Miscellaneous Vulnerabilities


Recommended Posts

Vulnerabilities

..

Sun Solaris Adobe Reader Multiple Vulnerabilities

Secunia Advisory: SA33491

Release Date: 2009-01-12

Critical:

Highly critical

Impact: Privilege escalation

System access

Where: From remote

Solution Status: Unpatched

OS: Sun Solaris 10

Subscribe: Instant alerts on relevant vulnerabilities

CVE reference: CVE-2008-2549

CVE-2008-2992

CVE-2008-4812

CVE-2008-4813

CVE-2008-4814

CVE-2008-4815

CVE-2008-4817

Description:

Sun has acknowledged some vulnerabilities Adobe Reader included in Solaris, which can be exploited by malicious, local users to gain escalated privileges or by malicious people to compromise a user's system.

For more information:

SA29773

Solution:

Do not open PDF files from untrusted sources.

Original Advisory:

http://sunsolve.sun.com/search/document.do...y=1-66-249366-1

Other References:

SA29773:

http://secunia.com/advisories/29773/

Secunia .... http://secunia.com/advisories/33491/

................................................................................

........................

Vulnerability: skype extension for firefox

Published:2008-12-22

Severity:Medium

Description:The skype_tool.copy_num method in the Skype extension BETA 2.2.0.95 for Firefox allows remote attackers to write arbitrary data to the clipboard via a string argument.

................................................................................

..........................

Vulnerability: opensolaris, solaris

Published:2008-12-22

Severity:Medium

Description:The name service cache daemon (nscd) in Sun Solaris 10 and OpenSolaris snv_50 through snv_104 does not properly check permissions, which allows local users to gain privileges and obtain sensitive information via unspecified vectors.

................................................................................

.........................................

Vulnerability:kernell

Published:2008-12-22

Severity:Medium

Description: libata in the Linux kernel before 2.6.27.9 does not set minimum timeouts for SG_IO requests, which allows local users to cause a denial of service (Programmed I/O mode on drives) via multiple simultaneous invocations of an unspecified test program.

................................................................................

........................................

Vulnerability: konqueror

Published:2008-12-22

Severity:Medium

Description: HTMLTokenizer::scriptHandler in Konqueror in KDE 3.5.9 and 3.5.10 allows remote attackers to cause a denial of service (application crash) via an invalid document.load call that triggers use of a deleted object. NOTE: some of these details are obtained from third party information.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

SUSE update for Sun Java[/b]

Secunia Advisory: SA33457

Release Date: 2009-01-12

Critical:

Highly critical

Impact: Security Bypass

Exposure of system information

Exposure of sensitive information

DoS

System access

Where: From remote

Solution Status: Vendor Patch

OS: openSUSE 10.3

openSUSE 11.0

openSUSE 11.1

SUSE Linux Enterprise Server 10

SUSE Linux Enterprise Server 9

Software: Novell Open Enterprise Server 1.x

Subscribe: Instant alerts on relevant vulnerabilities

CVE reference: see here: http://secunia.com/advisories/33457/

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

Browse3D ".sfs" Processing Buffer Overflow Vulnerability

Secunia Advisory: SA33483

Release Date: 2009-01-12

Critical:

Highly critical

Impact: System access

Where: From remote

Solution Status: Unpatched

Software: Browse3D 3.x

Subscribe: Instant alerts on relevant vulnerabilities

Description:

Houssamix has discovered a vulnerability in Browse3D, which potentially can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error when processing ".sfs" files and can be exploited to cause a stack-based buffer overflow.

Successful exploitation may allow execution of arbitrary code.

The vulnerability is confirmed in version 3.5. Other versions may also be affected.

Solution:

Do not open untrusted ".sfs" files using the application.

Provided and/or discovered by:

Houssamix

Original Advisory:

http://milw0rm.com/exploits/7721

Read here: Secunia - http://secunia.com/advisories/33483/

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

Jan 12 2009

Vulnerability in the SAP GUI

According to a Secunia advisory, a faulty ActiveX control in the SAP GUI can allow for an attacker to take control of a system. The cause of the problem is a boundary error that can be exploited by a remote user to cause a heap overflow. The error occurs when copying tab captions within the TabOne ActiveX control, such as adding multiple tabs with the AddTab method.

The vulnerable versions are SAP GUI 6.40 Patch 29 and SAP GUI 7.10 with versions of the control (

sizerone.ocx]) 7.0.0.16, but other versions may be affected. The fix is to upgrade to SAP GUI version 7.10PL, which sets the kill bit for the ActiveX control. Users can also set the kill bit manually using instructions available to registered SAP users (link requires user name and password).

See Also:

• SAP GUI TabOne ActiveX Control Caption List Buffer Overflow, Secunia advisory

Heise Security - http://www.heise-online.co.uk/security/Vul...I--/news/112395

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

That's it folks!!

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...