The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Debian Wheezy

Firefox 3.0: several vulnerabilities
Several vulnerabilities of Firefox 3.0 can be used by an attacker to execute code on victim's computer...
264308, 459524, 460882, 480134, 488995, 493601, 6842771, BID-35758, BID-35765, BID-35766, BID-35767, BID-35769, BID-35770, BID-35772, BID-35773, BID-35775, BID-35776, BID-35925, CERTA-2009-AVI-290, CVE-2009-1194, CVE-2009-2462, CVE-2009-2463, CVE-2009-2464, CVE-2009-2465, CVE-2009-2466, CVE-2009-2467, CVE-2009-2468, CVE-2009-2469, CVE-2009-2470, CVE-2009-2471, CVE-2009-2472, DSA-1840-1, DSA-1931-1, FEDORA-2009-8033, FEDORA-2010-7100, MDVSA-2009:182, MDVSA-2009:185, MFSA 2009-34, MFSA 2009-35, MFSA 2009-36, MFSA 2009-37, MFSA 2009-38, MFSA 2009-39, MFSA 2009-40, RHSA-2009:1162-01, RHSA-2009:1163-01, RHSA-2010:0153-02, RHSA-2010:0154-02, SSA:2009-209-01, SUSE-SA:2009:039, SUSE-SA:2009:042, SUSE-SR:2010:013, VIGILANCE-VUL-8877
Wireshark: denials of service
Several vulnerabilities of Wireshark can be used by a remote attacker to create a denial of service, or to execute code...
BID-35748, CERTA-2009-AVI-286, CERTA-2009-AVI-388, CERTA-2009-AVI-394, CERTA-2009-AVI-463, CERTA-2010-AVI-035, CVE-2009-2559, CVE-2009-2560, CVE-2009-2561, CVE-2009-2562, CVE-2009-2563, DSA-1942-1, FEDORA-2009-7998, FEDORA-2009-9837, RHSA-2010:0360-01, SUSE-SR:2009:014, SUSE-SR:2009:020, SUSE-SR:2010:007, VIGILANCE-VUL-8875, wnpa-sec-2009-04
PulseAudio: privilege elevation
A local attacker can use some installations of PulseAudio in order to obtain root privileges...
AK20090602, CVE-2009-1894, DSA-1838-1, MDVSA-2009:152, MDVSA-2009:171, VIGILANCE-VUL-8872
XML: bypassing signature
The XMLDsig recommendation allows an attacker to bypass the signature of an XML document...
269208, 47526, 6868619, 981343, BID-35671, CVE-2009-0217, DSA-1849-1, FEDORA-2009-8121, FEDORA-2009-8157, FEDORA-2009-8456, FEDORA-2009-8473, HPSBUX02476, MDVSA-2009:267, MDVSA-2009:268, MDVSA-2009:269, MDVSA-2009:318, MDVSA-2009:322, MS10-041, PK80596, PK80627, RHSA-2009:1428-01, SSRT090250, VIGILANCE-VUL-8864, VU#466161
LibTIFF: integer overflows of tiff2rgba and rgb2ycbcr
An attacker can create a malicious TIFF image and invite the victim to open it with tiff2rgba or rgb2ycbcr, in order to execute code on his computer...
265808, 6858149, BID-35652, CVE-2009-2347, DSA-1835-1, FEDORA-2009-7724, FEDORA-2009-7775, FEDORA-2010-10333, FEDORA-2010-10334, JSA11023, MDVSA-2009:150, MDVSA-2009:169, MDVSA-2009:169-1, MDVSA-2011:043, oCERT-2009-012, RHSA-2009:1159-01, SUSE-SR:2009:014, VIGILANCE-VUL-8862
Linux kernel: buffer overflow via console
An attacker can select Unicode characters on the console in order to generate an overflow of two bytes...
BID-33672, CERTA-2002-AVI-235, CVE-2009-1046, DSA-1787-1, DSA-1800-1, RHSA-2009:0451-02, SUSE-SA:2009:017, SUSE-SA:2009:045, VIGILANCE-VUL-8455
Apache httpd: denial of service of mod_deflate
An attacker can force the mod_deflate module of Apache httpd to consume CPU resources...
8812, BID-35623, c02579879, CERTA-2009-AVI-529, CVE-2009-1891, DSA-1834-1, DSA-1834-2, HPSBUX02612, MDVSA-2009:149, MDVSA-2009:168, MDVSA-2009:323, PK87176, PK88341, PK88342, PK91361, PK99477, PK99478, PK99480, RHSA-2009:1148-01, RHSA-2009:1155-01, RHSA-2009:1156-01, RHSA-2009:1160-01, RHSA-2009:1205-01, RHSA-2009:1580-02, RHSA-2010:0602-02, SSA:2009-214-01, SSRT100345, SUSE-SA:2009:050, TLSA-2009-21, TLSA-2009-30, VIGILANCE-VUL-8851
MySQL: format string attack via CREATE_DB/DROP_DB
A local attacker, with the privilege to create or drop a database, can generate a format string attack in MySQL in order to execute code with rights of the daemon...
BID-35609, CVE-2009-2446, DSA-1877-1, MDVSA-2009:159, MDVSA-2009:179, MDVSA-2009:326, RHSA-2009:1289-02, RHSA-2009:1461-01, RHSA-2010:0110-01, SUSE-SR:2009:014, VIGILANCE-VUL-8848
Apache httpd: denial of service of mod_proxy
An attacker can use a malicious query in order to generate a denial of service of mod_proxy in reverse proxy mode...
8812, BID-35565, c02579879, CERTA-2009-AVI-272, CVE-2009-1890, DSA-1834-1, DSA-1834-2, HPSBUX02612, MDVSA-2009:149, MDVSA-2009:168, MDVSA-2009:323, RHSA-2009:1148-01, RHSA-2009:1155-01, RHSA-2009:1156-01, RHSA-2009:1160-01, SSA:2009-214-01, SSRT100345, SUSE-SA:2009:050, TLSA-2009-21, VIGILANCE-VUL-8837
Linux kernel: denial of service via KVM and CR3
An attacker inside a KVM guest system can use the CR3 register in order to generate a denial of service...
BID-35529, CVE-2009-2287, DSA-1845-1, DSA-1846-1, MDVSA-2010:188, MDVSA-2010:198, VIGILANCE-VUL-8830
Our database contains other pages. You can request a free trial to read them.

Display information about Debian Wheezy: