|
mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c
|
||
|
in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions,
|
||
|
allows remote attackers to inject arbitrary web script or HTML via a
|
||
|
wildcard in the last directory component in the pathname in an FTP
|
||
|
URI.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-2939</cvename>
|
||
|
<url>http://www.rapid7.com/advisories/R7-0033.jsp</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-07-25</discovery>
|
||
|
<entry>2009-03-11</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="ea2411a4-08e8-11de-b88a-0022157515b2">
|
||
|
<topic>pngcrush -- libpng Uninitialised Pointer Arrays Vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>pngcrush</name>
|
||
|
<range><lt>1.6.14</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33976/">
|
||
|
<p>A vulnerability has been reported in Pngcrush, which
|
||
|
can be exploited by malicious people to potentially
|
||
|
compromise a user's system.</p>
|
||
|
<p>The vulnerability is caused due to the use of vulnerable
|
||
|
libpng code.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>33827</bid>
|
||
|
<cvename>CVE-2009-0040</cvename>
|
||
|
<url>http://secunia.com/advisories/33976</url>
|
||
|
<url>http://xforce.iss.net/xforce/xfdb/48819</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-19</discovery>
|
||
|
<entry>2009-03-04</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="5d433534-f41c-402e-ade5-e0a2259a7cb6">
|
||
|
<topic>curl -- cURL/libcURL Location: Redirect URLs Security Bypass</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>curl</name>
|
||
|
<range><ge>5.11</ge><lt>7.19.4</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/34138/">
|
||
|
<p>The security issue is caused due to cURL following HTTP Location:
|
||
|
redirects to e.g. scp:// or file:// URLs which can be exploited
|
||
|
by a malicious HTTP server to overwrite or disclose the content of
|
||
|
arbitrary local files and potentially execute arbitrary commands via
|
||
|
specially crafted redirect URLs.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0037</cvename>
|
||
|
<url>http://secunia.com/advisories/34138/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-03-03</discovery>
|
||
|
<entry>2009-03-04</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="cf495fd4-fdcd-11dd-9a86-0050568452ac">
|
||
|
<topic>Zend Framework -- Local File Inclusion vulnerability in Zend_View::render()</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>ZendFramework</name>
|
||
|
<range><lt>1.7.5</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Matthew Weier O'Phinney reports:</p>
|
||
|
<blockquote cite="http://weierophinney.net/matthew/archives/206-Zend-Framework-1.7.5-Released-Important-Note-Regarding-Zend_View.html">
|
||
|
<p>A potential Local File Inclusion (LFI) vulnerability exists in
|
||
|
the Zend_View::render() method. If user input is used to
|
||
|
specify the script path, then it is possible to trigger the
|
||
|
LFI.</p>
|
||
|
<p>Note that Zend Framework applications that never call the
|
||
|
Zend_View::render() method with a user-supplied parameter are
|
||
|
not affected by this vulnerability.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://framework.zend.com/issues/browse/ZF-5748</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-11</discovery>
|
||
|
<entry>2009-02-18</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="25eb365c-fd11-11dd-8424-c213de35965d">
|
||
|
<topic>dia -- remote command execution vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>dia</name>
|
||
|
<range><lt>0.96.1_6,1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Security Focus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/33448/">
|
||
|
<p>An attacker could exploit this issue by enticing an
|
||
|
unsuspecting victim to execute the vulnerable
|
||
|
application in a directory containing a malicious
|
||
|
Python file. A successful exploit will allow arbitrary
|
||
|
Python commands to run within the privileges of the currently
|
||
|
logged-in user.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>33448</bid>
|
||
|
<cvename>CVE-2008-5984</cvename>
|
||
|
<url>http://secunia.com/advisories/33672</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-01-26</discovery>
|
||
|
<entry>2009-02-17</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="5a021595-fba9-11dd-86f3-0030843d3802">
|
||
|
<topic>pycrypto -- ARC2 module buffer overflow</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>py-pycrypto</name>
|
||
|
<range><lt>2.0.1_2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Dwayne C. Litzenberger reports:</p>
|
||
|
<blockquote cite="http://lists.dlitz.net/pipermail/pycrypto/2009q1/000062.html">
|
||
|
<p>pycrypto is exposed to a buffer overflow issue because it fails to
|
||
|
adequately verify user-supplied input. This issue resides in the ARC2
|
||
|
module. This issue can be triggered with specially crafted ARC2 keys
|
||
|
in excess of 128 bytes.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://lists.dlitz.net/pipermail/pycrypto/2009q1/000062.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-06</discovery>
|
||
|
<entry>2009-02-15</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="bcee3989-d106-4f60-948f-835375634710">
|
||
|
<topic>varnish -- Varnish HTTP Request Parsing Denial of Service</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>varnish</name>
|
||
|
<range><lt>2.0.1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SecurityFocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/33712">
|
||
|
<p>Varnish is prone to a remote denial-of-service
|
||
|
vulnerability because the application fails to handle
|
||
|
certain HTTP requests.</p>
|
||
|
<p>Successfully exploiting this issue allows remote
|
||
|
attackers to crash the affected application denying further
|
||
|
service to legitimate users.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>33712</bid>
|
||
|
<url>http://secunia.com/advisories/33852/</url>
|
||
|
<url>http://varnish.projects.linpro.no/wiki/WikiStart</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-10-17</discovery>
|
||
|
<entry>2009-02-14</entry>
|
||
|
<modified>2009-02-15</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="78f5606b-f9d1-11dd-b79c-0030843d3802">
|
||
|
<topic>tor -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>tor</name>
|
||
|
<range><lt>0.2.0.34</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>tor-devel</name>
|
||
|
<range><lt>0.2.12-alpha</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33880/">
|
||
|
<p>Some vulnerabilities have been reported in Tor, where one has an
|
||
|
unknown impact and others can be exploited by malicious people to
|
||
|
cause a DoS.</p>
|
||
|
<p>An error when running Tor as a directory authority can be exploited
|
||
|
to trigger the execution of an infinite loop.</p>
|
||
|
<p>An unspecified error exists when running on Windows systems prior
|
||
|
to Windows XP. No further information is currently available.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0936</cvename>
|
||
|
<cvename>CVE-2009-0937</cvename>
|
||
|
<cvename>CVE-2009-0938</cvename>
|
||
|
<url>http://secunia.com/advisories/33880/</url>
|
||
|
<url>http://archives.seul.org/or/announce/Feb-2009/msg00000.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-10</discovery>
|
||
|
<entry>2009-02-13</entry>
|
||
|
<modified>2009-03-20</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="8b491182-f842-11dd-94d9-0030843d3802">
|
||
|
<topic>firefox -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>firefox</name>
|
||
|
<range><lt>2.0.0.20_3,1</lt></range>
|
||
|
<range><gt>3.*,1</gt><lt>3.0.6,1</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>linux-firefox</name>
|
||
|
<name>linux-firefox-devel</name>
|
||
|
<range><lt>3.0.6</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>linux-seamonkey-devel</name>
|
||
|
<range><gt>0</gt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>seamonkey</name>
|
||
|
<name>linux-seamonkey</name>
|
||
|
<range><lt>1.1.15</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>thunderbird</name>
|
||
|
<name>linux-thunderbird</name>
|
||
|
<range><lt>2.0.0.21</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Mozilla Foundation reports:</p>
|
||
|
<blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/firefox30.html">
|
||
|
<p>MFSA 2009-06: Directives to not cache pages ignored</p>
|
||
|
<p>MFSA 2009-05: XMLHttpRequest allows reading HTTPOnly cookies</p>
|
||
|
<p>MFSA 2009-04: Chrome privilege escalation via local .desktop
|
||
|
files</p>
|
||
|
<p>MFSA 2009-03: Local file stealing with SessionStore</p>
|
||
|
<p>MFSA 2009-02: XSS using a chrome XBL method and window.eval</p>
|
||
|
<p>MFSA 2009-01: Crashes with evidence of memory corruption (rv:1.9.0.6)</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0352</cvename>
|
||
|
<cvename>CVE-2009-0353</cvename>
|
||
|
<cvename>CVE-2009-0354</cvename>
|
||
|
<cvename>CVE-2009-0355</cvename>
|
||
|
<cvename>CVE-2009-0356</cvename>
|
||
|
<cvename>CVE-2009-0357</cvename>
|
||
|
<cvename>CVE-2009-0358</cvename>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-01.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-02.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-03.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-04.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-05.html</url>
|
||
|
<url>http://www.mozilla.org/security/announce/2009/mfsa2009-06.html</url>
|
||
|
<url>http://secunia.com/advisories/33799/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-04</discovery>
|
||
|
<entry>2009-02-11</entry>
|
||
|
<modified>2009-12-12</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="83574d5a-f828-11dd-9fdf-0050568452ac">
|
||
|
<topic>codeigniter -- arbitrary script execution in the new Form Validation class</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>codeigniter</name>
|
||
|
<range><ge>1.7.0</ge><lt>1.7.1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>znirkel reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33829/">
|
||
|
<p>The eval() function in _reset_post_array crashes when posting
|
||
|
certain data. By passing in carefully-crafted input data, the eval()
|
||
|
function could also execute malicious PHP code.</p>
|
||
|
<p>Note that CodeIgniter applications that either do not use the
|
||
|
new Form Validation class or use the old Validation class are not
|
||
|
affected by this vulnerability.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://codeigniter.com/bug_tracker/bug/6068/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-11-28</discovery>
|
||
|
<entry>2009-02-11</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="b07f3254-f83a-11dd-85a4-ea653f0746ab">
|
||
|
<topic>pyblosxom -- atom flavor multiple XML injection vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>pyblosxom</name>
|
||
|
<range><lt>1.5.r3</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Security Focus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/33676/">
|
||
|
<p>PyBlosxom is prone to multiple XML-injection
|
||
|
vulnerabilities because the application fails to
|
||
|
properly sanitize user-supplied input before using it
|
||
|
in dynamically generated content.</p>
|
||
|
<p>Attacker-supplied XML and script code would run in the
|
||
|
context of the affected browser, potentially allowing
|
||
|
the attacker to steal cookie-based authentication credentials
|
||
|
or to control how the site is rendered to the user. Other attacks
|
||
|
are also possible.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>33676</bid>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-09</discovery>
|
||
|
<entry>2009-02-11</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="cc47fafe-f823-11dd-94d9-0030843d3802">
|
||
|
<topic>typo3 -- cross-site scripting and information disclosure</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>typo3</name>
|
||
|
<range><lt>4.2.6</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33829/">
|
||
|
<p>Some vulnerabilities have been reported in Typo3, which can be
|
||
|
exploited by malicious people to conduct cross-site scripting attacks
|
||
|
and disclose sensitive information.</p>
|
||
|
<p>Input passed via unspecified fields to the backend user interface
|
||
|
is not properly sanitised before being returned to the user. This can
|
||
|
be exploited to execute arbitrary HTML and script code in a user's
|
||
|
browser session in context of an affected site.</p>
|
||
|
<p>An error in the "jumpUrl" mechanism can be exploited to read
|
||
|
arbitrary files from local resources by disclosing a hash secret used
|
||
|
to restrict file access.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0815</cvename>
|
||
|
<cvename>CVE-2009-0816</cvename>
|
||
|
<url>http://secunia.com/advisories/33829/</url>
|
||
|
<url>http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-002/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-10</discovery>
|
||
|
<entry>2009-02-11</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="a89b76a7-f6bd-11dd-94d9-0030843d3802">
|
||
|
<topic>amaya -- multiple buffer overflow vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>amaya</name>
|
||
|
<range><gt>0</gt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/32848/">
|
||
|
<p>A boundary error when processing "div" HTML tags can be exploited
|
||
|
to cause a stack-based buffer overflow via an overly long "id"
|
||
|
parameter.</p>
|
||
|
<p>A boundary error exists when processing overly long links. This can
|
||
|
be exploited to cause a stack-based buffer overflow by tricking the
|
||
|
user into e.g. editing a malicious link.</p>
|
||
|
<p>A boundary error when processing e.g. a "bdo" HTML tag having an
|
||
|
overly long "dir" attribute can be exploited to cause a stack-based
|
||
|
buffer overflow.</p>
|
||
|
<p>A boundary error when processing "input" HTML tags can be
|
||
|
exploited to cause a stack-based buffer overflow via an overly long
|
||
|
e.g. "type" attribute.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-5282</cvename>
|
||
|
<cvename>CVE-2009-0323</cvename>
|
||
|
<url>http://secunia.com/advisories/32848/</url>
|
||
|
<url>http://www.bmgsec.com.au/advisory/41/</url>
|
||
|
<url>http://www.bmgsec.com.au/advisory/40/</url>
|
||
|
<url>http://milw0rm.com/exploits/7467</url>
|
||
|
<url>http://www.coresecurity.com/content/amaya-buffer-overflows</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-11-25</discovery>
|
||
|
<entry>2009-02-09</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="71597e3e-f6b8-11dd-94d9-0030843d3802">
|
||
|
<topic>websvn -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>websvn</name>
|
||
|
<range><lt>2.1.0</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/32338/">
|
||
|
<p>Some vulnerabilities have been reported in WebSVN, which can be
|
||
|
exploited by malicious users to disclose sensitive information, and by
|
||
|
malicious people to conduct cross-site scripting attacks and
|
||
|
manipulate data.</p>
|
||
|
<p>Input passed in the URL to index.php is not properly sanitised
|
||
|
before being returned to the user. This can be exploited to execute
|
||
|
arbitrary HTML and script code in a user's browser session in context
|
||
|
of an affected site.</p>
|
||
|
<p>Input passed to the "rev" parameter in rss.php is not properly
|
||
|
sanitised before being used. This can be exploited to overwrite
|
||
|
arbitrary files via directory traversal attacks.</p>
|
||
|
<p>Access to restricted repositories is not properly enforced, which
|
||
|
can be exploited to disclose potentially sensitive information by
|
||
|
accessing the repository via "listing.php" and using the "compare with
|
||
|
previous" and "show changed files" links.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-5918</cvename>
|
||
|
<cvename>CVE-2008-5919</cvename>
|
||
|
<cvename>CVE-2009-0240</cvename>
|
||
|
<url>http://secunia.com/advisories/32338/</url>
|
||
|
<url>http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512191</url>
|
||
|
<url>http://www.gulftech.org/?node=research&article_id=00132-10202008</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-10-23</discovery>
|
||
|
<entry>2009-02-09</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="40774927-f6b4-11dd-94d9-0030843d3802">
|
||
|
<topic>phplist -- local file inclusion vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>phplist</name>
|
||
|
<range><lt>2.10.9</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33533/">
|
||
|
<p>Input passed to the "_SERVER[ConfigFile]" parameter in
|
||
|
admin/index.php is not properly verified before being used to include
|
||
|
files. This can be exploited to include arbitrary files from local
|
||
|
resources.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0422</cvename>
|
||
|
<url>http://secunia.com/advisories/33533/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-01-15</discovery>
|
||
|
<entry>2009-02-09</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="9c2460a4-f6b1-11dd-94d9-0030843d3802">
|
||
|
<topic>squid -- remote denial of service vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>squid</name>
|
||
|
<range><ge>2.7.1</ge><lt>2.7.6</lt></range>
|
||
|
<range><ge>3.0.1</ge><lt>3.0.13</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Squid security advisory 2009:1 reports:</p>
|
||
|
<blockquote cite="http://www.squid-cache.org/Advisories/SQUID-2009_1.txt">
|
||
|
<p>Due to an internal error Squid is vulnerable to a denial
|
||
|
of service attack when processing specially crafted requests.</p>
|
||
|
<p>This problem allows any client to perform a denial of service
|
||
|
attack on the Squid service.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0478</cvename>
|
||
|
<url>http://www.squid-cache.org/Advisories/SQUID-2009_1.txt</url>
|
||
|
<url>http://secunia.com/advisories/33731/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-04</discovery>
|
||
|
<entry>2009-02-09</entry>
|
||
|
<modified>2009-02-10</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="653606e9-f6ac-11dd-94d9-0030843d3802">
|
||
|
<topic>typo3 -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>typo3</name>
|
||
|
<range><lt>4.2.4</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33617/">
|
||
|
<p>Some vulnerabilities have been reported in Typo3, which can be
|
||
|
exploited by malicious people to bypass certain security restrictions,
|
||
|
conduct cross-site scripting and session fixation attacks, and
|
||
|
compromise a vulnerable system.</p>
|
||
|
<p>The "Install tool" system extension uses insufficiently random
|
||
|
entropy sources to generate an encryption key, resulting in weak
|
||
|
security.</p>
|
||
|
<p>The authentication library does not properly invalidate supplied
|
||
|
session tokens, which can be exploited to hijack a user's
|
||
|
session.</p>
|
||
|
<p>Certain unspecified input passed to the "Indexed Search Engine"
|
||
|
system extension is not properly sanitised before being used to invoke
|
||
|
commands. This can be exploited to inject and execute arbitrary shell
|
||
|
commands.</p>
|
||
|
<p>Input passed via the name and content of files to the "Indexed Search
|
||
|
Engine" system extension is not properly sanitised before being returned
|
||
|
to the user. This can be exploited to execute arbitrary HTML and script
|
||
|
code in a user's browser session in context of an affected site.</p>
|
||
|
<p>Certain unspecified input passed to the Workspace module is not
|
||
|
properly sanitised before being returned to the user. This can be
|
||
|
exploited to execute arbitrary HTML and script code in a user's
|
||
|
browser session in context of an affected site.</p>
|
||
|
<p>Note: It is also reported that certain unspecified input passed to
|
||
|
test scripts of the "ADOdb" system extension is not properly sanitised
|
||
|
before being returned to the user. This can be exploited to execute
|
||
|
arbitrary HTML and script code in a user's browser session in context
|
||
|
of an affected website.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0255</cvename>
|
||
|
<cvename>CVE-2009-0256</cvename>
|
||
|
<cvename>CVE-2009-0257</cvename>
|
||
|
<cvename>CVE-2009-0258</cvename>
|
||
|
<url>http://secunia.com/advisories/33617/</url>
|
||
|
<url>http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-001/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-07</discovery>
|
||
|
<entry>2009-02-09</entry>
|
||
|
<modified>2013-06-19</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="13d6d997-f455-11dd-8516-001b77d09812">
|
||
|
<topic>sudo -- certain authorized users could run commands as any user</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>sudo</name>
|
||
|
<range><ge>1.6.9</ge><lt>1.6.9.20</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Todd Miller reports:</p>
|
||
|
<blockquote cite="http://www.gratisoft.us/pipermail/sudo-announce/2009-February/000085.html">
|
||
|
<p>A bug was introduced in Sudo's group matching code in version
|
||
|
1.6.9 when support for matching based on the supplemental group
|
||
|
vector was added. This bug may allow certain users listed in
|
||
|
the sudoers file to run a command as a different user than their
|
||
|
access rule specifies.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>33517</bid>
|
||
|
<cvename>CVE-2009-0034</cvename>
|
||
|
<mlist msgid="200902041802.n14I2llS024155@core.courtesan.com">http://www.gratisoft.us/pipermail/sudo-announce/2009-February/000085.html</mlist>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-02-04</discovery>
|
||
|
<entry>2009-02-06</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="6d85dc62-f2bd-11dd-9f55-0030843d3802">
|
||
|
<topic>drupal -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>drupal5</name>
|
||
|
<range><lt>5.15</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>drupal6</name>
|
||
|
<range><lt>6.9</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Drupal Team reports:</p>
|
||
|
<blockquote cite="http://drupal.org/node/358957">
|
||
|
<p>The Content Translation module for Drupal 6.x enables users to make
|
||
|
a translation of an existing item of content (a node). In that proces
|
||
|
the existing node's content is copied into the new node's submission
|
||
|
form.</p>
|
||
|
<p>The module contains a flaw that allows a user with the 'translate
|
||
|
content' permission to potentially bypass normal viewing access
|
||
|
restrictions, for example allowing the user to see the content of
|
||
|
unpublished nodes even if they do not have permission to view
|
||
|
unpublished nodes.</p>
|
||
|
<p>When user profile pictures are enabled, the default user profile
|
||
|
validation function will be bypassed, possibly allowing invalid user
|
||
|
names or e-mail addresses to be submitted.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://drupal.org/node/358957</url>
|
||
|
<url>http://secunia.com/advisories/33550/</url>
|
||
|
<url>http://secunia.com/advisories/33500/</url>
|
||
|
<url>http://secunia.com/advisories/33542/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-01-14</discovery>
|
||
|
<entry>2009-02-04</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="4a99d61c-f23a-11dd-9f55-0030843d3802">
|
||
|
<topic>perl -- Directory Permissions Race Condition</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>perl</name>
|
||
|
<range><ge>5.8.0</ge><lt>5.8.9</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/14531/">
|
||
|
<p>Paul Szabo has reported a vulnerability in Perl File::Path::rmtree,
|
||
|
which potentially can be exploited by malicious, local users to
|
||
|
gain escalated privileges.</p>
|
||
|
<p>The vulnerability is caused due to a race condition in the way
|
||
|
File::Path::rmtree handles directory permissions when cleaning up
|
||
|
directories. This can be exploited by replacing an existing sub
|
||
|
directory in the directory tree with a symbolic link to an arbitrary
|
||
|
file.</p>
|
||
|
<p>Successful exploitation may allow changing permissions of arbitrary
|
||
|
files, if root uses an application using the vulnerable code to delete
|
||
|
files in a directory having a world-writable sub directory.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2005-0448</cvename>
|
||
|
<url>http://www.ubuntulinux.org/usn/usn-94-1</url>
|
||
|
<url>http://secunia.com/advisories/14531/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2005-03-09</discovery>
|
||
|
<entry>2009-02-03</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="6a523dba-eeab-11dd-ab4f-0030843d3802">
|
||
|
<topic>moinmoin -- multiple cross site scripting vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>moinmoin</name>
|
||
|
<range><lt>1.8.1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33593/">
|
||
|
<p>Input passed to multiple parameters in action/AttachFile.py is not
|
||
|
properly sanitised before being returned to the user. This can be
|
||
|
exploited to execute arbitrary HTML and script code in a user's
|
||
|
browser session in the context of an affected site.</p>
|
||
|
<p>Certain input passed to security/antispam.py is not properly
|
||
|
sanitised before being returned to the user. This can be exploited to
|
||
|
execute arbitrary HTML and script code in a user's browser session in
|
||
|
the context of an affected site.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0260</cvename>
|
||
|
<cvename>CVE-2009-0312</cvename>
|
||
|
<url>http://secunia.com/advisories/33593/</url>
|
||
|
<url>http://hg.moinmo.in/moin/1.8/file/c76d50dac855</url>
|
||
|
<url>http://hg.moinmo.in/moin/1.8/rev/89b91bf87dad</url>
|
||
|
<url>http://moinmo.in/SecurityFixes#moin1.8.1</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-01-21</discovery>
|
||
|
<entry>2009-01-30</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="b9077cc4-6d04-4bcb-a37a-9ceaebfdcc9e">
|
||
|
<topic>ganglia -- buffer overflow vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>ganglia-monitor-core</name>
|
||
|
<name>ganglia-monitor-webfrontend</name>
|
||
|
<range><lt>3.1.1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33506">
|
||
|
<p>Spike Spiegel has discovered a vulnerability in Ganglia which
|
||
|
can be exploited by malicious people to compromise a
|
||
|
vulnerable system. The vulnerability is caused due to a
|
||
|
boundary error within the process_path function in
|
||
|
gmetad/server.c. This can be exploited to cause a stack-based
|
||
|
buffer overflow by e.g. sending a specially crafted message to
|
||
|
the gmetad service.</p>
|
||
|
<p>The vulnerability is confirmed in version 3.1.1. Other
|
||
|
versions may also be affected.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0241</cvename>
|
||
|
<url>http://secunia.com/advisories/33506</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-01-26</discovery>
|
||
|
<entry>2009-01-30</entry>
|
||
|
<modified>2009-01-30</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="100a9ed2-ee56-11dd-ab4f-0030843d3802">
|
||
|
<topic>tor -- unspecified memory corruption vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>tor</name>
|
||
|
<range><lt>0.2.0.33</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>tor-devel</name>
|
||
|
<range><lt>0.2.1.11-alpha</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33635/">
|
||
|
<p>A vulnerability with an unknown impact has been reported in Tor.</p>
|
||
|
<p>The vulnerability is caused due to an unspecified error and can be
|
||
|
exploited to trigger a heap corruption. No further information is
|
||
|
currently available.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2009-0414</cvename>
|
||
|
<url>http://secunia.com/advisories/33635/</url>
|
||
|
<url>http://archives.seul.org/or/announce/Jan-2009/msg00000.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-01-22</discovery>
|
||
|
<entry>2009-01-29</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="2ffb1b0d-ecf5-11dd-abae-00219b0fc4d8">
|
||
|
<topic>glpi -- SQL Injection</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>glpi</name>
|
||
|
<range><lt>0.71.4</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>The GLPI project reports:</p>
|
||
|
<blockquote cite="http://www.glpi-project.org/spip.php?page=annonce&id_breve=161&lang=en">
|
||
|
<p>Input passed via unspecified parameters is not properly sanitised
|
||
|
before being used in SQL queries. This can be exploited to
|
||
|
manipulateSQL queries by injecting arbitrary SQL code.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<url>http://www.glpi-project.org/spip.php?page=annonce&id_breve=161&lang=en</url>
|
||
|
<url>https://mail.gna.org/public/glpi-news/2009-01/msg00002.html</url>
|
||
|
<url>https://dev.indepnet.net/glpi/ticket/1224</url>
|
||
|
<url>http://secunia.com/advisories/33680/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-01-25</discovery>
|
||
|
<entry>2009-01-28</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="c3aba586-ea77-11dd-9d1e-000bcdc1757a">
|
||
|
<topic>openfire -- multiple vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>openfire</name>
|
||
|
<range><lt>3.6.3</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Core Security Technologies reports:</p>
|
||
|
<blockquote cite="http://www.coresecurity.com/content/openfire-multiple-vulnerabilities">
|
||
|
<p>Multiple cross-site scripting vulnerabilities have been found
|
||
|
which may lead to arbitrary remote code execution on the server
|
||
|
running the application due to unauthorized upload of Java plugin
|
||
|
code.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>32935</bid>
|
||
|
<bid>32937</bid>
|
||
|
<bid>32938</bid>
|
||
|
<bid>32939</bid>
|
||
|
<bid>32940</bid>
|
||
|
<bid>32943</bid>
|
||
|
<bid>32944</bid>
|
||
|
<bid>32945</bid>
|
||
|
<cvename>CVE-2009-0496</cvename>
|
||
|
<cvename>CVE-2009-0497</cvename>
|
||
|
<url>http://www.coresecurity.com/content/openfire-multiple-vulnerabilities</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-01-08</discovery>
|
||
|
<entry>2009-01-25</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="abcacb5a-e7f1-11dd-afcd-00e0815b8da8">
|
||
|
<topic>ipset-tools -- Denial of Service Vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>ipsec-tools</name>
|
||
|
<range><lt>0.7.1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SecurityFocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/30657/discuss">
|
||
|
<p>IPsec-Tools is affected by multiple remote denial-of-service
|
||
|
vulnerabilities because the software fails to properly handle
|
||
|
certain network packets.</p>
|
||
|
<p>A successful attack allows a remote attacker to crash the
|
||
|
software, denying further service to legitimate users.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>30657</bid>
|
||
|
<cvename>CVE-2008-3651</cvename>
|
||
|
<cvename>CVE-2008-3652</cvename>
|
||
|
<mlist msgid="20080724084529.GA3768@zen.inc">http://marc.info/?l=ipsec-tools-devel&m=121688914101709&w=2</mlist>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-07-28</discovery>
|
||
|
<entry>2009-01-21</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="4b68d917-e705-11dd-afcd-00e0815b8da8">
|
||
|
<topic>Teamspeak Server -- Directory Traversal Vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>teamspeak_server</name>
|
||
|
<range><le>2.0.23.17</le></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SecurityFocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/33256">
|
||
|
<p>TeamSpeak is prone to a directory-traversal vulnerability because
|
||
|
it fails to sufficiently sanitize user-supplied input data.
|
||
|
Exploiting the issue may allow an attacker to obtain sensitive
|
||
|
information that could aid in further attacks.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>33256</bid>
|
||
|
<url>http://www.securityfocus.com/bid/33256</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2009-01-14</discovery>
|
||
|
<entry>2009-01-20</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="2bc960c4-e665-11dd-afcd-00e0815b8da8">
|
||
|
<topic>optipng -- arbitrary code execution via crafted BMP image</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>optipng</name>
|
||
|
<range><lt>0.6.2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/32651">
|
||
|
<p>A vulnerability has been reported in OptiPNG, which
|
||
|
potentially can be exploited by malicious people to compromise
|
||
|
a user's system.</p>
|
||
|
<p>The vulnerability is caused due to a boundary error in
|
||
|
the BMP reader and can be exploited to cause a buffer
|
||
|
overflow by tricking a user into processing a specially
|
||
|
crafted file.</p>
|
||
|
<p>Successful exploitation may allow execution of arbitrary
|
||
|
code.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-5101</cvename>
|
||
|
<url>http://secunia.com/advisories/32651</url>
|
||
|
<url>http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505399</url>
|
||
|
<url>http://optipng.sourceforge.net/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-11-11</discovery>
|
||
|
<entry>2009-01-19</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="ecad44b9-e663-11dd-afcd-00e0815b8da8">
|
||
|
<topic>git -- gitweb privilege escalation</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>git</name>
|
||
|
<range><lt>1.6.0.6</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Git maintainers report:</p>
|
||
|
<blockquote cite="http://marc.info/?l=git&m=122975564100860&w=2">
|
||
|
<p>gitweb has a possible local privilege escalation
|
||
|
bug that allows a malicious repository owner to run a command
|
||
|
of his choice by specifying diff.external configuration
|
||
|
variable in his repository and running a crafted gitweb
|
||
|
query.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>32967</bid>
|
||
|
<mlist msgid="7vhc4z1gys.fsf@gitster.siamese.dyndns.org">http://marc.info/?l=git&m=122975564100860&w=2</mlist>
|
||
|
<url>http://www.kernel.org/pub/software/scm/git/docs/RelNotes-1.6.0.6.txt</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-12-20</discovery>
|
||
|
<entry>2009-01-19</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="0809ce7d-f672-4924-9b3b-7c74bc279b83">
|
||
|
<topic>gtar -- GNU TAR safer_name_suffix Remote Denial of Service Vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>gtar</name>
|
||
|
<range><lt>1.19</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SecurityFocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/26445/">
|
||
|
<p>GNUs tar and cpio utilities are prone to a denial-of-service
|
||
|
vulnerability because of insecure use of the alloca()
|
||
|
function.</p>
|
||
|
<p>Successfully exploiting this issue allows attackers
|
||
|
to crash the affected utilities and possibly to execute
|
||
|
code but this has not been confirmed.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>26445</bid>
|
||
|
<cvename>CVE-2007-4476</cvename>
|
||
|
<url>http://www.securityfocus.com/bid/26445/</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2007-11-14</discovery>
|
||
|
<entry>2009-01-15</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="5ccb1c14-e357-11dd-a765-0030843d3802">
|
||
|
<topic>mplayer -- vulnerability in STR files processor</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>mplayer</name>
|
||
|
<name>mplayer-esound</name>
|
||
|
<name>mplayer-gtk</name>
|
||
|
<name>mplayer-gtk-esound</name>
|
||
|
<name>mplayer-gtk2</name>
|
||
|
<name>mplayer-gtk2-esound</name>
|
||
|
<range><lt>0.99.11_10</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/30994">
|
||
|
<p>The vulnerability is caused due to a boundary error within the
|
||
|
"str_read_packet()" function in libavformat/psxstr.c. This can be
|
||
|
exploited to cause a heap-based buffer overflow via a specially
|
||
|
crafted STR file.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-3162</cvename>
|
||
|
<bid>30157</bid>
|
||
|
<url>http://secunia.com/advisories/30994</url>
|
||
|
<url>https://roundup.mplayerhq.hu/roundup/ffmpeg/issue311</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-07-09</discovery>
|
||
|
<entry>2009-01-15</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="bc6a7e79-e111-11dd-afcd-00e0815b8da8">
|
||
|
<topic>cgiwrap -- XSS Vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>cgiwrap</name>
|
||
|
<range><lt>4.0_2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/30765">
|
||
|
<p>A vulnerability has been reported in CGIWrap, which can be
|
||
|
exploited by malicious people to conduct cross-site scripting
|
||
|
attacks.</p>
|
||
|
<p>The vulnerability is caused due to the application generating
|
||
|
error messages without specifying a charset. This can be exploited
|
||
|
to execute arbitrary HTML and script code in a user's browser
|
||
|
session in context of an affected site.</p>
|
||
|
<p>Successful exploitation may require that the victim uses Internet
|
||
|
Explorer or a browser based on Internet Explorer components.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-2852</cvename>
|
||
|
<url>http://secunia.com/advisories/30765</url>
|
||
|
<url>http://cgiwrap.sourceforge.net/changes.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-06-19</discovery>
|
||
|
<entry>2009-01-13</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="d4a358d3-e09a-11dd-a765-0030843d3802">
|
||
|
<topic>nagios -- web interface privilege escalation vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>nagios</name>
|
||
|
<range><lt>3.0.5</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>nagios2</name>
|
||
|
<range><lt>2.12_2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>securityfocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/32156/discuss">
|
||
|
<p>An attacker with low-level privileges may exploit this issue to
|
||
|
bypass authorization and cause arbitrary commands to run within the
|
||
|
context of the Nagios server. This may aid in further attacks.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-5027</cvename>
|
||
|
<bid>32156</bid>
|
||
|
<url>http://secunia.com/advisories/33320</url>
|
||
|
<url>http://www.ubuntu.com/usn/USN-698-1</url>
|
||
|
<url>http://www.nagios.org/development/history/nagios-3x.php</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-11-06</discovery>
|
||
|
<entry>2009-01-12</entry>
|
||
|
<modified>2009-01-15</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="a02c9595-e018-11dd-a765-0030843d3802">
|
||
|
<topic>pdfjam -- insecure temporary files</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>pdfjam</name>
|
||
|
<range><lt>1.20_4</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/33278">
|
||
|
<p>Some security issues have been reported in PDFjam, which can be
|
||
|
exploited by malicious, local users to perform certain actions with
|
||
|
escalated privileges.</p>
|
||
|
<p>The security issues are caused due to the "pdf90", "pdfjoin", and
|
||
|
"pdfnup" scripts using temporary files in an insecure manner. This can
|
||
|
be exploited to overwrite arbitrary files via symlink attacks.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-5743</cvename>
|
||
|
<url>https://bugzilla.novell.com/show_bug.cgi?id=459031</url>
|
||
|
<url>http://secunia.com/advisories/33278</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-12-05</discovery>
|
||
|
<entry>2009-01-11</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="58997463-e012-11dd-a765-0030843d3802">
|
||
|
<topic>verlihub -- insecure temporary file usage and arbitrary command execution</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>verlihub</name>
|
||
|
<range><lt>0.9.8.d.r2_2,1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>securityfocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/32889/discuss">
|
||
|
<p>An attacker with local access could potentially exploit this issue
|
||
|
to perform symbolic-link attacks, overwriting arbitrary files in the
|
||
|
context of the affected application.</p>
|
||
|
<p>Successfully mounting a symlink attack may allow the attacker to
|
||
|
delete or corrupt sensitive files, which may result in a denial of
|
||
|
service. Other attacks may also be possible.</p>
|
||
|
</blockquote>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/32420/discuss">
|
||
|
<p>Verlihub is prone to a remote command-execution vulnerability
|
||
|
because it fails to sufficiently validate user input.</p>
|
||
|
<p>Successfully exploiting this issue would allow an attacker to
|
||
|
execute arbitrary commands on an affected computer in the context of
|
||
|
the affected application.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-5705</cvename>
|
||
|
<cvename>CVE-2008-5706</cvename>
|
||
|
<bid>32889</bid>
|
||
|
<bid>32420</bid>
|
||
|
<url>http://milw0rm.com/exploits/7183</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-11-22</discovery>
|
||
|
<entry>2009-01-11</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="66a770b4-e008-11dd-a765-0030843d3802">
|
||
|
<topic>mysql -- empty bit-string literal denial of service</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>mysql-server</name>
|
||
|
<range><ge>5.0</ge><lt>5.0.66</lt></range>
|
||
|
<range><ge>5.1</ge><lt>5.1.26</lt></range>
|
||
|
<range><ge>6.0</ge><lt>6.0.6</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>MySQL reports:</p>
|
||
|
<blockquote cite="http://bugs.mysql.com/bug.php?id=35658">
|
||
|
<p>The vulnerability is caused due to an error when processing an
|
||
|
empty bit-string literal and can be exploited to crash the server via
|
||
|
a specially crafted SQL statement.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-3963</cvename>
|
||
|
<url>http://bugs.mysql.com/bug.php?id=35658</url>
|
||
|
<url>http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html</url>
|
||
|
<url>http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html</url>
|
||
|
<url>http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html</url>
|
||
|
<url>http://secunia.com/advisories/31769</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-09-11</discovery>
|
||
|
<entry>2009-01-11</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="8c451386-dff3-11dd-a765-0030843d3802">
|
||
|
<topic>mysql -- privilege escalation and overwrite of the system table information</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>mysql-server</name>
|
||
|
<range><ge>4.1</ge><lt>4.1.24</lt></range>
|
||
|
<range><ge>5.0</ge><lt>5.0.51</lt></range>
|
||
|
<range><ge>5.1</ge><lt>5.1.23</lt></range>
|
||
|
<range><ge>6.0</ge><lt>6.0.4</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>MySQL reports:</p>
|
||
|
<blockquote cite="http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html">
|
||
|
<p>Using RENAME TABLE against a table with explicit DATA
|
||
|
DIRECTORY and INDEX DIRECTORY options can be used to overwrite
|
||
|
system table information by replacing the symbolic link
|
||
|
points. the file to which the symlink points.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2007-5969</cvename>
|
||
|
<bid>26765</bid>
|
||
|
<url>http://bugs.mysql.com/bug.php?id=32111</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2007-11-14</discovery>
|
||
|
<entry>2009-01-11</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="240ac24c-dff3-11dd-a765-0030843d3802">
|
||
|
<topic>mysql -- remote dos via malformed password packet</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>mysql-server</name>
|
||
|
<range><ge>4.1</ge><lt>4.1.24</lt></range>
|
||
|
<range><ge>5.0</ge><lt>5.0.44</lt></range>
|
||
|
<range><ge>5.1</ge><lt>5.1.20</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>MySQL reports:</p>
|
||
|
<blockquote cite="http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html">
|
||
|
<p>A malformed password packet in the connection protocol
|
||
|
could cause the server to crash.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2007-3780</cvename>
|
||
|
<bid>25017</bid>
|
||
|
<url>http://bugs.mysql.com/bug.php?id=28984</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2007-07-15</discovery>
|
||
|
<entry>2009-01-11</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="bb4e9a44-dff2-11dd-a765-0030843d3802">
|
||
|
<topic>mysql -- renaming of arbitrary tables by authenticated users</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>mysql-server</name>
|
||
|
<range><ge>4.1</ge><lt>4.1.23</lt></range>
|
||
|
<range><ge>5.0</ge><lt>5.0.42</lt></range>
|
||
|
<range><ge>5.1</ge><lt>5.1.18</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>MySQL reports:</p>
|
||
|
<blockquote cite="http://dev.mysql.com/doc/refman/4.1/en/news-4-1-23.html">
|
||
|
<p>The requirement of the DROP privilege for RENAME TABLE was not
|
||
|
enforced.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2007-2691</cvename>
|
||
|
<bid>24016</bid>
|
||
|
<url>http://bugs.mysql.com/bug.php?id=27515</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2007-05-14</discovery>
|
||
|
<entry>2009-01-11</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="69a20ce4-dfee-11dd-a765-0030843d3802">
|
||
|
<topic>imap-uw -- imap c-client buffer overflow</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>imap-uw</name>
|
||
|
<range><lt>2007e</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SANS reports:</p>
|
||
|
<blockquote cite="http://www.washington.edu/imap/documentation/RELNOTES.html">
|
||
|
<p>The University of Washington IMAP library is a library implementing
|
||
|
the IMAP mail protocol. University of Washington IMAP is exposed to a
|
||
|
buffer overflow issue that occurs due to a boundary error within the
|
||
|
rfc822_output_char function in the c-client library. The University of
|
||
|
Washington IMAP library versions prior to 2007e are affected.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-5514</cvename>
|
||
|
<url>http://www.washington.edu/imap/documentation/RELNOTES.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-12-16</discovery>
|
||
|
<entry>2009-01-11</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="a6713190-dfea-11dd-a765-0030843d3802">
|
||
|
<topic>imap-uw -- local buffer overflow vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>imap-uw</name>
|
||
|
<range><lt>2007d</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SANS reports:</p>
|
||
|
<blockquote cite="http://www.sans.org/newsletters/risk/display.php?v=7&i=45#08.45.22">
|
||
|
<p>University of Washington "tmail" and "dmail" are mail deliver
|
||
|
agents. "tmail" and "dmail" are exposed to local buffer overflow
|
||
|
issues because they fail to perform adequate boundary checks on
|
||
|
user-supplied data.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-5514</cvename>
|
||
|
<url>http://www.washington.edu/imap/documentation/RELNOTES.html</url>
|
||
|
<url>http://www.sans.org/newsletters/risk/display.php?v=7&i=45#08.45.22</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-10-29</discovery>
|
||
|
<entry>2009-01-11</entry>
|
||
|
<modified>2010-05-02</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="bd730827-dfe0-11dd-a765-0030843d3802">
|
||
|
<topic>libcdaudio -- remote buffer overflow and code execution</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>libcdaudio</name>
|
||
|
<range><lt>0.99.12p2_2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>securityfocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/32122/discuss">
|
||
|
<p>The 'libcdaudio' library is prone to a remote heap code in the
|
||
|
context of an application that uses the library. Failed attacks will
|
||
|
cause denial-of-service conditions.</p>
|
||
|
</blockquote>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/12770/discuss">
|
||
|
<p>A buffer-overflow in Grip occurs when the software processes a
|
||
|
response to a CDDB query that has more than 16 matches.</p>
|
||
|
<p>To exploit this issue, an attacker must be able to influence the
|
||
|
response to a CDDB query, either by controlling a malicious CDDB
|
||
|
server or through some other means. Successful exploits will allow
|
||
|
arbitrary code to run.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-5030</cvename>
|
||
|
<cvename>CVE-2005-0706</cvename>
|
||
|
<bid>32122</bid>
|
||
|
<bid>12770</bid>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-11-05</discovery>
|
||
|
<entry>2009-01-11</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="c702944a-db0f-11dd-aa56-000bcdf0a03b">
|
||
|
<topic>FreeBSD -- netgraph / bluetooth privilege escalation</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>FreeBSD</name>
|
||
|
<range><ge>6.3</ge><lt>6.3_7</lt></range>
|
||
|
<range><ge>6.4</ge><lt>6.4_1</lt></range>
|
||
|
<range><ge>7.0</ge><lt>7.0_7</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<h1>Problem Description:</h1>
|
||
|
<p>Some function pointers for netgraph and bluetooth sockets are
|
||
|
not properly initialized.</p>
|
||
|
<h1>Impact:</h1>
|
||
|
<p>A local user can cause the FreeBSD kernel to execute
|
||
|
arbitrary code. This could be used by an attacker directly;
|
||
|
or it could be used to gain root privilege or to escape from
|
||
|
a jail.</p>
|
||
|
<h1>Workaround:</h1>
|
||
|
<p>No workaround is available, but systems without local
|
||
|
untrusted users are not vulnerable. Furthermore, systems are
|
||
|
not vulnerable if they have neither the ng_socket nor
|
||
|
ng_bluetooth kernel modules loaded or compiled into the
|
||
|
kernel.</p>
|
||
|
<p>Systems with the security.jail.socket_unixiproute_only
|
||
|
sysctl set to 1 (the default) are only vulnerable if they have
|
||
|
local untrusted users outside of jails.</p>
|
||
|
<p>If the command</p>
|
||
|
<p><code># kldstat -v | grep ng_</code></p>
|
||
|
<p>produces no output, the system is not vulnerable.</p>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<freebsdsa>SA-08:13.protosw</freebsdsa>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-12-23</discovery>
|
||
|
<entry>2009-01-05</entry>
|
||
|
<modified>2016-08-09</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="e9ecaceb-db0d-11dd-aa56-000bcdf0a03b">
|
||
|
<topic>FreeBSD -- Cross-site request forgery in ftpd(8)</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>FreeBSD</name>
|
||
|
<range><ge>6.3</ge><lt>6.3_7</lt></range>
|
||
|
<range><ge>6.4</ge><lt>6.4_1</lt></range>
|
||
|
<range><ge>7.0</ge><lt>7.0_7</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<h1>Problem Description:</h1>
|
||
|
<p>The ftpd(8) server splits long commands into several
|
||
|
requests. This may result in the server executing a command
|
||
|
which is hidden inside another very long command.</p>
|
||
|
<h1>Impact:</h1>
|
||
|
<p>This could, with a specifically crafted command, be used in a
|
||
|
cross-site request forgery attack.</p>
|
||
|
<p>FreeBSD systems running ftpd(8) server could act as a point
|
||
|
of privilege escalation in an attack against users using web
|
||
|
browser to access trusted FTP sites.</p>
|
||
|
<h1>Workaround:</h1>
|
||
|
<p>No workaround is available, but systems not running FTP
|
||
|
servers are not vulnerable. Systems not running the FreeBSD
|
||
|
ftp(8) server are not affected, but users of other ftp
|
||
|
daemons are advised to take care since several other ftp
|
||
|
daemons are known to have related bugs.</p>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-4247</cvename>
|
||
|
<freebsdsa>SA-08:12.ftpd</freebsdsa>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-12-23</discovery>
|
||
|
<entry>2009-01-05</entry>
|
||
|
<modified>2016-08-09</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="6b8cadce-db0b-11dd-aa56-000bcdf0a03b">
|
||
|
<topic>FreeBSD -- IPv6 Neighbor Discovery Protocol routing vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>FreeBSD</name>
|
||
|
<range><ge>6.3</ge><lt>6.3_5</lt></range>
|
||
|
<range><ge>7.0</ge><lt>7.0_5</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<h1>Problem Description</h1>
|
||
|
<p>IPv6 routers may allow "on-link" IPv6 nodes to create and
|
||
|
update the router's neighbor cache and forwarding
|
||
|
information. A malicious IPv6 node sharing a common router
|
||
|
but on a different physical segment from another node may be
|
||
|
able to spoof Neighbor Discovery messages, allowing it to
|
||
|
update router information for the victim node.</p>
|
||
|
<h1>Impact:</h1>
|
||
|
<p>An attacker on a different physical network connected to the
|
||
|
same IPv6 router as another node could redirect IPv6 traffic
|
||
|
intended for that node. This could lead to denial of service
|
||
|
or improper access to private network traffic.</p>
|
||
|
<h1>Workaround:</h1>
|
||
|
<p>Firewall packet filters can be used to filter incoming
|
||
|
Neighbor Solicitation messages but may interfere with normal
|
||
|
IPv6 operation if not configured carefully.</p>
|
||
|
<p>Reverse path forwarding checks could be used to make
|
||
|
gateways, such as routers or firewalls, drop Neighbor
|
||
|
Solicitation messages from nodes with unexpected source
|
||
|
addresses on a particular interface.</p>
|
||
|
<p>IPv6 router administrators are encouraged to read RFC 3756
|
||
|
for further discussion of Neighbor Discovery security
|
||
|
implications.</p>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-2476</cvename>
|
||
|
<freebsdsa>SA-08:10.nd6</freebsdsa>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-10-01</discovery>
|
||
|
<entry>2009-01-05</entry>
|
||
|
<modified>2016-08-09</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="5796858d-db0b-11dd-aa56-000bcdf0a03b">
|
||
|
<topic>FreeBSD -- arc4random(9) predictable sequence vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>FreeBSD</name>
|
||
|
<range><ge>6.3</ge><lt>6.3_6</lt></range>
|
||
|
<range><ge>7.0</ge><lt>7.0_6</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<h1>Problem Description:</h1>
|
||
|
<p>When the arc4random(9) random number generator is
|
||
|
initialized, there may be inadequate entropy to meet the
|
||
|
needs of kernel systems which rely on arc4random(9); and it
|
||
|
may take up to 5 minutes before arc4random(9) is reseeded
|
||
|
with secure entropy from the Yarrow random number generator.</p>
|
||
|
<h1>Impact:</h1>
|
||
|
<p>All security-related kernel subsystems that rely on a
|
||
|
quality random number generator are subject to a wide range of
|
||
|
possible attacks for the 300 seconds after boot or until 64k
|
||
|
of random data is consumed. The list includes:</p>
|
||
|
<p>* GEOM ELI providers with onetime keys. When a provider is
|
||
|
configured in a way so that it gets attached at the same time
|
||
|
during boot (e.g. it uses the rc subsystem to initialize) it
|
||
|
might be possible for an attacker to recover the encrypted
|
||
|
data.</p>
|
||
|
<p>* GEOM shsec providers. The GEOM shsec subsytem is used to
|
||
|
split a shared secret between two providers so that it can be
|
||
|
recovered when both of them are present. This is done by
|
||
|
writing the random sequence to one of providers while
|
||
|
appending the result of the random sequence on the other host
|
||
|
to the original data. If the provider was created within the
|
||
|
first 300 seconds after booting, it might be possible for an
|
||
|
attacker to extract the original data with access to only one
|
||
|
of the two providers between which the secret data is split.</p>
|
||
|
<p>* System processes started early after boot may receive
|
||
|
predictable IDs.</p>
|
||
|
<p>* The 802.11 network stack uses arc4random(9) to generate
|
||
|
initial vectors (IV) for WEP encryption when operating in
|
||
|
client mode and WEP authentication challenges when operating
|
||
|
in hostap mode, which may be insecure.</p>
|
||
|
<p>* The IPv4, IPv6 and TCP/UDP protocol implementations rely
|
||
|
on a quality random number generator to produce unpredictable
|
||
|
IP packet identifiers, initial TCP sequence numbers and
|
||
|
outgoing port numbers. During the first 300 seconds after
|
||
|
booting, it may be easier for an attacker to execute IP
|
||
|
session hijacking, OS fingerprinting, idle scanning, or in
|
||
|
some cases DNS cache poisoning and blind TCP data injection
|
||
|
attacks.</p>
|
||
|
<p>* The kernel RPC code uses arc4random(9) to retrieve
|
||
|
transaction identifiers, which might make RPC clients
|
||
|
vulnerable to hijacking attacks.</p>
|
||
|
<h1>Workaround:</h1>
|
||
|
<p>No workaround is available for affected systems.</p>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-5162</cvename>
|
||
|
<freebsdsa>SA-08.11.arc4random</freebsdsa>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-11-24</discovery>
|
||
|
<entry>2009-01-05</entry>
|
||
|
<modified>2016-08-09</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="d5e1aac8-db0b-11dd-ae30-001cc0377035">
|
||
|
<topic>xterm -- DECRQSS remote command execution vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>xterm</name>
|
||
|
<range><lt>238</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>SecurityFocus reports:</p>
|
||
|
<blockquote cite="http://www.securityfocus.com/bid/33060/discuss">
|
||
|
<p>The xterm program is prone to a remote command-execution
|
||
|
vulnerability because it fails to sufficiently validate user
|
||
|
input.</p>
|
||
|
<p>Successfully exploiting this issue would allow an attacker
|
||
|
to execute arbitrary commands on an affected computer in the
|
||
|
context of the affected application.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>33060</bid>
|
||
|
<cvename>CVE-2008-2383</cvename>
|
||
|
<url>http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510030</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-12-28</discovery>
|
||
|
<entry>2009-01-05</entry>
|
||
|
<modified>2009-01-06</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="58a3c266-db01-11dd-ae30-001cc0377035">
|
||
|
<topic>php5-gd -- uninitialized memory information disclosure vulnerability</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>php5-gd</name>
|
||
|
<range><le>5.2.8</le></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>According to CVE-2008-5498 entry:</p>
|
||
|
<blockquote cite="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5498">
|
||
|
<p>Array index error in the "imageRotate" function in PHP 5.2.8 and
|
||
|
earlier allows context-dependent attackers to read the contents
|
||
|
of arbitrary memory locations via a crafted value of the third
|
||
|
argument (aka the "bgd_color" or "clrBack" argument) for an indexed
|
||
|
image.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<bid>33002</bid>
|
||
|
<cvename>CVE-2008-5498</cvename>
|
||
|
<url>http://www.securiteam.com/unixfocus/6G00Y0ANFU.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-12-24</discovery>
|
||
|
<entry>2009-01-05</entry>
|
||
|
<modified>2009-02-04</modified>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="27d78386-d35f-11dd-b800-001b77d09812">
|
||
|
<topic>awstats -- multiple XSS vulnerabilities</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>awstats</name>
|
||
|
<range><lt>6.9,1</lt></range>
|
||
|
</package>
|
||
|
<package>
|
||
|
<name>awstats-devel</name>
|
||
|
<range><gt>0</gt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Secunia reports:</p>
|
||
|
<blockquote cite="http://secunia.com/advisories/31519">
|
||
|
<p>Morgan Todd has discovered a vulnerability in AWStats,
|
||
|
which can be exploited by malicious people to conduct
|
||
|
cross-site scripting attacks.</p>
|
||
|
<p>Input passed in the URL to awstats.pl is not properly
|
||
|
sanitised before being returned to the user. This can be
|
||
|
exploited to execute arbitrary HTML and script code in a
|
||
|
user's browser session in context of an affected site.</p>
|
||
|
<p>Successful exploitation requires that the application is
|
||
|
running as a CGI script.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-3714</cvename>
|
||
|
<cvename>CVE-2008-5080</cvename>
|
||
|
<url>http://secunia.com/advisories/31519</url>
|
||
|
<url>http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-03-12</discovery>
|
||
|
<entry>2009-01-04</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="13b0c8c8-bee0-11dd-a708-001fc66e7203">
|
||
|
<topic>p5-File-Path -- rmtree allows creation of setuid files</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>p5-File-Path</name>
|
||
|
<range><lt>2.07_1</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Jan Lieskovsky reports:</p>
|
||
|
<blockquote cite="http://www.openwall.com/lists/oss-security/2008/11/28/1">
|
||
|
<p>perl-File-Path rmtree race condition (CVE-2005-0448 was assigned to
|
||
|
address this)</p>
|
||
|
<p>This vulnerability was fixed in 5.8.4-7 but re-introduced
|
||
|
in 5.8.8-1. It's also present in File::Path 2.xx, up to and
|
||
|
including 2.07 which has only a partial fix.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2005-0448</cvename>
|
||
|
<mlist>http://www.openwall.com/lists/oss-security/2008/11/28/1</mlist>
|
||
|
<mlist>http://www.gossamer-threads.com/lists/perl/porters/233699#233699</mlist>
|
||
|
<url>http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286905</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-11-28</discovery>
|
||
|
<entry>2009-01-03</entry>
|
||
|
</dates>
|
||
|
</vuln>
|
||
|
|
||
|
<vuln vid="0e1e3789-d87f-11dd-8ecd-00163e000016">
|
||
|
<topic>vim -- multiple vulnerabilities in the netrw module</topic>
|
||
|
<affects>
|
||
|
<package>
|
||
|
<name>vim</name>
|
||
|
<name>vim-console</name>
|
||
|
<name>vim-lite</name>
|
||
|
<name>vim-gtk2</name>
|
||
|
<name>vim-gnome</name>
|
||
|
<range><ge>7.0</ge><lt>7.2</lt></range>
|
||
|
</package>
|
||
|
</affects>
|
||
|
<description>
|
||
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
||
|
<p>Jan Minar reports:</p>
|
||
|
<blockquote cite="http://www.rdancer.org/vulnerablevim-netrw.v2.html">
|
||
|
<p>Applying the ``D'' to a file with a crafted file name,
|
||
|
or inside a directory with a crafted directory name, can
|
||
|
lead to arbitrary code execution.</p>
|
||
|
</blockquote>
|
||
|
<blockquote cite="http://www.rdancer.org/vulnerablevim-netrw.v5.html">
|
||
|
<p>Lack of sanitization throughout Netrw can lead to arbitrary
|
||
|
code execution upon opening a directory with a crafted
|
||
|
name.</p>
|
||
|
</blockquote>
|
||
|
<blockquote cite="http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html">
|
||
|
<p>The Vim Netrw Plugin shares the FTP user name and password
|
||
|
across all FTP sessions. Every time Vim makes a new FTP
|
||
|
connection, it sends the user name and password of the
|
||
|
previous FTP session to the FTP server.</p>
|
||
|
</blockquote>
|
||
|
</body>
|
||
|
</description>
|
||
|
<references>
|
||
|
<cvename>CVE-2008-3076</cvename>
|
||
|
<mlist>http://www.openwall.com/lists/oss-security/2008/10/16/2</mlist>
|
||
|
<url>http://www.rdancer.org/vulnerablevim-netrw.html</url>
|
||
|
<url>http://www.rdancer.org/vulnerablevim-netrw.v2.html</url>
|
||
|
<url>http://www.rdancer.org/vulnerablevim-netrw.v5.html</url>
|
||
|
<url>http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html</url>
|
||
|
</references>
|
||
|
<dates>
|
||
|
<discovery>2008-10-16</discovery>
|
||
|
<entry>2009-01-02</entry>
|
||
|
</dates>
|
||
|
</vuln>
|