The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:

cybersecurity alert CVE-2013-0190

Xen: denial of service via PVOPS xen_failsafe_callback

Synthesis of the vulnerability

When Xen uses PVOPS, an attacker who is located in a guest system can trigger an interruption, in order to stop the kernel.
Severity: 1/4.
Creation date: 16/01/2013.
Identifiers: BID-57433, CERTA-2013-AVI-045, CVE-2013-0190, FEDORA-2013-0952, FEDORA-2013-1025, RHSA-2013:0496-02, VIGILANCE-VUL-12336, XSA-40.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The PVOPS (ParaVirtualized OPerationS) architecture is used to start a kernel on a real (or HVM) computer, or in a paravirtualized environment.

The xen_failsafe_callback() function of the arch/x86/kernel/entry_32.S file is called when an interruption occurs (for example when the Code Selector is changed during the loading of the LDT - Local Descriptor Table). However, in PVOPS mode, this function increments twice the ESP stack pointer. As the stack is shifted, this error usually stops the kernel.

When Xen uses PVOPS, an attacker who is located in a guest system can therefore trigger an interruption, in order to stop the kernel.
Full Vigil@nce bulletin... (Free trial)

cybersecurity note CVE-2012-0572 CVE-2012-0574 CVE-2012-0578

MySQL: several vulnerabilities of January 2013

Synthesis of the vulnerability

Several vulnerabilities of MySQL are fixed by the CPU of January 2013.
Severity: 3/4.
Number of vulnerabilities in this bulletin: 18.
Creation date: 16/01/2013.
Identifiers: BID-57334, BID-57385, BID-57388, BID-57391, BID-57397, BID-57400, BID-57405, BID-57408, BID-57410, BID-57411, BID-57412, BID-57414, BID-57415, BID-57416, BID-57417, BID-57418, CERTA-2013-AVI-034, cpujan2013, CVE-2012-0572, CVE-2012-0574, CVE-2012-0578, CVE-2012-1702, CVE-2012-1705, CVE-2012-5060, CVE-2012-5096, CVE-2012-5611, CVE-2012-5612, CVE-2013-0367, CVE-2013-0368, CVE-2013-0371, CVE-2013-0375, CVE-2013-0383, CVE-2013-0384, CVE-2013-0385, CVE-2013-0386, CVE-2013-0389, JSA10601, MDVSA-2013:007, MDVSA-2013:102, RHSA-2013:0219-01, SSA:2013-022-01, SUSE-SU-2013:0262-1, VIGILANCE-VUL-12335.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

A Critical Patch Update fixes several vulnerabilities of MySQL.

An attacker can use a vulnerability of Server Parser, in order to obtain information, to alter information, or to create a denial of service (VIGILANCE-VUL-12198). [severity:3/4; CVE-2012-5612]

An attacker can use a vulnerability of Server Privileges, in order to obtain information, to alter information, or to create a denial of service (VIGILANCE-VUL-12198). [severity:3/4; CVE-2012-5611]

An attacker can use a vulnerability of GIS Extension, in order to create a denial of service. [severity:2/4; BID-57411, CVE-2012-5060]

An attacker can use a vulnerability of Information Schema, in order to create a denial of service. [severity:2/4; BID-57416, CVE-2013-0384]

An attacker can use a vulnerability of Server Optimizer, in order to create a denial of service. [severity:2/4; BID-57417, CVE-2013-0389]

An attacker can use a vulnerability of Stored Procedure, in order to create a denial of service. [severity:2/4; BID-57418, CVE-2013-0386]

An attacker can use a vulnerability of Server Replication, in order to obtain or alter information. [severity:2/4; BID-57412, CVE-2013-0385]

An attacker can use a vulnerability of Server Replication, in order to obtain or alter information. [severity:2/4; BID-57391, CVE-2013-0375]

An attacker can use a vulnerability of Server, in order to create a denial of service. [severity:2/4; BID-57388, CVE-2012-1702]

An attacker can use a vulnerability of Server Locking, in order to create a denial of service. [severity:2/4; BID-57405, CVE-2013-0383]

An attacker can use a vulnerability of InnoDB, in order to create a denial of service. [severity:1/4; BID-57397, CVE-2013-0368]

An attacker can use a vulnerability of InnoDB, in order to create a denial of service. [severity:1/4; BID-57385, CVE-2012-0572]

An attacker can use a vulnerability of MyISAM, in order to create a denial of service. [severity:1/4; BID-57415, CVE-2013-0371]

An attacker can use a vulnerability of Server, in order to create a denial of service. [severity:1/4; BID-57414, CVE-2012-0574]

An attacker can use a vulnerability of Server Optimizer, in order to create a denial of service. [severity:1/4; BID-57410, CVE-2012-1705]

An attacker can use a vulnerability of Server Optimizer, in order to create a denial of service. [severity:1/4; BID-57334, CVE-2012-0578]

An attacker can use a vulnerability of Server Partition, in order to create a denial of service. [severity:1/4; BID-57408, CVE-2013-0367]

An attacker can use a vulnerability of Server Privileges, in order to create a denial of service. [severity:1/4; BID-57400, CVE-2012-5096]
Full Vigil@nce bulletin... (Free trial)

weakness bulletin CVE-2012-0569 CVE-2012-3178 CVE-2013-0399

Solaris: several vulnerabilities of January 2013

Synthesis of the vulnerability

Several vulnerabilities of Solaris are fixed by the CPU of January 2013.
Severity: 2/4.
Number of vulnerabilities in this bulletin: 8.
Creation date: 16/01/2013.
Identifiers: BID-57393, BID-57395, BID-57398, BID-57399, BID-57402, BID-57403, BID-57406, BID-57407, CERTA-2013-AVI-031, cpujan2013, CVE-2012-0569, CVE-2012-3178, CVE-2013-0399, CVE-2013-0400, CVE-2013-0407, CVE-2013-0414, CVE-2013-0415, CVE-2013-0417, VIGILANCE-VUL-12334.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

A Critical Patch Update fixes several vulnerabilities of Solaris.

An attacker can use a vulnerability of Filesystem/cachefs, in order to obtain information, to alter information, or to create a denial of service. [severity:2/4; BID-57398, CVE-2013-0400]

An attacker can use a vulnerability of Utility/Umount, in order to obtain information, to alter information, or to create a denial of service. [severity:2/4; BID-57399, CVE-2013-0399]

An attacker can use a vulnerability of Bind, in order to obtain information, to alter information, or to create a denial of service. [severity:2/4; BID-57403, CVE-2013-0415]

An attacker can use a vulnerability of Fault Management System (FMS), in order to obtain information. [severity:2/4; BID-57407, CVE-2013-0417]

An attacker can use a vulnerability of Kernel/DTrace, in order to create a denial of service. [severity:1/4; BID-57393, CVE-2013-0407]

An attacker can use a vulnerability of Install/smpatch, in order to obtain or alter information. [severity:2/4; BID-57395, CVE-2012-0569]

An attacker can use a vulnerability of Utility/ksh93, in order to alter information, or to create a denial of service. [severity:1/4; BID-57402, CVE-2013-0414]

An attacker can use a vulnerability of Kernel, in order to create a denial of service. [severity:1/4; BID-57406, CVE-2012-3178]
Full Vigil@nce bulletin... (Free trial)

threat announce CVE-2013-0393 CVE-2013-0418

Oracle Outside In Technology: several vulnerabilities of January 2013

Synthesis of the vulnerability

Several vulnerabilities of Oracle Outside In Technology are fixed by the CPU of January 2013.
Severity: 3/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 16/01/2013.
Revision date: 18/01/2013.
Identifiers: 2809279, BID-57357, BID-57364, CERTA-2013-AVI-041, CERTA-2013-AVI-116, cpujan2013, CVE-2013-0393, CVE-2013-0418, MS13-012, VIGILANCE-VUL-12333, ZDI-13-001.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

A Critical Patch Update fixes several vulnerabilities of Oracle Outside In Technology. These libraries are used by several products, which are thus also impacted by these vulnerabilities.

An attacker can create malicious Paradox data, in order to force the vspdx.dll library to read at an invalid memory address, which leads to a denial of service. [severity:2/4; BID-57357, CVE-2013-0393]

An attacker can create malicious Paradox data, in order to trigger a buffer overflow in the vspdx.dll library, which can lead to code execution. [severity:3/4; BID-57364, CVE-2013-0418]
Full Vigil@nce bulletin... (Free trial)

threat note CVE-2011-5035 CVE-2012-0022 CVE-2012-1677

Oracle Fusion Middleware: several vulnerabilities of January 2013

Synthesis of the vulnerability

Several vulnerabilities of Oracle Fusion Middleware are fixed by the CPU of January 2013.
Severity: 2/4.
Number of vulnerabilities in this bulletin: 5.
Creation date: 16/01/2013.
Identifiers: BID-57342, BID-57348, CERTA-2013-AVI-041, cpujan2013, CVE-2011-5035, CVE-2012-0022, CVE-2012-1677, CVE-2012-5097, VIGILANCE-VUL-12332.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

A Critical Patch Update fixes several vulnerabilities of Oracle Fusion Middleware.

An attacker can use a vulnerability of Management Pack for Oracle GoldenGate, in order to create a denial of service. [severity:2/4; CVE-2012-0022]

An attacker can use a vulnerability of Oracle GoldenGate Veridata, in order to create a denial of service. [severity:2/4; CVE-2012-0022]

An attacker can use a vulnerability of Oracle WebLogic Server, in order to create a denial of service (VIGILANCE-VUL-11254). [severity:2/4; CVE-2011-5035]

An attacker can use a vulnerability of Oracle Access Manager, in order to alter information. [severity:2/4; BID-57348, CVE-2012-5097]

An attacker can use a vulnerability of Oracle Application Server Single Sign-On, in order to alter information. [severity:2/4; BID-57342, CVE-2012-1677]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2012-3220

Oracle Database: vulnerability of January 2013

Synthesis of the vulnerability

An attacker, who is authenticated on Oracle Database, can use a vulnerability of Spatial, in order to obtain information, to alter information, or to create a denial of service.
Severity: 2/4.
Creation date: 16/01/2013.
Identifiers: BID-57372, CERTA-2013-AVI-036, cpujan2013, CVE-2012-3220, VIGILANCE-VUL-12331.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker, who is authenticated on Oracle Database, can use a vulnerability of Spatial, in order to obtain information, to alter information, or to create a denial of service.
Full Vigil@nce bulletin... (Free trial)

security note CVE-2013-0172

Samba: altering AD DC LDAP objects

Synthesis of the vulnerability

When Samba is configured as an Active Directory Domain Controller, an authenticated attacker can alter LDAP objects.
Severity: 2/4.
Creation date: 15/01/2013.
Identifiers: 9554, BID-57329, CERTA-2013-AVI-030, CVE-2013-0172, FEDORA-2013-0859, FEDORA-2013-0935, VIGILANCE-VUL-12330.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Samba server can be configured as an Active Directory domain controller. An AD uses LDAP objects to represent resources (users, computers, etc.).

The access control to object is defined by its "objectClass". However, if an user owns a right (such as the read right) on an object, then he automatically gains the write privilege on this object. Moreover, if the user owns the writing right on an attribute of the object, then he gains the writing right on all attributes of the object.

When Samba is configured as an Active Directory Domain Controller, an authenticated attacker can therefore alter LDAP objects.
Full Vigil@nce bulletin... (Free trial)

weakness note 12329

Microsoft Lync Server: Cross Site Scripting via User-Agent

Synthesis of the vulnerability

When an attacker can modify the User-Agent header sent by victim's web browser, he can trigger a Cross Site Scripting, in order to execute JavaScript code in the context of the web site of Microsoft Lync Server.
Severity: 1/4.
Creation date: 14/01/2013.
Identifiers: BID-57300, VIGILANCE-VUL-12329.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Microsoft Lync Server web site generates web documents.

In order to help debugging, it adds in the generated HTML page the "diagInfo" JavaScript variable. This variable contains the HTTP User-Agent header (type of web browser) received in client's query. However, this header is inserted in the HTML page without being filtered.

When an attacker can modify the User-Agent header sent by victim's web browser, he can therefore trigger a Cross Site Scripting, in order to execute JavaScript code in the context of the web site of Microsoft Lync Server. To alter this header, the attacker can for example use a Man-in-the-middle.
Full Vigil@nce bulletin... (Free trial)

computer threat announce CVE-2012-3174

Oracle Java JRE: code execution via MethodHandle

Synthesis of the vulnerability

An attacker can create a malicious applet, using MethodHandle and sun.misc.reflect.Trampoline, in order to execute arbitrary Java code.
Severity: 3/4.
Creation date: 14/01/2013.
Identifiers: BID-57312, CVE-2012-3174, FEDORA-2013-0853, FEDORA-2013-0868, FEDORA-2013-0888, MDVSA-2013:095, openSUSE-SU-2013:0199-1, RHSA-2013:0156-01, RHSA-2013:0165-01, RHSA-2013:0624-01, RHSA-2013:0625-01, RHSA-2013:0626-01, SUSE-SU-2013:0440-1, swg21627634, swg21645096, swg21645100, VIGILANCE-VUL-12328, ZDI-13-002.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can create a malicious applet, using MethodHandle and sun.misc.reflect.Trampoline, in order to execute arbitrary Java code.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2013-0656

Siemens Simatic RF Manager: buffer overflow of ActiveX

Synthesis of the vulnerability

When Simatic RF Manager is installed on user's computer, an attacker can invite him to display a web page calling an ActiveX, in order to execute code on his computer.
Severity: 2/4.
Creation date: 11/01/2013.
Identifiers: BID-57324, CERTA-2013-AVI-026, CVE-2013-0656, ICSA-13-014-01, SSA-099471, VIGILANCE-VUL-12327.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Simatic RF Manager product is used to configure RFID readers, such as Simatic RF600. This software installs an ActiveX.

However, this ActiveX can be instantiated in Internet Explorer, and it contains a buffer overflow.

When Simatic RF Manager is installed on user's computer, an attacker can therefore invite him to display a web page calling an ActiveX, in order to execute code on his computer.
Full Vigil@nce bulletin... (Free trial)

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1141 1161 1163 1164 1165 1166 1167 1168 1169 1170 1171 1173 1175 1176 1177 1178 1179 1180 1181 1182 1183 1201 1221 1241 1261 1281 1301 1321 1341 1361 1381 1401 1421 1441 1461 1481 1501 1521 1541 1561 1581 1601 1621 1641 1661 1681 1701 1721 1741 1761 1781 1801 1821 1841 1861 1881 1901 1921 1941 1961 1981 2001 2021 2041 2061 2081 2101 2121 2141 2161 2181 2201 2221 2241 2261 2281 2301 2321 2341 2361 2381 2401 2421 2441 2461 2481 2501 2521 2541 2561 2581 2601 2621 2641 2661 2681 2701 2721 2741 2761 2781 2801 2821 2841 2861 2881 2901 2921 2922