The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:

computer vulnerability note CVE-2014-3882

WordPress Login rebuilder: Cross Site Request Forgery

Synthesis of the vulnerability

An attacker can trigger a Cross Site Request Forgery of WordPress Login rebuilder, in order to force the victim to perform operations.
Impacted products: WordPress Plugins ~ not comprehensive.
Severity: 2/4.
Consequences: user access/rights.
Provenance: internet client.
Creation date: 26/06/2014.
Identifiers: CVE-2014-3882, VIGILANCE-VUL-14939.

Description of the vulnerability

The Login rebuilder plugin can be installed on WordPress.

However, the origin of queries is not checked. They can for example originate from an image included in an HTML document.

An attacker can therefore trigger a Cross Site Request Forgery of WordPress Login rebuilder, in order to force the victim to perform operations.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2014-3299

Cisco IOS: denial of service via IPsec

Synthesis of the vulnerability

An authenticated attacker can send a malicious IPsec packet to Cisco IOS, in order to trigger a denial of service.
Impacted products: IOS by Cisco, Cisco Router.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: user account.
Creation date: 25/06/2014.
Identifiers: CSCui79745, CVE-2014-3299, VIGILANCE-VUL-14938.

Description of the vulnerability

An authenticated attacker can send a malicious IPsec packet to Cisco IOS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2014-2385

Sophos Antivirus Configuration Console: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of Sophos Antivirus Configuration Console, in order to execute JavaScript code in the context of the web site.
Impacted products: Sophos AV.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 25/06/2014.
Identifiers: CVE-2014-2385, VIGILANCE-VUL-14937.

Description of the vulnerability

The Sophos Antivirus Configuration Console product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of Sophos Antivirus Configuration Console, in order to execute JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2014-4022

Xen: information disclosure via GNTTABOP_setup_table

Synthesis of the vulnerability

A local attacker can read a memory fragment via GNTTABOP_setup_table of Xen, in order to obtain sensitive information.
Impacted products: Unix (platform) ~ not comprehensive.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 25/06/2014.
Identifiers: CERTFR-2014-AVI-297, CVE-2014-4022, VIGILANCE-VUL-14936, XSA-101.

Description of the vulnerability

The GNTTABOP_setup_table hypercall returns the list of Domain Grant Table Pages.

However, the alloc_domain_struct() function of the xen/arch/arm/domain.c file does not initialize a memory area before returning it to the user.

A local attacker can therefore read a memory fragment via GNTTABOP_setup_table of Xen, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2014-0206

Linux kernel: information disclosure via aio_read_events_ring

Synthesis of the vulnerability

A local attacker can read a memory fragment via aio_read_events_ring() of the Linux kernel, in order to obtain sensitive information.
Impacted products: Fedora, Android OS, Linux, openSUSE, RHEL, Ubuntu.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 25/06/2014.
Identifiers: CERTFR-2014-AVI-373, CVE-2014-0206, FEDORA-2014-7863, FEDORA-2014-8487, openSUSE-SU-2014:1677-1, RHSA-2014:0786-01, RHSA-2014:0913-01, USN-2336-1, USN-2337-1, VIGILANCE-VUL-14935.

Description of the vulnerability

The Linux kernel implements an AIO (Asynchronous IO) filesystem.

However, the aio_read_events_ring() function of the fs/aio.c file does not initialize a memory area before returning it to the user.

A local attacker can therefore read a memory fragment via aio_read_events_ring() of the Linux kernel, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2014-3951

FreeBSD: NULL pointer dereference via iconv

Synthesis of the vulnerability

An attacker can transmit malicious GB2312+HZ or VIQR data to a FreeBSD application using iconv, in order to trigger a denial of service.
Impacted products: FreeBSD.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 25/06/2014.
Identifiers: CVE-2014-3951, FreeBSD-SA-14:15.iconv, VIGILANCE-VUL-14934.

Description of the vulnerability

The iconv library converts the character encoding of data.

However, when a GB2312+HZ text is converted, iconv does not check if a pointer is NULL, before using it. A VIQR text also forces iconv to read at an invalid memory address.

An attacker can therefore transmit malicious GB2312+HZ or VIQR data to a FreeBSD application using iconv, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin 14933

WordPress TimThumb: code execution via WebShot

Synthesis of the vulnerability

An attacker can use the WebShot feature of WordPress plugins/themes using TimThumb, in order to execute code.
Impacted products: WordPress Plugins ~ not comprehensive.
Severity: 2/4.
Consequences: user access/rights.
Provenance: document.
Creation date: 25/06/2014.
Identifiers: VIGILANCE-VUL-14933.

Description of the vulnerability

The TimThumb script can be installed by plugins/themes installed on WordPress:
 - Mimbo Pro theme
 - WordThumb
 - WordPress Gallery Plugin
 - IGIT Posts Slider Widget
 - Themify theme
 - etc.

However, the timthumb.php script (or its derivatives) directly insert the parameter of the WebShot (enabled with WEBSHOT_ENABLED) feature in a shell command.

An attacker can therefore use the WebShot feature of WordPress plugins/themes using TimThumb, in order to execute code.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2014-4652 CVE-2014-4653 CVE-2014-4654

Linux kernel: multiple vulnerabilities of ALSA

Synthesis of the vulnerability

An attacker can use several vulnerabilities of ALSA of the Linux kernel.
Impacted products: Android OS, Linux, openSUSE, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, denial of service on server, denial of service on service, denial of service on client.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 5.
Creation date: 24/06/2014.
Identifiers: CERTFR-2014-AVI-373, CERTFR-2014-AVI-388, CERTFR-2014-AVI-416, CVE-2014-4652, CVE-2014-4653, CVE-2014-4654, CVE-2014-4655, CVE-2014-4656, MDVSA-2014:155, openSUSE-SU-2014:0957-1, openSUSE-SU-2014:0985-1, openSUSE-SU-2014:1246-1, RHSA-2014:1083-01, RHSA-2014:1392-01, RHSA-2014:1724-01, RHSA-2014:1971-01, RHSA-2015:0087-01, RHSA-2015:1272-01, SUSE-SU-2014:0908-1, SUSE-SU-2014:0909-1, SUSE-SU-2014:0910-1, SUSE-SU-2014:0911-1, SUSE-SU-2014:0912-1, SUSE-SU-2014:1105-1, SUSE-SU-2014:1138-1, SUSE-SU-2015:0812-1, USN-2332-1, USN-2333-1, USN-2334-1, USN-2335-1, USN-2336-1, USN-2337-1, VIGILANCE-VUL-14932.

Description of the vulnerability

Several vulnerabilities were announced in ALSA (Advanced Linux Sound Architecture).

An attacker can read a memory fragment, in order to obtain sensitive information. [severity:1/4; CVE-2014-4652]

An attacker can use a freed memory area, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; CVE-2014-4654, CVE-2014-4655]

An attacker can use a freed memory area, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; CVE-2014-4653]

An attacker can generate an integer overflow, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; CVE-2014-4656]

An attacker can generate an integer overflow, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; CVE-2014-4656]
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2014-3070

WebSphere AS: privilege escalation via addFileRegistryAccount

Synthesis of the vulnerability

An attacker can use an account of WebSphere AS, in order to escalate his privileges.
Impacted products: WebSphere AS Traditional.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user account.
Creation date: 24/06/2014.
Identifiers: 1676222, 1681249, 1695392, CVE-2014-3070, VIGILANCE-VUL-14931.

Description of the vulnerability

The WebSphere AS product can create an account with Virtual Member Manager SPI Admin Task addFileRegistryAccount.

However, this account can bypass security restrictions.

An attacker can therefore use an account of WebSphere AS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2013-6323 CVE-2013-6329 CVE-2013-6438

WebSphere AS 8.0: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of WebSphere AS 8.0.
Impacted products: HP-UX, WebSphere AS Traditional.
Severity: 3/4.
Consequences: client access/rights, data reading, denial of service on service.
Provenance: document.
Number of vulnerabilities in this bulletin: 15.
Creation date: 24/06/2014.
Identifiers: 1676092, BID-64249, BID-65400, c04483248, CERTFR-2014-AVI-131, CERTFR-2014-AVI-253, CVE-2013-6323, CVE-2013-6329, CVE-2013-6438, CVE-2013-6738, CVE-2013-6747, CVE-2014-0050, CVE-2014-0076, CVE-2014-0098, CVE-2014-0823, CVE-2014-0857, CVE-2014-0859, CVE-2014-0891, CVE-2014-0963, CVE-2014-0965, CVE-2014-3022, HPSBUX03150, PI04777, PI04880, PI05309, PI05324, PI05661, PI07808, PI08892, PI09345, PI09443, PI09594, PI09786, PI11434, PI12648, PI12926, PI13028, PI13162, PI17025, PI19700, SSRT101681, VIGILANCE-VUL-14930.

Description of the vulnerability

Several vulnerabilities were announced in WebSphere AS 8.0.

An attacker can trigger a Cross Site Scripting in Administration Console, in order to execute JavaScript code in the context of the web site. [severity:2/4; CVE-2013-6323, PI04777, PI04880]

An attacker can send malicious SSLv2 messages to applications using IBM GSKit, in order to trigger a denial of service (VIGILANCE-VUL-14155). [severity:2/4; BID-64249, CVE-2013-6329, PI05309]

An attacker can use Full/Liberty Profile, in order to obtain sensitive information. [severity:2/4; CVE-2014-0823, PI05324]

An attacker can trigger a Cross Site Scripting in Oauth, in order to execute JavaScript code in the context of the web site. [severity:2/4; CVE-2013-6738, PI05661]

An attacker can use the Administrative Console, in order to escalate his privileges. [severity:2/4; CVE-2014-0857, PI07808]

An attacker can use POST queries, in order to trigger a denial of service. [severity:2/4; CVE-2014-0859, PI08892]

An attacker can send a DAV WRITE query starting by spaces, in order to trigger a denial of service in mod_dav of Apache HTTP Server (VIGILANCE-VUL-14439). [severity:2/4; CERTFR-2014-AVI-131, CVE-2013-6438, PI09345]

An attacker can send malicious SSL/TLS messages to applications using IBM GSKit, in order to trigger a denial of service (VIGILANCE-VUL-14158). [severity:2/4; CVE-2013-6747, PI09443]

An attacker can trigger an error, in order to obtain sensitive information. [severity:1/4; CVE-2014-3022, PI09594]

An attacker can use the Proxy/ODR, in order to obtain sensitive information. [severity:2/4; CVE-2014-0891, PI09786]

An attacker can use a long Content-Type header, to generate an infinite loop in Apache Commons FileUpload or Apache Tomcat, in order to trigger a denial of service (VIGILANCE-VUL-14183). [severity:2/4; BID-65400, CVE-2014-0050, PI12648, PI12926, PI13162]

An attacker can use SOAP, in order to obtain sensitive information. [severity:2/4; CVE-2014-0965, PI11434]

An attacker can use a truncated cookie, in order to trigger a denial of service in mod_log_config of Apache HTTP Server (VIGILANCE-VUL-14438). [severity:2/4; CERTFR-2014-AVI-131, CVE-2014-0098, PI13028]

An attacker can send malicious SSL/TLS messages to applications using IBM GSKit, in order to trigger a denial of service (VIGILANCE-VUL-14775). [severity:3/4; CVE-2014-0963, PI17025]

A local attacker can guess the ECDSA secret used by the OpenSSL implementation, in order to obtain sensitive information (VIGILANCE-VUL-14462). [severity:1/4; CERTFR-2014-AVI-253, CVE-2014-0076, PI19700]
Full Vigil@nce bulletin... (Free trial)

Previous page   Next page

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1141 1161 1181 1201 1221 1241 1261 1281 1301 1321 1341 1361 1381 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1421 1441 1461 1481 1501 1521 1541 1561 1581 1601 1621 1641 1661 1681 1701 1721 1741 1761 1781 1801 1821 1841 1861 1881 1901 1921 1941 1961 1981 2001 2021 2041 2061 2081 2101 2121 2141 2161 2181 2201 2221 2241 2261 2281 2301 2321 2341 2361 2381 2401 2421 2441 2461 2481 2501 2521 2541 2561 2581 2601 2621 2641 2661 2681 2701 2721 2741 2761 2781 2801 2821 2841 2861 2881 2896