The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:

weakness note CVE-2008-1391 CVE-2009-4880 CVE-2009-4881

FreeBSD, Linux, NetBSD: integer overflow of strfmon

Synthesis of the vulnerability

An attacker controlling the strfmon() format string can generate an integer overflow leading to a denial of service, and possibly to code execution.
Severity: 1/4.
Number of vulnerabilities in this bulletin: 3.
Creation date: 27/03/2008.
Revisions dates: 07/04/2008, 18/09/2009.
Identifiers: BID-28479, BID-36443, CERTA-2008-AVI-603, CVE-2008-1391, CVE-2009-4880, CVE-2009-4881, DSA-2058-1, MDVSA-2010:111, MDVSA-2010:112, NetBSD-SA2008-006, openSUSE-SU-2010:0913-1, openSUSE-SU-2010:0914-1, SUSE-SA:2010:052, VIGILANCE-VUL-7709.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The strfmon() function is used to convert a money string. It is notably used by the PH money_format() function.

The GET_NUMBER() macro of lib/libc/stdlib/strfmon.c does not correctly handle formats representing long strings. An integer overflow then occurs.

When an attacker can specify the strfmon() format string, he can thus create this overflow in order to corrupt the memory.

This vulnerability impacts the libc of FreeBSD/NetBSD, and the glibc <= 2.10.1 of Linux, even if the vulnerable code is different.
Full Vigil@nce bulletin... (Free trial)

computer threat announce CVE-2008-1569 CVE-2008-1570

policyd-weight: file corruption

Synthesis of the vulnerability

A local attacker can create a symbolic link in order to force policyd-weight to corrupt a file.
Severity: 1/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 27/03/2008.
Identifiers: BID-28480, CVE-2008-1569, CVE-2008-1570, DSA-1531-1, VIGILANCE-VUL-7708.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The policyd-weight daemon can be used to apply a filtering policy on the Postfix MTA.

This daemon creates several temporary files and directories, use them then delete them. However, it does not check is symbolic links exists.

A local attacker can therefore create a symbolic link in order to force a file to be altered or deleted with rights of policyd-weight.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2008-1468

Namazu: Cross Site Scripting via UTF-7

Synthesis of the vulnerability

An attacker can use UTF-7 encoded data in order to create a Cross Site Scripting in Namazu.
Severity: 2/4.
Creation date: 27/03/2008.
Identifiers: CVE-2008-1468, FEDORA-2008-2767, SUSE-SR:2008:017, VIGILANCE-VUL-7707.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Namazu program can be installed as a CGI to provide search features on a website.

The UTF-7 encoding (RFC 2152) encodes Unicode data by block of 6 bits, in a way similar to Base64. The encoded fragment in then surrounded by '+' and a terminator such as '-'. For example, "Bonjour René" is encoded as "Bonjour Ren+AOk-". Special characters (such as '<') are thus encoded using simple characters (+ADw-).

The namazu.cgi program does not indicate the character set (charset) in generated pages. Intelligent web browsers (IE) thus try to guess the charset. An attacker can therefore inject UTF-7 sequences in the page, to force the web browser to deduct that data are to be interpreted as UTF-7.

An attacker can thus create a Cross Site Scripting attack.
Full Vigil@nce bulletin... (Free trial)

computer weakness alert CVE-2008-1066

Smarty: PHP function execution

Synthesis of the vulnerability

An attacker allowed to edit a Smarty template can execute PHP functions.
Severity: 2/4.
Creation date: 27/03/2008.
Identifiers: BID-28105, CERTA-2002-AVI-182, CVE-2008-1066, DSA-1520-1, FEDORA-2008-2587, FEDORA-2008-2650, FEDORA-2008-2656, SUSE-SR:2008:007, VIGILANCE-VUL-7706.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Smarty program is used to create websites based on templates. For example, following PHP code:
  $smarty->assign('name', 'value');
associated to the template:
  {$name}
  {$name|regex_replace:"/alu/":"ALU"}
displays:
  value
  vALUe
The second line of the template uses "regex_replace", implemented in the libs/plugins/modifier.regex_replace.php file, via the PHP preg_replace() function.

A PCRE regular expression can contain the "/.../e" modifier to evaluate PHP commands to execute. This modifier is filtered by Smarty. However, by using the '\0' string terminator character, an attacker can bypass this restriction.

An attacker allowed to edit a Smarty template can thus execute PHP functions.
Full Vigil@nce bulletin... (Free trial)

computer weakness bulletin CVE-2008-1152

IOS: denials of service of DLSw

Synthesis of the vulnerability

An attacker can send UDP or IP Proto 91 packets in order to create a denial of service if DLSw is used.
Severity: 2/4.
Creation date: 26/03/2008.
Identifiers: 100893, 99476, 99758, BID-28465, cisco-sa-20080326-bundle, cisco-sa-20080326-dlsw, CSCsk73104, CVE-2008-1152, VIGILANCE-VUL-7705.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The DLSw protocol (Data-Link Switching) transports SNA or NetBIOS data. It uses:
 - UDP packets for the 2067/udp port
 - IP packets, with the protocol 91, for FST (Fast Sequenced Transport)
When DLSw is enabled, the IOS thus accept these packets.

However, the DLSw implementation has several errors. These errors lead to a stop or to memory leaks.

A network attacker can therefore send these packets in order to create a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2008-0537

Catalyst IOS: denial of service of OSPF and MPLS VPN

Synthesis of the vulnerability

An attacker can send several packets in order to create a denial of service when OSPF and MPLS VPN are configured.
Severity: 2/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 26/03/2008.
Identifiers: 100526, 100893, BID-28463, CERTA-2008-AVI-163, cisco-sa-20080326-bundle, cisco-sa-20080326-queue, CSCsf12082, CVE-2008-0057-ERROR, CVE-2008-0537, VIGILANCE-VUL-7704.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Cisco announced that a denial of service impacts the IOS on Cisco Catalyst 6500 and 7600 :
 - with OSPF Sham-Link enabled, and
 - with MPLS VPN enabled, and
 - with a Supervisor Engine 32 (Sup32), Supervisor Engine 720 (Sup720) or Route Switch Processor 720 (RSP720) module

This denial of service originates from a memory leak whose technical details are unknown. When there is no free memory, packets can not flow on the interface.

An attacker can therefore send several packets in order to create a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2008-1153

IOS: denial of service via IPv6 and IPv4/UDP

Synthesis of the vulnerability

An attacker can send malicious IPv6 packets to IPv4/UDP services of the router in order to create a denial of service.
Severity: 3/4.
Creation date: 26/03/2008.
Identifiers: 100638, 100817, 100893, BID-28461, cisco-sa-20080326-bundle, cisco-sa-20080326-IPv4IPv6, CSCse56501, CVE-2008-1153, VIGILANCE-VUL-7703, VU#936177.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Some IPv4/UDP services can be enabled on the router:
 - TACACS - port 49
 - Domain Name System (DNS) server - port 53
 - Resource Reservation Protocol (RSVP) - port 1698
 - Layer Two Forwarding (L2F)/Layer Two Tunnel Protocol (L2TP) - port 1701
 - IP SLA Responder - port 1967
 - Media Gateway Control Protocol (MGCP) - port 2427
 - Session Initiation Protocol (SIP) - port 5060

When IPv6 is also enabled, an attacker can send an IPv6/UDP packet to ports of these services. These packets fill the input queue and are never flushed. When the queue is filled, packet cannot flow through this interface. Packets for the RSVP service have a different behavior: they stop the router.

An attacker can thus send IPv6 packets in order to create a denial of service.
Full Vigil@nce bulletin... (Free trial)

security vulnerability CVE-2008-1156

IOS: obtaining data via MVPN

Synthesis of the vulnerability

A attacker can send malicious MDT messages in order to receive data belonging to a MPLS VPN.
Severity: 2/4.
Creation date: 26/03/2008.
Identifiers: 100374, 100394, 100893, BID-28464, cisco-sa-20080326-bundle, cisco-sa-20080326-mvpn, CSCsi01470, CVE-2008-1156, VIGILANCE-VUL-7702.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The MVPN (Multicast Virtual Private Network) architecture supports multicast traffics in a MPLS VPN.

An attacker can send MDT Data Join messages (Multicast Distribution Tree) in order to create new multicast states in the router. To create these messages, attacker has to know the IP address of a BGP peer and the address of a multicast group.

Via these states, attacker can therefore obtain data belonging to a MVPN.
Full Vigil@nce bulletin... (Free trial)

threat alert CVE-2008-1150 CVE-2008-1151

IOS: denials of service of VPDN

Synthesis of the vulnerability

An attacker can create two denials of service in Virtual Private Dial-up Network.
Severity: 2/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 26/03/2008.
Identifiers: 100893, 97278, BID-28460, cisco-sa-20080326-bundle, cisco-sa-20080326-pptp, CSCdv59309, CSCsj58566, CVE-2008-1150, CVE-2008-1151, VIGILANCE-VUL-7701.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Two vulnerabilities impact VPDN (Virtual Private Dial-up Network) when PPTP (Point-to-Point Tunneling Protocol) is enabled in Cisco IOS.

When a PPTP session terminates, its memory is not totally freed. [severity:2/4; CSCsj58566, CVE-2008-1151]

When a PPTP session terminates, its Virtual Access Interface is not freed. [severity:2/4; CSCdv59309, CVE-2008-1150]

An attacker can therefore create several sessions in order to progressively create a denial of service.
Full Vigil@nce bulletin... (Free trial)

weakness announce CVE-2008-1530

GnuPG: memory corruption during the import

Synthesis of the vulnerability

An attacker can create OpenPGP keys corrupting memory when they are imported.
Severity: 2/4.
Creation date: 26/03/2008.
Identifiers: BID-28487, CERTA-2008-AVI-172, CVE-2008-1530, VIGILANCE-VUL-7700.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The GnuPG program can import keys in OpenPGP format.

The collapse_uids() function of g10/import.c file does not correctly handle the case where two keys have the same User ID. This error corrupts the memory, and leads to a denial of service and possibly to code execution.

An attacker can thus invite the victim to import malicious OpenPGP keys, in order to create a denial of service or to execute code.
Full Vigil@nce bulletin... (Free trial)

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 728 729 730 731 732 733 734 735 736 738 740 741 742 743 744 745 746 747 748 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1141 1161 1181 1201 1221 1241 1261 1281 1301 1321 1341 1361 1381 1401 1421 1441 1461 1481 1501 1521 1541 1561 1581 1601 1621 1641 1661 1681 1701 1721 1741 1761 1781 1801 1821 1841 1861 1881 1901 1921 1941 1961 1981 2001 2021 2041 2061 2081 2101 2121 2141 2161 2181 2201 2221 2241 2261 2281 2301 2321 2341 2361 2381 2401 2421 2441 2461 2481 2501 2521 2541 2561 2581 2601 2621 2641 2661 2681 2701 2721 2741 2761 2781 2801 2821 2841 2861 2881 2901 2921 2926