The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of HPUX

computer vulnerability bulletin CVE-2013-1981 CVE-2013-1982 CVE-2013-1983

X.Org: multiple vulnerabilities of libraries

Synthesis of the vulnerability

An attacker can use several vulnerabilities of libraries of X.Org.
Impacted products: Debian, Fedora, HP-UX, MBS, MES, NetBSD, openSUSE, Solaris, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, XOrg Bundle ~ not comprehensive, libX11.
Severity: 2/4.
Creation date: 23/05/2013.
Identifiers: BID-60120, BID-60121, BID-60122, BID-60123, BID-60124, BID-60125, BID-60126, BID-60127, BID-60128, BID-60129, BID-60130, BID-60131, BID-60132, BID-60133, BID-60134, BID-60135, BID-60136, BID-60137, BID-60138, BID-60139, BID-60141, BID-60142, BID-60143, BID-60144, BID-60145, BID-60146, BID-60148, BID-60149, c04341797, CERTA-2013-AVI-362, CVE-2013-1981, CVE-2013-1982, CVE-2013-1983, CVE-2013-1984, CVE-2013-1985, CVE-2013-1986, CVE-2013-1987, CVE-2013-1988, CVE-2013-1989, CVE-2013-1990, CVE-2013-1991, CVE-2013-1992, CVE-2013-1993, CVE-2013-1994, CVE-2013-1995, CVE-2013-1996, CVE-2013-1997, CVE-2013-1998, CVE-2013-1999, CVE-2013-2000, CVE-2013-2001, CVE-2013-2002, CVE-2013-2003, CVE-2013-2004, CVE-2013-2005, CVE-2013-2062, CVE-2013-2063, CVE-2013-2064, CVE-2013-2066, DSA-2673-1, DSA-2674-1, DSA-2675-1, DSA-2675-2, DSA-2676-1, DSA-2677-1, DSA-2678-1, DSA-2679-1, DSA-2680-1, DSA-2681-1, DSA-2682-1, DSA-2683-1, DSA-2684-1, DSA-2685-1, DSA-2686-1, DSA-2687-1, DSA-2688-1, DSA-2689-1, DSA-2690-1, DSA-2691-1, DSA-2692-1, DSA-2693-1, FEDORA-2013-11734, FEDORA-2013-12083, FEDORA-2013-12593, FEDORA-2013-5967, FEDORA-2013-9151, HPSBUX03049, MDVSA-2013:181, MDVSA-2013:182, NetBSD-SA2013-007, openSUSE-SU-2013:0865-1, openSUSE-SU-2013:1007-1, openSUSE-SU-2013:1008-1, openSUSE-SU-2013:1009-1, openSUSE-SU-2013:1010-1, openSUSE-SU-2013:1011-1, openSUSE-SU-2013:1014-1, openSUSE-SU-2013:1025-1, openSUSE-SU-2013:1026-1, openSUSE-SU-2013:1027-1, openSUSE-SU-2013:1028-1, openSUSE-SU-2013:1029-1, openSUSE-SU-2013:1030-1, openSUSE-SU-2013:1031-1, openSUSE-SU-2013:1032-1, openSUSE-SU-2013:1033-1, openSUSE-SU-2013:1034-1, openSUSE-SU-2013:1041-1, openSUSE-SU-2013:1046-1, openSUSE-SU-2013:1047-1, RHSA-2013:0897-01, RHSA-2013:0898-01, RHSA-2014:1436-02, SSA:2017-291-01, SSRT101240, SUSE-SU-2014:0881-1, SUSE-SU-2014:0882-1, SUSE-SU-2014:0883-1, SUSE-SU-2014:0893-1, SUSE-SU-2014:0898-1, SUSE-SU-2014:0900-1, SUSE-SU-2014:0915-1, SUSE-SU-2014:0916-1, SUSE-SU-2014:0919-1, VIGILANCE-VUL-12858.

Description of the vulnerability

Several vulnerabilities were announced in X.Org.

An attacker can generate an integer overflow in libX11, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60120, CVE-2013-1981]

An attacker can generate an integer overflow in libXext, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60126, CVE-2013-1982]

An attacker can generate an integer overflow in libXfixes, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60125, CVE-2013-1983]

An attacker can generate an integer overflow in libXi, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60123, CVE-2013-1984]

An attacker can generate an integer overflow in libXinerama, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60128, CVE-2013-1985]

An attacker can generate an integer overflow in libXp, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60131, CVE-2013-2062]

An attacker can generate an integer overflow in libXrandr, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60129, CVE-2013-1986]

An attacker can generate an integer overflow in libXrender, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60132, CVE-2013-1987]

An attacker can generate an integer overflow in libXRes, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60134, CVE-2013-1988]

An attacker can generate an integer overflow in libXtst, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60141, CVE-2013-2063]

An attacker can generate an integer overflow in libXv, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60135, CVE-2013-1989]

An attacker can generate an integer overflow in libXvMC, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60136, CVE-2013-1990]

An attacker can generate an integer overflow in libXxf86dga, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60138, CVE-2013-1991]

An attacker can generate an integer overflow in libdmx, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60142, CVE-2013-1992]

An attacker can generate an integer overflow in libxcb, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60148, CVE-2013-2064]

An attacker can generate an integer overflow in libGLX, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60149, CVE-2013-1993]

An attacker can generate an integer overflow in libchromeXvMC, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; CVE-2013-1994]

An attacker can generate a memory corruption in libXi, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60124, CVE-2013-1995]

An attacker can generate a memory corruption in libFS, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60130, CVE-2013-1996]

An attacker can generate a buffer overflow in libX11, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60122, CVE-2013-1997]

An attacker can generate a buffer overflow in libXi, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60127, CVE-2013-1998]

An attacker can generate a buffer overflow in libXv, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60143, CVE-2013-2066]

An attacker can generate a buffer overflow in libXvMC, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60144, CVE-2013-1999]

An attacker can generate a buffer overflow in libXxf86dga, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60139, CVE-2013-2000]

An attacker can generate a buffer overflow in libXxf86vm, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60145, CVE-2013-2001]

An attacker can generate a buffer overflow in libXt, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60137, CVE-2013-2002]

An attacker can generate an integer overflow in libX11, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; CVE-2013-1981]

An attacker can generate an integer overflow in libXcursor, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60121, CVE-2013-2003]

An attacker can trigger a denial of service in libX11. [severity:2/4; BID-60146, CVE-2013-2004]

An attacker can generate a memory corruption in libXt, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; BID-60133, CVE-2013-2005]
Complete Vigil@nce bulletin.... (Free trial)

vulnerability CVE-2013-1862

Apache httpd 2.2: character injection via mod_rewrite

Synthesis of the vulnerability

An attacker can use special characters, which are not filtered by mod_rewrite of Apache httpd 2.2, in order to inject them in the log file.
Impacted products: Apache httpd, BIG-IP Hardware, TMOS, HP-UX, Junos Space, Junos Space Network Management Platform, NSMXpress, MBS, MES, openSUSE, Solaris, RHEL, JBoss EAP by Red Hat, SLES.
Severity: 2/4.
Creation date: 14/05/2013.
Identifiers: BID-59826, c03922406, CERTA-2013-AVI-332, CERTA-2013-AVI-543, CERTA-2013-AVI-590, CERTFR-2014-AVI-112, CERTFR-2014-AVI-244, CERTFR-2014-AVI-502, CERTFR-2015-AVI-286, CVE-2013-1862, HPSBUX02927, JSA10685, MDVSA-2013:174, openSUSE-SU-2013:1337-1, openSUSE-SU-2013:1340-1, openSUSE-SU-2013:1341-1, openSUSE-SU-2014:1647-1, RHSA-2013:0815-01, RHSA-2013:1133-01, RHSA-2013:1134-01, RHSA-2013:1207-01, RHSA-2013:1208-01, RHSA-2013:1209-01, SOL15877, SSRT101288, SUSE-SU-2014:1082-1, VIGILANCE-VUL-12790.

Description of the vulnerability

The mod_rewrite module of Apache httpd is used to edit queries. The RewriteLog directive of Apache 2.2 indicates the filename where to log performed modifications.

However, special characters contained in the client name, the username and the free text are not filtered.

An attacker can therefore use special characters, which are not filtered by mod_rewrite of Apache httpd 2.2, in order to inject them in the log file.

If the attacker injects ANSI escape sequences, they are then interpreted when the administrator displays log files in a shell terminal.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability bulletin CVE-2013-0401 CVE-2013-0402 CVE-2013-1488

Oracle JRE, JDK, JavaFX: several vulnerabilities

Synthesis of the vulnerability

Several vulnerabilities of Oracle JRE, JDK and JavaFX can be used by a malicious applet/application in order to execute code or to obtain information. A legitimate applet/application, handling malicious data, can also be forced to execute code.
Impacted products: Fedora, HP-UX, Domino, Notes, Tivoli System Automation, Junos Space, Junos Space Network Management Platform, MBS, MES, Java OpenJDK, openSUSE, Java Oracle, JavaFX, Solaris, RHEL, SUSE Linux Enterprise Desktop, SLES, Unix (platform) ~ not comprehensive.
Severity: 3/4.
Creation date: 17/04/2013.
Identifiers: BID-59088, BID-59089, BID-59124, BID-59128, BID-59131, BID-59137, BID-59141, BID-59145, BID-59149, BID-59153, BID-59154, BID-59159, BID-59162, BID-59165, BID-59166, BID-59167, BID-59170, BID-59172, BID-59175, BID-59178, BID-59179, BID-59184, BID-59185, BID-59187, BID-59190, BID-59191, BID-59194, BID-59195, BID-59203, BID-59206, BID-59208, BID-59212, BID-59213, BID-59219, BID-59220, BID-59228, BID-59234, BID-59243, bulletinoct2015, c03874547, c03898880, CERTA-2013-AVI-256, CVE-2013-0401, CVE-2013-0402, CVE-2013-1488, CVE-2013-1491, CVE-2013-1518, CVE-2013-1537, CVE-2013-1540, CVE-2013-1557, CVE-2013-1558, CVE-2013-1561, CVE-2013-1563, CVE-2013-1564, CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2394, CVE-2013-2414, CVE-2013-2415, CVE-2013-2416, CVE-2013-2417, CVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2421, CVE-2013-2422, CVE-2013-2423, CVE-2013-2424, CVE-2013-2425, CVE-2013-2426, CVE-2013-2427, CVE-2013-2428, CVE-2013-2429, CVE-2013-2430, CVE-2013-2431, CVE-2013-2432, CVE-2013-2433, CVE-2013-2434, CVE-2013-2435, CVE-2013-2436, CVE-2013-2438, CVE-2013-2439, CVE-2013-2440, FEDORA-2013-5922, FEDORA-2013-5958, HPSBUX02908, HPSBUX02922, javacpuapr2013, KLYH95CMCJ, MDVSA-2013:145, MDVSA-2013:161, openSUSE-SU-2013:0745-1, openSUSE-SU-2013:0777-1, openSUSE-SU-2013:0964-1, openSUSE-SU-2013:0993-1, RHSA-2013:0751-01, RHSA-2013:0752-01, RHSA-2013:0757-01, RHSA-2013:0758-01, RHSA-2013:0770-01, RHSA-2013:0822-01, RHSA-2013:0823-01, RHSA-2013:0855-01, RHSA-2013:1455-01, RHSA-2013:1456-01, SA-20130417-1, SE-2012-01, SSRT101305, SUSE-SU-2013:0814-1, SUSE-SU-2013:0835-1, SUSE-SU-2013:0835-2, SUSE-SU-2013:0835-3, SUSE-SU-2013:0871-1, SUSE-SU-2013:0871-2, SUSE-SU-2013:0934-1, swg21644918, swg21645096, swg21645100, VIGILANCE-VUL-12678, ZDI-13-068, ZDI-13-069, ZDI-13-070, ZDI-13-071, ZDI-13-072, ZDI-13-073, ZDI-13-074, ZDI-13-075, ZDI-13-076, ZDI-13-077, ZDI-13-078, ZDI-13-079, ZDI-13-089.

Description of the vulnerability

Several vulnerabilities were announced in Oracle JRE, JDK and JavaFX. The most severe vulnerabilities lead to code execution.

An attacker can use a vulnerability of ICU 2D, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59190, CVE-2013-2383, ZDI-13-070]

An attacker can use a vulnerability of ICU 2D, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59179, CVE-2013-2384, ZDI-13-068]

An attacker can use a vulnerability of ICU 2D, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59166, CVE-2013-1569, ZDI-13-069]

An attacker can use a vulnerability of 2D, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59137, CVE-2013-2434, ZDI-13-071]

An attacker can use a vulnerability of 2D, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59154, CVE-2013-2432]

An attacker can use a vulnerability of 2D, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59167, CVE-2013-2420, ZDI-13-073]

An attacker can use a vulnerability of 2D, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; CVE-2013-1491, ZDI-13-078]

An attacker can use a vulnerability of Beans, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59219, CVE-2013-1558]

An attacker can use a vulnerability of Deployment, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59124, CVE-2013-2440]

An attacker can use a vulnerability of Deployment, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59089, CVE-2013-2435]

An attacker can use a vulnerability of Hotspot, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59165, CVE-2013-2431]

An attacker can use a vulnerability of Install, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59191, CVE-2013-2425]

An attacker can use a vulnerability of JAXP, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59141, CVE-2013-1518]

An attacker can use a vulnerability of JavaFX, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59234, CVE-2013-2414]

An attacker can use a vulnerability of JavaFX, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59175, CVE-2013-2428, ZDI-13-074]

An attacker can use a vulnerability of JavaFX, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59128, CVE-2013-2427]

An attacker can use a vulnerability of Libraries, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59228, CVE-2013-2422]

An attacker can use a vulnerability of RMI, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59194, CVE-2013-1537]

An attacker can use a vulnerability of RMI, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59170, CVE-2013-1557]

An attacker can use a vulnerability of HotSpot, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59153, CVE-2013-2421]

An attacker can use a vulnerability of JavaFX, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; CVE-2013-0402, ZDI-13-077]

An attacker can use a vulnerability of Libraries, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59206, CVE-2013-2426, ZDI-13-075]

An attacker can use a vulnerability of Libraries, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59213, CVE-2013-2436, ZDI-13-079]

An attacker can use a vulnerability of Libraries, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; CVE-2013-1488, ZDI-13-076]

An attacker can use a vulnerability of 2D, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59172, CVE-2013-2394, ZDI-13-072]

An attacker can use a vulnerability of ImageIO, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59243, CVE-2013-2430]

An attacker can use a vulnerability of ImageIO, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59184, CVE-2013-2429]

An attacker can use a vulnerability of Install, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59208, CVE-2013-1563]

An attacker can use a vulnerability of Install, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-59178, CVE-2013-2439]

An attacker can use a vulnerability of AWT, in order to obtain or alter information. [severity:3/4; CVE-2013-0401, ZDI-13-089]

An attacker can use a vulnerability of ICU 2D, in order to create a denial of service. [severity:2/4; BID-59131, CVE-2013-2419]

An attacker can use a vulnerability of JMX, in order to obtain information. [severity:2/4; BID-59159, CVE-2013-2424]

An attacker can use a vulnerability of JavaFX, in order to obtain information. [severity:2/4; BID-59203, CVE-2013-1561]

An attacker can use a vulnerability of JavaFX, in order to alter information. [severity:2/4; BID-59195, CVE-2013-1564]

An attacker can use a vulnerability of JavaFX, in order to alter information. [severity:2/4; BID-59185, CVE-2013-2438]

An attacker can use a vulnerability of Networking, in order to create a denial of service. [severity:2/4; BID-59187, CVE-2013-2417]

An attacker can use a vulnerability of Deployment, in order to obtain information, to alter information, or to create a denial of service. [severity:2/4; BID-59145, CVE-2013-2418]

An attacker can use a vulnerability of Deployment, in order to alter information. [severity:2/4; BID-59088, CVE-2013-2416, SA-20130417-1]

An attacker can use a vulnerability of Deployment, in order to alter information. [severity:2/4; BID-59220, CVE-2013-2433]

An attacker can use a vulnerability of Deployment, in order to alter information. [severity:2/4; BID-59149, CVE-2013-1540]

An attacker can use a vulnerability of Hotspot, in order to alter information. [severity:2/4; BID-59162, CVE-2013-2423]

An attacker can use a vulnerability of JAX-WS, in order to obtain information. [severity:1/4; BID-59212, CVE-2013-2415]
Complete Vigil@nce bulletin.... (Free trial)

vulnerability announce CVE-2013-2266

ISC BIND: denial of service of regex

Synthesis of the vulnerability

An attacker can use a special DNS record, in order to force ISC BIND to consume large memory resources.
Impacted products: Debian, BIG-IP Hardware, TMOS, Fedora, FreeBSD, HP-UX, BIND, MBS, MES, McAfee Email Gateway, openSUSE, RHEL.
Severity: 3/4.
Creation date: 26/03/2013.
Identifiers: AA-00871, AA-00879, BID-58736, c03750073, CERTA-2013-AVI-210, CERTA-2013-AVI-285, CVE-2013-2266, DSA-2656-1, FEDORA-2013-4525, FEDORA-2013-4533, FreeBSD-SA-13:04.bind, HPSBUX02876, MDVSA-2013:058, openSUSE-SU-2013:0605-1, openSUSE-SU-2013:0666-1, RHSA-2013:0689-01, RHSA-2013:0690-01, SB10052, sol14386, SSRT101148, VIGILANCE-VUL-12572.

Description of the vulnerability

When BIND is compiled on Unix, it uses regex.h to provide functions to process regular expressions.

The BIND libdns library uses these regular expressions, in order to check the syntax of RDATA records. The lib/dns/rdata/in_1/naptr_35.c function calls regcomp() and regfree() declared in regex.h.

However, some Unix implementation of regex consume useless memory. Technical details are unknown.

An attacker can therefore use a special DNS record, in order to force ISC BIND to consume large memory resources. Applications linked to libdns are also vulnerable, such as ISC DHCP (VIGILANCE-VUL-12573).
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability CVE-2013-1667

Perl: denial of service via hash collision

Synthesis of the vulnerability

An attacker can send data generating storage collisions in a Perl applications, in order to overload a service.
Impacted products: Debian, Fedora, HP-UX, AIX, MBS, openSUSE, Solaris, Perl Core, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES.
Severity: 2/4.
Creation date: 06/03/2013.
Identifiers: 912276, BID-58311, c03924247, CERTA-2013-AVI-387, CERTFR-2014-AVI-112, CVE-2013-1667, DSA-2641-1, DSA-2641-2, FEDORA-2013-3436, FEDORA-2013-3673, HPSBUX02928, IV43973, IV46765, MDVSA-2013:113, openSUSE-SU-2013:0497-1, openSUSE-SU-2013:0502-1, RHSA-2013:0685-01, SSA:2013-072-01, SSRT101274, SUSE-SU-2013:0441-1, SUSE-SU-2013:0442-1, VIGILANCE-VUL-12485.

Description of the vulnerability

The bulletin VIGILANCE-VUL-11254 describes a vulnerability which can be used to create a denial of service on several applications.

To solve this vulnerability, Perl periodically recomputes keys, in order to redistribute data. However, this algorithm is incorrect. Technical details are unknown.

An attacker can therefore send data generating storage collisions in a Perl applications, in order to overload a service.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability alert CVE-2013-0809

Oracle Java JRE: code execution via 2D

Synthesis of the vulnerability

An attacker can invite the victim to display a web page containing a Java applet (or Java Web Start) using the 2D component, in order to execute code on his computer.
Impacted products: Fedora, HP-UX, Domino, Notes, Tivoli System Automation, WebSphere AS Traditional, WebSphere MQ, MBS, MES, Java OpenJDK, openSUSE, Java Oracle, RHEL, SUSE Linux Enterprise Desktop, SLES, Unix (platform) ~ not comprehensive.
Severity: 3/4.
Creation date: 05/03/2013.
Identifiers: BID-58296, c03714148, c03725347, c03735640, CERTA-2013-AVI-163, CVE-2013-0809, FEDORA-2013-3467, FEDORA-2013-3468, HPSBUX02857, HPSBUX02864, HPSBUX02867, IC90659, KLYH95CMCJ, MDVSA-2013:021, MDVSA-2013:095, openSUSE-SU-2013:0430-1, openSUSE-SU-2013:0438-1, openSUSE-SU-2013:0509-1, RHSA-2013:0600-01, RHSA-2013:0601-01, RHSA-2013:0602-01, RHSA-2013:0603-01, RHSA-2013:0604-01, RHSA-2013:0605-01, RHSA-2013:0624-01, RHSA-2013:0625-01, RHSA-2013:0626-01, RHSA-2013:1455-01, RHSA-2013:1456-01, SSRT101103, SSRT101156, SUSE-SU-2013:0434-1, SUSE-SU-2013:0701-1, SUSE-SU-2013:0701-2, SUSE-SU-2013:0710-1, swg21627634, swg21633669, swg21633674, swg21644918, swg21645096, swg21645100, VIGILANCE-VUL-12481, VU#688246, ZDI-13-148.

Description of the vulnerability

An attacker can invite the victim to display a web page containing a Java applet (or Java Web Start) using the 2D component, in order to execute code on his computer.

Technical details are unknown.

This vulnerability does not impact servers using Java.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability bulletin CVE-2013-1493

Oracle Java JRE: code execution via 2D

Synthesis of the vulnerability

An attacker can invite the victim to display a web page containing a Java applet (or Java Web Start) using the 2D component, in order to execute code on his computer.
Impacted products: Fedora, HP-UX, Domino, Notes, Tivoli System Automation, WebSphere AS Traditional, WebSphere MQ, MBS, MES, Java OpenJDK, openSUSE, Java Oracle, RHEL, SUSE Linux Enterprise Desktop, SLES, Unix (platform) ~ not comprehensive.
Severity: 3/4.
Creation date: 04/03/2013.
Identifiers: BID-58238, c03714148, c03725347, c03735640, CERTA-2013-AVI-163, CVE-2013-1493, FEDORA-2013-3467, FEDORA-2013-3468, HPSBUX02857, HPSBUX02864, HPSBUX02867, IC90659, KLYH95CMCJ, MDVSA-2013:021, MDVSA-2013:095, openSUSE-SU-2013:0430-1, openSUSE-SU-2013:0438-1, openSUSE-SU-2013:0509-1, RHSA-2013:0600-01, RHSA-2013:0601-01, RHSA-2013:0602-01, RHSA-2013:0603-01, RHSA-2013:0604-01, RHSA-2013:0605-01, RHSA-2013:0624-01, RHSA-2013:0625-01, RHSA-2013:0626-01, RHSA-2013:1455-01, RHSA-2013:1456-01, SSRT101103, SSRT101156, SUSE-SU-2013:0434-1, SUSE-SU-2013:0701-1, SUSE-SU-2013:0701-2, SUSE-SU-2013:0710-1, swg21627634, swg21633669, swg21633674, swg21644918, swg21645096, swg21645100, VIGILANCE-VUL-12478, VU#688246, ZDI-13-142, ZDI-13-149.

Description of the vulnerability

An attacker can invite the victim to display a web page containing a Java applet (or Java Web Start) using the 2D component, in order to execute code on his computer.

Technical details are unknown. The vulnerability is located in Color Management classes.

This vulnerability does not impact servers using Java.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability announce CVE-2012-3499

Apache httpd: Cross Site Scripting of modules

Synthesis of the vulnerability

An attacker can trigger several Cross Site Scripting in the mod_info, mod_status, mod_imagemap, mod_ldap and mod_proxy_ftp modules, in order to execute JavaScript code in the context of the web site.
Impacted products: Apache httpd, Debian, Fedora, HP-UX, NSMXpress, MBS, MES, Mandriva Linux, openSUSE, Solaris, Trusted Solaris, RHEL, JBoss EAP by Red Hat, Slackware.
Severity: 2/4.
Creation date: 25/02/2013.
Identifiers: BID-58165, c03734195, CERTA-2013-AVI-153, CERTA-2013-AVI-387, CERTA-2013-AVI-543, CERTA-2013-AVI-590, CERTFR-2014-AVI-112, CERTFR-2014-AVI-244, CERTFR-2015-AVI-286, CVE-2012-3499, DSA-2637-1, FEDORA-2013-4541, HPSBUX02866, JSA10685, MDVSA-2013:015, MDVSA-2013:015-1, openSUSE-SU-2013:0629-1, openSUSE-SU-2013:0632-1, RHSA-2013:0815-01, RHSA-2013:1012-01, RHSA-2013:1013-01, RHSA-2013:1207-01, RHSA-2013:1208-01, RHSA-2013:1209-01, SSA:2013-062-01, SSRT101139, VIGILANCE-VUL-12457.

Description of the vulnerability

The Apache httpd service can use several modules.

However, the mod_info, mod_status, mod_imagemap, mod_ldap and mod_proxy_ftp modules do not correctly validate received data before displaying them in the generated web document.

An attacker can therefore trigger several Cross Site Scripting in the mod_info, mod_status, mod_imagemap, mod_ldap and mod_proxy_ftp modules, in order to execute JavaScript code in the context of the web site.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability announce CVE-2013-0169 CVE-2013-1484 CVE-2013-1485

Oracle JRE, JDK: several vulnerabilities

Synthesis of the vulnerability

Several vulnerabilities of Oracle JRE and JDK can be used by a malicious applet/application in order to execute code or to obtain information. A legitimate applet/application, handling malicious data, can also be forced to execute code.
Impacted products: Fedora, HP-UX, Domino, Notes, IRAD, Tivoli System Automation, WebSphere AS Traditional, WebSphere MQ, MBS, MES, Mandriva Linux, ePO, Java OpenJDK, openSUSE, Java Oracle, RHEL, SUSE Linux Enterprise Desktop, SLES, Unix (platform) ~ not comprehensive.
Severity: 3/4.
Creation date: 20/02/2013.
Identifiers: BID-57778, BID-58027, BID-58028, BID-58029, BID-58031, c03714148, c03735640, CERTA-2013-AVI-142, CVE-2013-0169, CVE-2013-1484, CVE-2013-1485, CVE-2013-1486, CVE-2013-1487, FEDORA-2013-2764, FEDORA-2013-2813, HPSBUX02857, HPSBUX02867, IC90659, javacpufeb2013update, KLYH95CMCJ, MDVSA-2013:014, MDVSA-2013:095, openSUSE-SU-2013:0375-1, openSUSE-SU-2013:0378-1, RHSA-2013:0273-01, RHSA-2013:0274-01, RHSA-2013:0275-01, RHSA-2013:0531-01, RHSA-2013:0532-01, RHSA-2013:0624-01, RHSA-2013:0625-01, RHSA-2013:0626-01, RHSA-2013:1455-01, RHSA-2013:1456-01, SB10041, SSRT101103, SUSE-SU-2013:0328-1, SUSE-SU-2013:0440-1, SUSE-SU-2013:0440-4, SUSE-SU-2013:0440-6, SUSE-SU-2013:0456-1, SUSE-SU-2013:0456-2, SUSE-SU-2013:0456-3, SUSE-SU-2013:0456-4, SUSE-SU-2013:0701-2, swg21627634, swg21633311, swg21633669, swg21633674, swg21644918, swg21645096, swg21645100, VIGILANCE-VUL-12437, ZDI-13-040, ZDI-13-041, ZDI-13-042.

Description of the vulnerability

Several vulnerabilities were announced in Oracle JRE and JDK. The most severe vulnerabilities lead to code execution.

An attacker can use a vulnerability of Deployment, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-58031, CVE-2013-1487]

An attacker can use a vulnerability of JMX, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-58029, CVE-2013-1486]

An attacker can use a vulnerability of Proxy.newProxyInstance and setUncaughtExceptionHandler, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-58027, CVE-2013-1484, ZDI-13-040, ZDI-13-042]

An attacker can use a vulnerability of doPrivilegedWithCombiner, in order to alter information. [severity:2/4; BID-58028, CVE-2013-1485, ZDI-13-041]

An attacker can inject wrongly encrypted messages in a TLS/DTLS session in mode CBC, and measure the delay before the error message reception, in order to progressively guess the clear content of the session (VIGILANCE-VUL-12374). [severity:1/4; BID-57778, CVE-2013-0169]
Complete Vigil@nce bulletin.... (Free trial)

vulnerability note CVE-2013-0169

OpenSSL: information disclosure in CBC mode, Lucky 13

Synthesis of the vulnerability

An attacker can inject wrongly encrypted messages in a TLS/DTLS session in mode CBC, and measure the delay before the error message reception, in order to progressively guess the clear content of the session.
Impacted products: Debian, Fedora, FreeBSD, HP-UX, AIX, Tivoli Workload Scheduler, Juniper J-Series, Junos OS, Junos Space, NSM Central Manager, NSMXpress, MBS, MES, ePO, NetScreen Firewall, ScreenOS, OpenSSL, openSUSE, openSUSE Leap, Solaris, pfSense, RHEL, JBoss EAP by Red Hat, Slackware, SUSE Linux Enterprise Desktop, SLES, ESX, ESXi, VMware vSphere, VMware vSphere Hypervisor.
Severity: 1/4.
Creation date: 12/02/2013.
Identifiers: 1643316, c03710522, c03883001, CERTA-2013-AVI-454, CVE-2013-0169, DSA-2621-1, ESX410-201307001, ESX410-201307401-SG, ESX410-201307403-SG, ESX410-201307404-SG, ESX410-201307405-SG, ESXi410-201307001, ESXi410-201307401-SG, FEDORA-2013-2793, FEDORA-2013-2834, FEDORA-2013-4403, FreeBSD-SA-13:03.openssl, HPSBUX02856, HPSBUX02909, JSA10575, JSA10759, Lucky 13, MDVSA-2013:018, MDVSA-2013:052, openSUSE-SU-2013:0336-1, openSUSE-SU-2013:0337-1, openSUSE-SU-2013:0339-1, openSUSE-SU-2016:0640-1, RHSA-2013:0587-01, RHSA-2013:0636-01, RHSA-2013:0782-01, RHSA-2013:0783-01, RHSA-2013:0833-01, RHSA-2013:0834-02, RHSA-2013:0839-02, RHSA-2013:1455-01, RHSA-2013:1456-01, RHSA-2014:0416-01, SB10041, SSA:2013-042-01, SSRT101104, SSRT101289, SUSE-SU-2014:0320-1, VIGILANCE-VUL-12394, VMSA-2013-0009.

Description of the vulnerability

The bulletin VIGILANCE-VUL-12374 describes a vulnerability of TLS/DTLS.

For OpenSSL, the solution VIGILANCE-SOL-28668 corrected this vulnerability. However, this solution was not complete.

An attacker can therefore still inject wrongly encrypted messages in a TLS/DTLS session in mode CBC, and measure the delay before the error message reception, in order to progressively guess the clear content of the session.
Complete Vigil@nce bulletin.... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about HPUX: