Peaches Posted January 13, 2009 Report Share Posted January 13, 2009 Vulnerabilities .. Sun Solaris Adobe Reader Multiple VulnerabilitiesSecunia Advisory: SA33491 Release Date: 2009-01-12 Critical: Highly critical Impact: Privilege escalationSystem access Where: From remote Solution Status: Unpatched OS: Sun Solaris 10Subscribe: Instant alerts on relevant vulnerabilities CVE reference: CVE-2008-2549CVE-2008-2992CVE-2008-4812CVE-2008-4813CVE-2008-4814CVE-2008-4815CVE-2008-4817Description:Sun has acknowledged some vulnerabilities Adobe Reader included in Solaris, which can be exploited by malicious, local users to gain escalated privileges or by malicious people to compromise a user's system.For more information:SA29773Solution:Do not open PDF files from untrusted sources.Original Advisory:http://sunsolve.sun.com/search/document.do...y=1-66-249366-1Other References:SA29773:http://secunia.com/advisories/29773/Secunia .... http://secunia.com/advisories/33491/........................................................................................................Vulnerability: skype extension for firefoxPublished:2008-12-22Severity:MediumDescription:The skype_tool.copy_num method in the Skype extension BETA 2.2.0.95 for Firefox allows remote attackers to write arbitrary data to the clipboard via a string argument. ..........................................................................................................Vulnerability: opensolaris, solarisPublished:2008-12-22Severity:MediumDescription:The name service cache daemon (nscd) in Sun Solaris 10 and OpenSolaris snv_50 through snv_104 does not properly check permissions, which allows local users to gain privileges and obtain sensitive information via unspecified vectors. .........................................................................................................................Vulnerability:kernellPublished:2008-12-22Severity:MediumDescription: libata in the Linux kernel before 2.6.27.9 does not set minimum timeouts for SG_IO requests, which allows local users to cause a denial of service (Programmed I/O mode on drives) via multiple simultaneous invocations of an unspecified test program. ........................................................................................................................Vulnerability: konquerorPublished:2008-12-22Severity:MediumDescription: HTMLTokenizer::scriptHandler in Konqueror in KDE 3.5.9 and 3.5.10 allows remote attackers to cause a denial of service (application crash) via an invalid document.load call that triggers use of a deleted object. NOTE: some of these details are obtained from third party information. >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>SUSE update for Sun Java[/b]Secunia Advisory: SA33457 Release Date: 2009-01-12 Critical: Highly critical Impact: Security BypassExposure of system informationExposure of sensitive informationDoSSystem access Where: From remote Solution Status: Vendor Patch OS: openSUSE 10.3openSUSE 11.0openSUSE 11.1SUSE Linux Enterprise Server 10SUSE Linux Enterprise Server 9Software: Novell Open Enterprise Server 1.xSubscribe: Instant alerts on relevant vulnerabilities CVE reference: see here: http://secunia.com/advisories/33457/>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>Browse3D ".sfs" Processing Buffer Overflow VulnerabilitySecunia Advisory: SA33483 Release Date: 2009-01-12 Critical: Highly critical Impact: System access Where: From remote Solution Status: Unpatched Software: Browse3D 3.xSubscribe: Instant alerts on relevant vulnerabilities Description:Houssamix has discovered a vulnerability in Browse3D, which potentially can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to a boundary error when processing ".sfs" files and can be exploited to cause a stack-based buffer overflow.Successful exploitation may allow execution of arbitrary code.The vulnerability is confirmed in version 3.5. Other versions may also be affected.Solution:Do not open untrusted ".sfs" files using the application.Provided and/or discovered by:HoussamixOriginal Advisory:http://milw0rm.com/exploits/7721Read here: Secunia - http://secunia.com/advisories/33483/>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>Jan 12 2009Vulnerability in the SAP GUI According to a Secunia advisory, a faulty ActiveX control in the SAP GUI can allow for an attacker to take control of a system. The cause of the problem is a boundary error that can be exploited by a remote user to cause a heap overflow. The error occurs when copying tab captions within the TabOne ActiveX control, such as adding multiple tabs with the AddTab method. The vulnerable versions are SAP GUI 6.40 Patch 29 and SAP GUI 7.10 with versions of the control (sizerone.ocx]) 7.0.0.16, but other versions may be affected. The fix is to upgrade to SAP GUI version 7.10PL, which sets the kill bit for the ActiveX control. Users can also set the kill bit manually using instructions available to registered SAP users (link requires user name and password).See Also:• SAP GUI TabOne ActiveX Control Caption List Buffer Overflow, Secunia advisoryHeise Security - http://www.heise-online.co.uk/security/Vul...I--/news/112395>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>That's it folks!! Quote Link to post Share on other sites
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.