The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:

vulnerability bulletin CVE-2006-4625

PHP: bypassing directives using ini_restore

Synthesis of the vulnerability

A local attacker can use ini_restore() to bypass directives of Apache configuration.
Impacted products: Tru64 UNIX, Mandriva Linux, Mandriva NF, OES, openSUSE, PHP, SLES, TurboLinux.
Severity: 2/4.
Consequences: user access/rights.
Provenance: user account.
Creation date: 09/10/2006.
Identifiers: BID-19933, CVE-2006-4625, emr_na-c01086137-1, HPSBTU02232, MDKSA-2006:185, SSRT071429, SUSE-SA:2006:059, TLSA-2006-38, VIGILANCE-VUL-6213.

Description of the vulnerability

The Apache configuration file can contain directives to change PHP behavior in some paths. For example:
  <Directory /dir/>
    php_admin_flag safe_mode 1
    php_admin_value open_basedir /data
  </Directory>

The ini_restore() function restores value of an option to the value indicated in the php.ini configuration file.

So, if:
 - the configuration of php.ini is permissive, and
 - the configuration of httpd.conf is stricter,
then, an attacker can force PHP to use the permissive configuration.

This vulnerability therefore permits an attacker to bypass Apache measures setup by the administrator.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2006-5218

OpenBSD, NetBSD: integer overflow of systrace

Synthesis of the vulnerability

A local attacker can use the STRIOCREPLACE operation of systrace() in order to generate a denial of service, to read a memory fragment, or to elevate his privileges.
Impacted products: NetBSD, OpenBSD.
Severity: 2/4.
Consequences: administrator access/rights, data reading, denial of service on server.
Provenance: user shell.
Creation date: 09/10/2006.
Revision date: 13/10/2006.
Identifiers: BID-20392, CESA-2006-003, CVE-2006-5218, NetBSD-SA2006-024, VIGILANCE-VUL-6212.

Description of the vulnerability

The systrace() system call permits to control execution of a process.

The STRIOCREPLACE operation modifies parameters given to the program. However, systrace() does not correctly check the systrace_replace structure. A local attacker can thus generate an integer overflow.

This vulnerability permits attacker to generate a denial of service, to read a memory fragment, or to elevate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2006-5214 CVE-2006-5215

X.Org: xdm session error file reading

Synthesis of the vulnerability

A local attacker can read the xdm session error file of another user.
Impacted products: Fedora, Solaris, Trusted Solaris.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 2.
Creation date: 09/10/2006.
Identifiers: 102652, 32804, 5897, 5898, 6388471, 6423858, BID-20400, CVE-2006-5214, CVE-2006-5215, FEDORA-2007-1409, FEDORA-2007-659, VIGILANCE-VUL-6211.

Description of the vulnerability

The xdm (X Display Manager) program manages one or several X servers. It contains two vulnerabilities in the way error files are managed.

The $HOME/.xsession-errors file is created world readable, then its mode is changed to 0600. However, a local attacker can open the file between these operations and keep the file descriptor. [severity:1/4; 32804, 5897, 6423858, CVE-2006-5214]

The ${TMPDIR-/tmp}/xses-$USER file is created without checking if a symlink exists. A local attacker can therefore force xdm to open a file that he can read. [severity:1/4; 5898, 6388471, CVE-2006-5215]
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2006-5213

Solaris: packets capture via link aggregation

Synthesis of the vulnerability

A local attacker can capture network packets when link aggregation is activated.
Impacted products: Solaris.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 09/10/2006.
Identifiers: 102606, 6364350, BID-20377, CVE-2006-5213, VIGILANCE-VUL-6210.

Description of the vulnerability

Link aggregation permits to use several network cables to augment the throughput.

When the aggregation is activated, a local attacker is allowed to create a raw socket. By creating this type of socket, he can then capture packets flowing on the aggregate.

This vulnerability therefore permits a local attacker to obtains sensitive information contained in network packets.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2006-5072

Mono: file corruption via System.CodeDom.Compiler

Synthesis of the vulnerability

A local attacker can use a symlink in order to create or alter a file during the usage of System.CodeDom.Compiler classes of Mono.
Impacted products: Fedora, Mandriva Linux, openSUSE, SLES, Unix (platform) ~ not comprehensive.
Severity: 1/4.
Consequences: data creation/edition.
Provenance: user shell.
Creation date: 09/10/2006.
Identifiers: CVE-2006-5072, FEDORA-2006-1012, MDKSA-2006:188, SUSE-SA:2006:073, VIGILANCE-VUL-6209.

Description of the vulnerability

The Mono environment is used to develop and run .NET applications under Unix.

Classes of the System.CodeDom.Compiler namespace permits to compile code. However, their methods create temporary files in an insecure manner.

A local attacker can thus use a symlink in order to create or alter a file during the usage of System.CodeDom.Compiler classes.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2006-5403 CVE-2006-5404

Symantec: vulnerability of the Support Tool ActiveX

Synthesis of the vulnerability

The ActiveX provided by Symantec for technical support of some products can be used by an attacker to obtain information or to execute code.
Impacted products: Norton Antivirus, Norton Internet Security.
Severity: 2/4.
Consequences: user access/rights, data reading.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 06/10/2006.
Identifiers: BID-20348, CVE-2006-5403, CVE-2006-5404, SYM06-019, VIGILANCE-VUL-6208, VU#400601.

Description of the vulnerability

Symantec provides an ActiveX to ensure technical support of some products:
 - Symantec Norton AntiVirus 2005-2006
 - Symantec Norton Internet Security 2005-2006
 - Symantec Norton System Works 2005-2006
It can also be installed during a support operation.

This ActiveX can be used by an attacker to obtain information or to execute code.

Technical details are currently unknown.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2006-4927

Symantec: privilege elevation via 3 IOCTL of NAVENG.SYS

Synthesis of the vulnerability

A local attacker can obtain system privileges with several Symantec products using NAVENG.SYS or NAVEX15.SYS.
Impacted products: Norton Antivirus, Norton Internet Security, Symantec AV.
Severity: 2/4.
Consequences: administrator access/rights.
Provenance: user shell.
Creation date: 06/10/2006.
Identifiers: BID-20360, CERTA-2006-AVI-431, CVE-2006-4927, iDefense Security Advisory 10.05.06, SYM06-020, VIGILANCE-VUL-6207.

Description of the vulnerability

The NAVENG.SYS and NAVEX15.SYS drivers are installed under Windows NT/2000/XP by several Symantec products. An IRP (I/O Request Packet) is used to communicate with the driver.

These drivers do not correctly check memory address indicated in IRP of 3 IOCTL. A local attacker can thus modify 4 bytes located in driver memory.

This vulnerability therefore permits a local attacker to obtain system privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2006-4997

Linux kernel: denial of service of ATM clip_mkip

Synthesis of the vulnerability

An attacker can create an error in the clip_mkip() function in order to stop systems with ATM activated.
Impacted products: Debian, Linux, Mandriva Linux, Mandriva NF, NLD, OES, openSUSE, RHEL, SLES.
Severity: 2/4.
Consequences: denial of service on server.
Provenance: internet client.
Creation date: 06/10/2006.
Identifiers: 206265, AD_LAB-06009, BID-20363, CERTA-2006-AVI-450, CVE-2006-4997, DSA-1233-1, DSA-1237-1, MDKSA-2006:197, MDKSA-2007:012, MDKSA-2007:025, RHSA-2006:0689-01, RHSA-2006:0710-01, RHSA-2007:0012-01, RHSA-2007:0013-01, SUSE-SA:2006:079, VIGILANCE-VUL-6206.

Description of the vulnerability

The net/atm/clip.c file implements Classical IP over ATM (RFC1577). The clip_mkip() function attaches a socket to an IP address.

When clip_mkip() is executed, a memory area containing a sk_buff structure is used without checking if it was not freed.

A remote attacker can generate this error, and thus stop the kernel.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2006-4623

Linux kernel: denial of service of DVB

Synthesis of the vulnerability

An attacker can send a malformed ULE packet in order to stop systems where DVB is activated.
Impacted products: Debian, Linux, Mandriva Linux, NLD, OES, openSUSE, RHEL, SLES.
Severity: 2/4.
Consequences: denial of service on server.
Provenance: intranet client.
Creation date: 06/10/2006.
Identifiers: BID-19939, CVE-2006-4623, DSA-1304-1, MDKSA-2006:182, RHSA-2006:0689-01, SUSE-SA:2006:079, VIGILANCE-VUL-6205.

Description of the vulnerability

DVB (Digital Video Broadcasting) can be activated on Linux kernels. DVB uses ULE encapsulations (Unidirectional Lightweight Encapsulation).

The dvb_net_ule() function of drivers/media/dvb/dvb-core/dvb_net.c file decodes ULE data. However, this function does not check if SNDU size is sufficient. When this size if null, an error occurs.

This vulnerability therefore permits a remote attacker to stop kernel.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2006-4535

Linux Kernel: denial of service of SCTP

Synthesis of the vulnerability

The patch for the VIGILANCE-VUL-6114 vulnerability permits a local attacker to generate a denial of service.
Impacted products: Debian, Linux, Mandriva Linux, Mandriva NF, RHEL.
Severity: 1/4.
Consequences: denial of service on server.
Provenance: user shell.
Creation date: 06/10/2006.
Identifiers: 204460, BID-20087, CVE-2006-4535, DSA-1183-1, DSA-1184-1, MDKSA-2006:182, MDKSA-2007:025, RHSA-2006:0689-01, VIGILANCE-VUL-6204.

Description of the vulnerability

The VIGILANCE-VUL-6114 vulnerability permits a local attacker to execute privileged code.

However, its patch changes sctp_primitive_ABORT(), which do not recognize some SO_LINGER values.

A local attacker can therefore use these values to stop system.
Full Vigil@nce bulletin... (Free trial)

Previous page   Next page

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1141 1161 1181 1201 1221 1241 1261 1281 1301 1321 1341 1361 1381 1401 1421 1441 1461 1481 1501 1521 1541 1561 1581 1601 1621 1641 1661 1681 1701 1721 1741 1761 1781 1801 1821 1841 1861 1881 1901 1921 1941 1961 1981 2001 2021 2041 2061 2081 2101 2121 2141 2161 2181 2201 2221 2241 2261 2281 2301 2321 2341 2361 2381 2401 2421 2441 2461 2481 2501 2521 2541 2561 2581 2601 2621 2641 2661 2681 2701 2721 2741 2761 2781 2801 2821 2841 2861 2881 2892