The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:

vulnerability CVE-2011-0002

libuser: default password

Synthesis of the vulnerability

When a LDAP user is created through libuser without indicating a password, a known default password is set.
Impacted products: Fedora, Mandriva Linux, RHEL, Unix (platform) ~ not comprehensive, ESX.
Severity: 2/4.
Consequences: user access/rights.
Provenance: intranet client.
Creation date: 27/01/2011.
Identifiers: 643227, BID-45791, CVE-2011-0002, FEDORA-2011-0316, FEDORA-2011-0320, MDVSA-2011:019, RHSA-2011:0170-01, VIGILANCE-VUL-10310, VMSA-2011-0004.2, VMSA-2011-0012.1, VMSA-2011-0013, VMSA-2012-0005.

Description of the vulnerability

The libuser library implements a common interface to manage user accounts.

This library can create a LDAP account, and set its password. However, if the administrator does not set a password, a default value is chosen.

An attacker who knows this default password can therefore log in with this newly created account.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2010-0110 CVE-2010-0111

Symantec AntiVirus: vulnerabilities of Intel Alert

Synthesis of the vulnerability

Several vulnerabilities of Intel Alert Management System can be used by a remote attacker, in order to create a denial of service or to execute code.
Impacted products: Symantec AV.
Severity: 3/4.
Consequences: user access/rights, denial of service on service.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 27/01/2011.
Identifiers: BID-45935, BID-45936, CVE-2010-0110, CVE-2010-0111, FSC20100727-01, FSC20101213-06, SYM11-002, SYM11-003, VIGILANCE-VUL-10309, ZDI-11-028, ZDI-11-029, ZDI-11-030, ZDI-11-031, ZDI-11-032.

Description of the vulnerability

The Symantec Antivirus product version 10 and inferior installs the Intel Alert Management System (AMS2) service, which is disabled by default, and which listens on 38292/tcp. It is impacted by several vulnerabilities.

An attacker can send malicious messages to AMS2, in order to create buffer overflows, leading to code execution. [severity:3/4; BID-45936, CVE-2010-0110, FSC20100727-01, SYM11-002, ZDI-11-028]

An attacker can send malicious messages to AMS2, in order to start a program, to send emails, or to stop the service. [severity:2/4; BID-45935, CVE-2010-0111, FSC20101213-06, SYM11-003, ZDI-11-029, ZDI-11-030, ZDI-11-031, ZDI-11-032]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2010-2935 CVE-2010-2936 CVE-2010-3450

OpenOffice.org: several vulnerabilities

Synthesis of the vulnerability

An attacker can invite the victim to open a malicious document with OpenOffice.org, in order to execute code on his computer.
Impacted products: OpenOffice, Debian, Fedora, Mandriva Linux, NLD, OES, OpenSolaris, openSUSE, Solaris, RHEL, SLES.
Severity: 3/4.
Consequences: user access/rights.
Provenance: document.
Number of vulnerabilities in this bulletin: 12.
Creation date: 26/01/2011.
Revision date: 27/01/2011.
Identifiers: BID-43841, BID-43845, BID-44779, BID-45617, BID-46031, CERTA-2002-AVI-280, CERTA-2010-AVI-479, CERTA-2010-AVI-549, CERTA-2011-AVI-039, CERTA-2011-AVI-243, CERTA-2012-AVI-237, cpuapr2011, CVE-2010-2935, CVE-2010-2936, CVE-2010-3450, CVE-2010-3451, CVE-2010-3452, CVE-2010-3453, CVE-2010-3454, CVE-2010-3689, CVE-2010-3702, CVE-2010-3704, CVE-2010-4008, CVE-2010-4253, CVE-2010-4494, CVE-2010-4643, DSA-2151-1, FEDORA-2011-0837, MDVSA-2011:027, openSUSE-SU-2011:0336-1, openSUSE-SU-2011:0337-1, RHSA-2011:0181-01, RHSA-2011:0182-01, RHSA-2011:0183-01, SUSE-SR:2011:007, VIGILANCE-VUL-10308.

Description of the vulnerability

Several vulnerabilities were announced in OpenOffice.org.

An attacker can create a malicious OpenOffice.org Impress/PowerPoint document, and invite the victim to open it, in order to execute code on his computer (VIGILANCE-VUL-9813). [severity:3/4; CERTA-2011-AVI-039, CERTA-2011-AVI-243, CVE-2010-2935, CVE-2010-2936]

An attacker can invite the victim to open a malicious XML filter or extension, in order to create a file on his computer. [severity:2/4; CVE-2010-3450]

A malicious RTF file generates a buffer overflow, leading to code execution. [severity:3/4; CVE-2010-3451]

A RTF file with a malicious pnseclvl field leads to code execution. [severity:3/4; CVE-2010-3452]

A Word document can use the WW8ListManager::WW8ListManager() function, in order to corrupt the memory, which leads to code execution. [severity:3/4; CVE-2010-3453]

A Word document can use the WW8DopTypography::ReadFromMem() function, in order to corrupt the memory, which leads to code execution. [severity:3/4; CVE-2010-3454]

The soffice script does not correctly process the LD_LIBRARY_PATH variable, and it can load a malicious library in the current directory, which leads to code execution. [severity:2/4; CVE-2010-3689]

An attacker can invite the victim to import a malicious PDF document leading to a denial of service and possibly to code execution (VIGILANCE-VUL-10011). [severity:2/4; BID-43841, BID-43845, CERTA-2010-AVI-479, CVE-2010-3702, CVE-2010-3704]

An attacker can use the XPath language to corrupt the libxml2 memory, in order to create a denial of service or to execute code (VIGILANCE-VUL-10117). [severity:3/4; BID-44779, CERTA-2010-AVI-549, CERTA-2012-AVI-237, CVE-2010-4008]

An attacker can use the XPath language to corrupt the libxml2 memory, in order to create a denial of service or to execute code (VIGILANCE-VUL-10237). [severity:3/4; BID-45617, CVE-2010-4494]

An attacker can invite the victim to open a document containing a malicious PNG image, in order to generate a buffer overflow. [severity:3/4; CVE-2010-4253]

An attacker can invite the victim to open a document containing a malicious TGA image, in order to generate a buffer overflow. [severity:3/4; CVE-2010-4643]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2011-0348 CVE-2011-0349 CVE-2011-0350

Cisco Content Services Gateway: two vulnerabilities

Synthesis of the vulnerability

An attacker can use two vulnerabilities of Cisco Content Services Gateway, in order to bypass the security policy, or to create a denial of service.
Impacted products: IOS by Cisco.
Severity: 3/4.
Consequences: data reading, data flow, denial of service on service.
Provenance: internet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 26/01/2011.
Identifiers: 112206, BID-46022, BID-46026, BID-46028, CERTA-2011-AVI-033, cisco-sa-20110126-csg2, CSCth17178, CSCth41891, CSCtk35917, CVE-2011-0348, CVE-2011-0349, CVE-2011-0350, VIGILANCE-VUL-10307.

Description of the vulnerability

Two vulnerabilities were announced in Cisco Content Services Gateway (Second Generation, CSG2).

An attacker can access to sites without triggering the billing policy, or access to sites denied by the restriction policy. [severity:3/4; BID-46022, CERTA-2011-AVI-033, CSCtk35917, CVE-2011-0348]

An attacker can send spoofed TCP packets, in order to restart the system. [severity:3/4; BID-46026, BID-46028, CSCth17178, CSCth41891, CVE-2011-0349, CVE-2011-0350]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert 10306

Panda Internet Security: two vulnerabilities

Synthesis of the vulnerability

A local attacker can use two IOCTL on Panda Internet Security drivers, in order to create a denial of service or to execute code.
Impacted products: Panda Internet Security.
Severity: 2/4.
Consequences: administrator access/rights, denial of service on server.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 2.
Creation date: 26/01/2011.
Identifiers: VIGILANCE-VUL-10306.

Description of the vulnerability

The Panda Internet Security product install drivers, which are reachable via IOCTL. They are impacted by two vulnerabilities.

The kl1.sys driver does not check parameters of the IOCTL 0x06660d4c, which stops the system. [severity:1/4]

The AppFlt.sys driver does not check parameters of the IOCTL 0x06660e1c, which may lead to code execution. [severity:2/4]

A local attacker can therefore use two IOCTL on Panda Internet Security drivers, in order to create a denial of service or to execute code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability 10305

TYPO3: Cross Site Scripting of Media/dam

Synthesis of the vulnerability

An authenticated TYPO3 editor can generate a Cross Site Scripting in the Media/dam extension.
Impacted products: TYPO3 Extensions ~ not comprehensive.
Severity: 1/4.
Consequences: client access/rights.
Provenance: user account.
Creation date: 26/01/2011.
Identifiers: BID-46032, TYPO3-SA-2011-001, VIGILANCE-VUL-10305.

Description of the vulnerability

The TYPO3 Media/dam (Digital Asset Management) extension organizes multimedia files.

The form used to rename a file does not filter the filename.

An authenticated TYPO3 editor can therefore generate a Cross Site Scripting in the Media/dam extension.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2010-4704 CVE-2010-4705 CVE-2011-0480

FFmpeg: three vulnerabilities

Synthesis of the vulnerability

An attacker can generate several overflows in FFmpeg in order to create a denial of service or to execute code on victim's computer.
Impacted products: Debian, Mandriva Linux, Unix (platform) ~ not comprehensive.
Severity: 3/4.
Consequences: user access/rights, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 3.
Creation date: 26/01/2011.
Identifiers: 68115, BID-46294, BID-47154, CERTA-2002-AVI-271, CERTA-2011-AVI-080, CVE-2010-4704, CVE-2010-4705, CVE-2011-0480, DSA-2165-1, DSA-2306-1, MDVSA-2011:059, MDVSA-2011:060, MDVSA-2011:061, MDVSA-2011:062, MDVSA-2011:088, MDVSA-2011:112, MDVSA-2011:114, VIGILANCE-VUL-10304.

Description of the vulnerability

The libavcodec library of FFmpeg implements video/audio encoders/decoders. The vorbis_dec.c file decodes the Vorbis/OGG format. It contains three vulnerabilities.

An attacker can generate an overflow in the vorbis_floor0_decode() and vorbis_floor1_decode() functions. [severity:3/4; CERTA-2011-AVI-080, CVE-2010-4704]

An attacker can generate an overflow in the vorbis_residue_decode_internal() function. [severity:3/4; CVE-2010-4705]

An attacker can generate an overflow in the vorbis_parse_setup_hdr_floors() function. [severity:3/4; 68115, BID-47154, CVE-2011-0480]

An attacker can therefore create a malicious Vorbis/OGG file to execute code or create a denial of service on computer of victims accepting to open it with a program linked to libavcodec.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2011-0522

VLC: buffer overflow via a subtitle

Synthesis of the vulnerability

An attacker can invite the victim to open a malicious MKV file with VLC, in order to execute code on his computer.
Impacted products: VLC.
Severity: 2/4.
Consequences: user access/rights, denial of service on client.
Provenance: document.
Creation date: 26/01/2011.
Identifiers: BID-46008, CERTA-2011-AVI-046, CVE-2011-0522, VIGILANCE-VUL-10303.

Description of the vulnerability

The VideoLAN VLC program displays multimedia documents.

The MKV (Matroska) format encapsulates audio, video, and subtitles.

The StripTags() function removes tags starting by '<' and ending by '>'. However, if the '>' is missing, a buffer overflow occurs.

The StripTags() function is called to decode MKV subtitles. A malformed subtitle thus generates an overflow in VLC.

An attacker can therefore invite the victim to open a malicious MKV file with VLC, in order to execute code on his computer.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2011-0682

Opera: integer overflow of SELECT OPTION

Synthesis of the vulnerability

An attacker can create an HTML document containing a large combo, in order to generate an integer overflow, leading to a denial of service or to code execution.
Impacted products: openSUSE, Opera, SLES.
Severity: 3/4.
Consequences: user access/rights.
Provenance: internet server.
Creation date: 26/01/2011.
Identifiers: BID-46003, CVE-2011-0682, openSUSE-SU-2011:0103-1, SUSE-SR:2011:003, VIGILANCE-VUL-10302.

Description of the vulnerability

A combo (element SELECT in HTML language) contains several choices (element OPTION).

However, when there is more than one million choices (OPTION), an integer overflow occurs in Opera.

An attacker can therefore create an HTML document containing a large combo, in order to generate an integer overflow, leading to a denial of service or to code execution.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2010-3860

OpenJDK, IcedTea6: property reading

Synthesis of the vulnerability

An attacker can create a malicious Java JNLP application reading some properties, without being blocked by the OpenJDK compiled with IcedTea6.
Impacted products: Fedora, openSUSE, RHEL, SLES, Unix (platform) ~ not comprehensive.
Severity: 1/4.
Consequences: data reading.
Provenance: document.
Creation date: 26/01/2011.
Identifiers: 645843, CVE-2010-3860, FEDORA-2010-18393, openSUSE-SU-2010:1017-1, openSUSE-SU-2010:1053-1, RHSA-2011:0176-01, SUSE-SR:2010:023, VIGILANCE-VUL-10301.

Description of the vulnerability

IcedTea6 tools compile the source code of OpenJDK with free software.

The JNLP (Java Network Launching Protocol) protocol is used to deploy Java applications.

The JNLPRuntime class of IcedTea6 defines properties containing:
 - user.name (USER)
 - user.home (HOME_DIR)
 - java.home (JAVA_HOME_DIR)
 - java.io.tmpdir (TMP_DIR)
However, these variables are declared as public, so an application can read them.

An attacker can therefore create a malicious Java JNLP application reading some properties, without being blocked by the OpenJDK compiled with IcedTea6.
Full Vigil@nce bulletin... (Free trial)

Previous page   Next page

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 1001 1021 1041 1061 1081 1101 1121 1141 1161 1181 1201 1221 1241 1261 1281 1301 1321 1341 1361 1381 1401 1421 1441 1461 1481 1501 1521 1541 1561 1581 1601 1621 1641 1661 1681 1701 1721 1741 1761 1781 1801 1821 1841 1861 1881 1901 1921 1941 1961 1981 2001 2021 2041 2061 2081 2101 2121 2141 2161 2181 2201 2221 2241 2261 2281 2301 2321 2341 2361 2381 2401 2421 2441 2461 2481 2501 2521 2541 2561 2581 2601 2621 2641 2661 2681 2701 2721 2741 2761 2781 2801 2821 2841 2846