The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:

weakness note CVE-2007-4569

KDM: connection without a password

Synthesis of the vulnerability

Under certain circumstances, an attacker can login via KDM without entering a password.
Severity: 1/4.
Creation date: 20/09/2007.
Identifiers: advisory-20070919-1, BID-25730, CERTA-2007-AVI-410, CVE-2007-4569, DSA-1376-1, FEDORA-2007-2361, FEDORA-2007-716, MDKSA-2007:190, RHSA-2007:0905-01, SSA:2007-264-01, SUSE-SR:2007:021, VIGILANCE-VUL-7181.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The autologin feature of KDM opens a session on startup, then locks it waiting for user. When user enters his password, he directly accesses to his session, without waiting for its loading.

When autologin and "shutdown with password" are enabled, an attacker can login without entering a password. This error occurs in kdm/backend/session.c file.

A local attacker can therefore connect under victim's account.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2007-4880 CVE-2007-5022

IBM Tivoli Storage Manager Client: vulnerabilities

Synthesis of the vulnerability

Two vulnerabilities affect IBM Tivoli Storage Manager clients.
Severity: 1/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 20/09/2007.
Revisions dates: 25/09/2007, 29/10/2007.
Identifiers: BID-25743, CVE-2007-4880, CVE-2007-5021-REJECT, CVE-2007-5022, IC52905, IC53616, VIGILANCE-VUL-7179, ZDI-07-054.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Two vulnerabilities affect IBM Tivoli Storage Manager clients (Web client GUI, Backup-Archive client and server-initiated prompted scheduling).

An attacker can generate a buffer overflow in CAD (Client Acceptor Daemon) in order to execute code. This overflow occurs in the dsmcad.exe process which listens as a web server on port 1581/tcp. To exploit this vulnerability, attacker has to use a long Host header. [severity:1/4; BID-25743, CVE-2007-4880, CVE-2007-5021-REJECT, IC52905, ZDI-07-054]

During Backup-Archive "server-initiated prompted scheduling" usage, an attacker can access to client's data. [severity:1/4; CVE-2007-5022, IC53616]
Full Vigil@nce bulletin... (Free trial)

computer weakness alert CVE-2007-5008

HP-UX: incorrect display of logins

Synthesis of the vulnerability

The logins command incorrectly displays status of user's password, which may hide issues to the administrator.
Severity: 1/4.
Creation date: 19/09/2007.
Identifiers: BID-25740, CERTA-2007-AVI-412, CVE-2007-5008, emr_na-c01167886-1, VIGILANCE-VUL-7178.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The /usr/sbin/logins command displays information on accounts and their passwords. The '-p' option of logins indicates accounts without a password.

However, when shadow passwords are used, the "logins -p" command does not list users with no passwords.

Administrator thus does not detect user accounts without a password.
Full Vigil@nce bulletin... (Free trial)

computer weakness bulletin CVE-2007-5042 CVE-2007-5044 CVE-2007-5047

Norton Internet Security, Outpost, ZoneAlarm: corruption via SSDT hooking

Synthesis of the vulnerability

A local attacker can create a denial of service or corrupt memory of some software incorrectly implementing SSDT hooking.
Severity: 1/4.
Number of vulnerabilities in this bulletin: 3.
Creation date: 19/09/2007.
Identifiers: CVE-2007-5042, CVE-2007-5044, CVE-2007-5047, VIGILANCE-VUL-7177.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The SSDT table (System Service Descriptor Table) contains references on system calls:
 - NtCreateKey : create a key in registry
 - NtCreateThread : create a thread
 - NtDeleteFile : delete a file
 - etc.

Security software hooks entries in this table to point to specific functions. However, these functions do not correctly check their parameters. A local attacker can thus use malicious attributes in order to generate an error.

This vulnerability leads to a denial of service, and eventually to code execution.

Following software have been identified as vulnerable:
 - BlackICE PC Protection 3.6.cqn
 - G DATA InternetSecurity 2007
 - Ghost Security Suite beta 1.110 and alpha 1.200
 - Kaspersky Internet Security 7.0.0.125
 - Norton Internet Security 2008 15.0.0.60
 - Online Armor Personal Firewall 2.0.1.215
 - Outpost Firewall Pro 4.0.1025.7828
 - Privatefirewall 5.0.14.2
 - Process Monitor 1.22
 - ProcessGuard 3.410
 - ProSecurity 1.40 Beta 2
 - RegMon 7.04
 - ZoneAlarm Pro 7.0.362.000

These vulnerabilities are different from VIGILANCE-VUL-6271, VIGILANCE-VUL-6704 and VIGILANCE-VUL-6742.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2007-3372

Avahi: denial of service via D-Bus

Synthesis of the vulnerability

A local attacker can stop the Avahi daemon by using a special D-Bus message.
Severity: 1/4.
Creation date: 18/09/2007.
Identifiers: BID-24614, CVE-2007-3372, DSA-1690-1, MDKSA-2007:185, SUSE-SR:2007:014, VIGILANCE-VUL-7176.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Avahi system permits to discover services offered by a local network.

The D-Bus environment permits applications to exchange information. It is based on a daemon and a library which is used by software. Avahi uses D-Bus.

An attacker can use a D-Bus message with an empty TXT field in order to generate an assertion error in Avahi. This error stops the daemon.

A local attacker can therefore create a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2007-3112 CVE-2007-3113

Cacti: denials of service

Synthesis of the vulnerability

An attacker can use graph_* parameters of graph_image.php in order to generate a denial of service.
Severity: 1/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 18/09/2007.
Identifiers: CVE-2007-3112, CVE-2007-3113, DSA-1954-1, FEDORA-2007-2199, MDKSA-2007:184, VIGILANCE-VUL-7175.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Cacti web server, written in PHP language, displays network statistic graphics.

The graph_image.php script generate graphics. It uses several parameters:
 - graph_start: start date expressed as a number of seconds since 1st of January 1970
 - graph_end: end date expressed as a number of seconds since 1st of January 1970
 - graph_height: height of image
 - graph_width: width of image
 - etc.

However, no limit is imposed on these parameters. An attacker can thus use large values in order to force Cacti process to consume a lot of CPU resources.

A remote attacker can therefore create a denial of service.
Full Vigil@nce bulletin... (Free trial)

security vulnerability CVE-2007-2834

OpenOffice: code execution via TIFF

Synthesis of the vulnerability

An attacker can create a malicious TIFF image in order to generate an overflow in OpenOffice leading to code execution.
Severity: 3/4.
Creation date: 17/09/2007.
Revision date: 18/09/2007.
Identifiers: 102994, 6571633, BID-25690, CERTA-2007-AVI-405, CVE-2007-2834, DSA-1375-1, FEDORA-2007-2372, FEDORA-2007-700, MDKSA-2007:186, RHSA-2007:0848-01, SUSE-SA:2007:052, VIGILANCE-VUL-7174.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The source/filter.vcl/itiff/itiff.cxx file of OpenOffice implements the TIFFReader class to read images in TIFF format.

A TIFF image (RFC 2306) contains tags defining its properties:
 - tag 0x0100=256 : ImageWidth (width of image)
 - tag 0x011a=282 : XResolution (X resolution)
 - tag 0x0111=273 : StripOffsets (start of a "strip", a data area)
 - tag 0x0117=279 : StripByteCounts (size of a strip)
 - etc.

The TIFFReader::ReadTagData() method reads these tags. However, values indicated in StripOffsets and StripByteCounts tags are not correctly checked and generate an integer overflow. This overflow permits to corrupt memory.

An attacker can therefore create a malicious TIFF image in order to execute code on computer of victims opening it with OpenOffice.
Full Vigil@nce bulletin... (Free trial)

threat alert CVE-2007-4673

QuickTime: command execution via chrome

Synthesis of the vulnerability

An attacker can create a malicious multimedia document, leading to code execution when it is opened in QuickTime.
Severity: 3/4.
Creation date: 14/09/2007.
Identifiers: APPLE-SA-2007-10-03, BID-25657, BID-25913, CVE-2007-4673, mfsa2007-28, VIGILANCE-VUL-7173, VU#751808.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The QuickTime plugin displays multimedia documents in several format: avi, mov, mp3, mpeg, wav, etc. When this plugin is activated in the web browser, it displays documents with these extensions.

QTL (QuickTime Media Link) documents have an "embed" element whose "qtnext" attribute indicates the url of a multimedia document to open. Under Windows, to open this url, QuickTime executes a new browser process with the url as parameter.

However, as this url is not filtered, it can contain JavaScript code. It can also contain chrome commands, which are only interpreted by Firefox. As chrome commands can access to system, attacker can use them to execute programs on victim's computer.

An attacker can therefore create a malicious QTL file, then for example rename it to mp3 extension. Then, when victim sees attacker's web site, the plugin opens the mp3 file and the chrome code is executed.
Full Vigil@nce bulletin... (Free trial)

weakness announce CVE-2007-3654

NetBSD: denial of service via vga_allocattr

Synthesis of the vulnerability

A local attacker can use an ioctl with negative parameters in order to force the vga_allocattr() function to read at invalid memory addresses.
Severity: 1/4.
Creation date: 14/09/2007.
Identifiers: BID-25682, CVE-2007-3654, NetBSD-SA2007-006, VIGILANCE-VUL-7172.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The vga_allocattr() function defined in the sys/dev/ic/vga.c file indicates information about a style: foreground color, background color, blinking, etc.:
  int vga_allocattr(void *id, int fg, int bg, int flags, long *attrp);

The fg and bg parameters indicate foreground and background colors. These values are used as indices for fgansitopc and bgansitopc arrays. However, if these values are too big or negative, the driver accesses to an invalid index, and can thus try to read at an invalid memory address. Kernel then panics.

A local attacker can use an ioctl to change color indices and therefore create a denial of service.
Full Vigil@nce bulletin... (Free trial)

cybersecurity weakness CVE-2007-4938 CVE-2007-4939 CVE-2007-4940

MPlayer, mympc, KMPlayer: vulnerabilities of AVI

Synthesis of the vulnerability

An attacker can use several vulnerabilities of AVI players in order to generate a denial of service or to execute code.
Severity: 2/4.
Number of vulnerabilities in this bulletin: 3.
Creation date: 13/09/2007.
Identifiers: BID-25648, BID-25650, BID-25651, CAL-20070912-1, CVE-2007-4938, CVE-2007-4939, CVE-2007-4940, CVE-2007-4941, MDKSA-2007:192, VIGILANCE-VUL-7171.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can use several vulnerabilities of AVI players in order to generate a denial of service or to execute code.

A malicious AVI file leads to a NULL pointer dereference or to an overflow in MPlayer. [severity:2/4; BID-25648, CVE-2007-4938]

A malicious AVI file leads to an integer or buffer overflow in mympc (media player classic). [severity:2/4; BID-25650, CVE-2007-4939, CVE-2007-4940]

A malicious AVI file creates an infinite loop in KMPlayer. [severity:2/4; BID-25651, CVE-2007-4941]
Full Vigil@nce bulletin... (Free trial)

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 679 680 681 682 683 684 685 686 687 689 691 692 693 694 695 696 697 698 699 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1141 1161 1181 1201 1221 1241 1261 1281 1301 1321 1341 1361 1381 1401 1421 1441 1461 1481 1501 1521 1541 1561 1581 1601 1621 1641 1661 1681 1701 1721 1741 1761 1781 1801 1821 1841 1861 1881 1901 1921 1941 1961 1981 2001 2021 2041 2061 2081 2101 2121 2141 2161 2181 2201 2221 2241 2261 2281 2301 2321 2341 2361 2381 2401 2421 2441 2461 2481 2501 2521 2541 2561 2581 2601 2621 2641 2661 2681 2701 2721 2741 2761 2781 2801 2821 2841 2861 2881 2901 2921 2924