The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:

computer vulnerability announce CVE-2006-4695 CVE-2007-1201

Office, Visual, BizTalk, Commerce, ISA: vulnerabilities

Synthesis of the vulnerability

Two vulnerabilities of Microsoft Office, Visual Studio .NET, BizTalk Server, Commerce Server and Internet Security and Acceleration Server products can be used to execute code.
Impacted products: BizTalk Server, ISA, Office, Access, Excel, Outlook, PowerPoint, Publisher, Word, Visual Studio.
Severity: 3/4.
Consequences: privileged access/rights, user access/rights.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 12/03/2008.
Identifiers: 933103, BID-28135, BID-28136, CERTA-2008-AVI-127, CVE-2006-4695, CVE-2007-1201, MS08-017, VIGILANCE-VUL-7657, VU#654577.

Description of the vulnerability

Two vulnerabilities impact Microsoft Office Web Components 2000 (provided with Microsoft Office, Visual Studio .NET, BizTalk Server, Commerce Server and Internet Security and Acceleration Server).

An attacker can create a HTML page using a malicious uri in order to execute code in an ActiveX of Microsoft Office Web Components. [severity:3/4; BID-28135, CVE-2006-4695, VU#654577]

An attacker can create a HTML page using malicious data in order to execute code in an ActiveX of Microsoft Office Web Components. [severity:3/4; BID-28136, CVE-2007-1201]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2008-0113 CVE-2008-0118

Microsoft Office: code execution

Synthesis of the vulnerability

Two vulnerabilities of Office lead to code execution when victim opens a malicious document.
Impacted products: Office, Access, Excel, Outlook, PowerPoint, Publisher, Word.
Severity: 3/4.
Consequences: user access/rights.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 12/03/2008.
Revision date: 31/03/2008.
Identifiers: 949030, BID-28146, CERTA-2008-AVI-126, CVE-2008-0113, CVE-2008-0118, MS08-016, VIGILANCE-VUL-7656, ZDI-08-008.

Description of the vulnerability

Two vulnerabilities were announced in Office.

An attacker can create an Excel document containing malicious cell comments in order to corrupt the memory when it is loaded. [severity:3/4; CERTA-2008-AVI-126, CVE-2008-0113, ZDI-08-008]

An attacker can create an Office document overflowing memory when it is loaded. [severity:3/4; BID-28146, CVE-2008-0118]

These vulnerabilities lead to code execution.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2008-0110

Outlook: code execution via mailto

Synthesis of the vulnerability

An attacker can create a malicious mailto link in order to execute code with privileges of users clicking on this link to open Outlook.
Impacted products: Office, Outlook.
Severity: 3/4.
Consequences: user access/rights.
Provenance: document.
Creation date: 12/03/2008.
Identifiers: 949031, BID-28147, CERTA-2008-AVI-124, CVE-2008-0110, MS08-015, VIGILANCE-VUL-7655, VU#393305.

Description of the vulnerability

The Microsoft Outlook product can be configured to be the default mail composer. In this case, when user clicks on a "mailto:" uri, Outlook is launched.

However, if the mailto uri contains special data, they can be added to the command line calling the Outlook program. Depending on added parameters, configuration of Outlook can for example be altered.

An attacker can therefore create a HTML document containing a malicious mailto link in order to execute code with privileges of users clicking on this link to open Outlook.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2008-0081 CVE-2008-0111 CVE-2008-0112

Excel: several vulnerabilities

Synthesis of the vulnerability

Several vulnerabilities of Excel lead to code execution when victim opens a malicious document.
Impacted products: Office, Excel.
Severity: 3/4.
Consequences: user access/rights.
Provenance: document.
Number of vulnerabilities in this bulletin: 7.
Creation date: 12/03/2008.
Revision date: 25/03/2008.
Identifiers: 949029, BID-27305, BID-28094, BID-28095, BID-28166, BID-28167, BID-28168, BID-28170, CERTA-2008-AVI-125, CVE-2008-0081, CVE-2008-0111, CVE-2008-0112, CVE-2008-0114, CVE-2008-0115, CVE-2008-0116, CVE-2008-0117, FGA-2008-06, MS08-014, TPTI-08-03, VIGILANCE-VUL-7654.

Description of the vulnerability

Several vulnerabilities were announced in Excel.

An attacker can create an Excel document containing malicious DVAL Records in order to corrupt the memory when it is loaded. [severity:3/4; BID-28094, CVE-2008-0111]

An attacker can create a malicious SLK (Symbolic Link Format) file corrupting memory during its import in Excel. [severity:3/4; BID-28095, CVE-2008-0112]

An attacker can create an Excel document containing a malicious Style Record in order to corrupt the memory when it is loaded. [severity:3/4; BID-28166, CVE-2008-0114, FGA-2008-06]

An attacker can create an Excel document containing a malicious formula in order to corrupt the memory when it is loaded. [severity:3/4; BID-28167, CVE-2008-0115]

An attacker can create an Excel document containing malicious Rich Text values in order to corrupt the memory when it is loaded. [severity:3/4; BID-28168, CVE-2008-0116, TPTI-08-03]

An attacker can create an Excel document containing malicious conditional formats in order to corrupt the memory when it is loaded. [severity:3/4; BID-28170, CVE-2008-0117]

An attacker can create an Excel document containing malicious macros in order to execute code (VIGILANCE-VUL-7500). [severity:3/4; BID-27305, CERTA-2008-AVI-125, CVE-2008-0081]

These vulnerabilities lead to code execution.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2008-0727 CVE-2008-0949

Informix DS: code execution

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Informix Dynamic Server in order to execute code.
Impacted products: Informix Server.
Severity: 3/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 3.
Creation date: 11/03/2008.
Revision date: 14/03/2008.
Identifiers: BID-28198, CERTA-2008-AVI-155, CVE-2008-0727, CVE-2008-0949, IC55207, IC55208, IC55209, IC55210, IC55223, IC55224, IC55225, VIGILANCE-VUL-7653, ZDI-08-011, ZDI-08-012.

Description of the vulnerability

Several vulnerabilities impact Informix Dynamic Server.

A local attacker can create a buffer overflow in the DBPATH environment variable in order to elevate his privileges. [severity:2/4; CERTA-2008-AVI-155, CVE-2008-0727, IC55207, IC55208, ZDI-08-011]

An attacker can use a long password in order to create a buffer overflow. [severity:3/4; CERTA-2008-AVI-155, CVE-2008-0727, IC55209, IC55210, ZDI-08-012]

A remote attacker can use a malformed connection request packet in order to execute code. [severity:3/4; CVE-2008-0949, IC55223, IC55224, IC55225]
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2008-0890

Red Hat DS: privilege elevation

Synthesis of the vulnerability

A local attacker can replace JAR archives in order to elevate his privileges on Red Hat Directory Server 7.1.
Impacted products: RHEL.
Severity: 2/4.
Consequences: privileged access/rights.
Provenance: user account.
Creation date: 11/03/2008.
Identifiers: BID-28204, CVE-2008-0890, RHSA-2008:0173-01, VIGILANCE-VUL-7652.

Description of the vulnerability

The Red Hat Directory Server product uses JAR (Java ARchives) files.

Permissions on certain directories allow all local users to replace these JAR archives.

A local attacker can thus execute code with privileges of user running Red Hat Directory Server.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2007-6706 CVE-2008-1217

Lotus Notes: vulnerabilities of SMTP

Synthesis of the vulnerability

Two vulnerabilities of Lotus Notes can be used by a remote attacker to create a denial of service or to execute code via a malicious email.
Impacted products: Notes.
Severity: 3/4.
Consequences: user access/rights, denial of service on client.
Provenance: internet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 11/03/2008.
Identifiers: 21271111, 21272836, 21272930, ABUI76AJAM, CVE-2007-6706, CVE-2008-1217, KEMG6R8L3M, KEMG6Y8P8U, PRAD78WKKV, SNES6NMVG7, VIGILANCE-VUL-7651.

Description of the vulnerability

An attacker can send an email (SMTP message) in order to exploit two vulnerabilities in Lotus Notes.

A message containing a malicious text can corrupt the memory. [severity:3/4; CVE-2007-6706, SNES6NMVG7]

A message containing a malicious attachment can corrupt the memory. [severity:3/4; ABUI76AJAM, CVE-2008-1217]
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2008-1274

AIX: privilege elevation via man

Synthesis of the vulnerability

A local attacker can use the man command to elevate his privileges.
Impacted products: AIX.
Severity: 1/4.
Consequences: privileged access/rights.
Provenance: user shell.
Creation date: 10/03/2008.
Identifiers: BID-28180, CVE-2008-1274, IZ17177, VIGILANCE-VUL-7650.

Description of the vulnerability

The /usr/bin/man command is installed suid/sgid man.

This command calls other commands to format help pages. However, these commands are called without their full path.

A local attacker can therefore create a trojan horse and execute it with privileges of man user/group.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2008-1286

Sun Java Web Console: information disclosure

Synthesis of the vulnerability

An attacker can detect if files or directories exist via Sun Java Web Console.
Impacted products: Solaris, Trusted Solaris, Unix (platform) ~ not comprehensive.
Severity: 2/4.
Consequences: data reading.
Provenance: intranet client.
Creation date: 10/03/2008.
Identifiers: 231526, 6614074, BID-28155, CVE-2008-1286, VIGILANCE-VUL-7649.

Description of the vulnerability

The Java Web Console product centralizes administration of web services.

An attacker can use it to detect if a file or directory exists.

 This vulnerability is related to adminverifier (/usr/lib/webconsole/adminverifier).
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2008-1284

Horde: file inclusion

Synthesis of the vulnerability

An attack can use a malicious Horde theme in order to read the content of files located on the server.
Impacted products: Debian, Fedora, Unix (platform) ~ not comprehensive.
Severity: 2/4.
Consequences: data reading.
Provenance: intranet client.
Creation date: 10/03/2008.
Identifiers: BID-28153, CERTA-2002-AVI-195, CVE-2008-1284, DSA-1519-1, FEDORA-2008-2362, FEDORA-2008-2406, VIGILANCE-VUL-7648.

Description of the vulnerability

The Horde interface can be customized via themes.

An authenticated attacker can change his theme to "../../[...]/file". The indicated file is thus inserted in the interface.

An attacker can thus obtain the content of a file located on the server.
Full Vigil@nce bulletin... (Free trial)

Previous page   Next page

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1141 1161 1181 1201 1221 1241 1261 1281 1301 1321 1341 1361 1381 1401 1421 1441 1461 1481 1501 1521 1541 1561 1581 1601 1621 1641 1661 1681 1701 1721 1741 1761 1781 1801 1821 1841 1861 1881 1901 1921 1941 1961 1981 2001 2021 2041 2061 2081 2101 2121 2141 2161 2181 2201 2221 2241 2261 2281 2301 2321 2341 2361 2381 2401 2421 2441 2461 2481 2501 2521 2541 2561 2581 2601 2621 2641 2661 2681 2701 2721 2741 2761 2781 2801 2821 2841 2861 2869