VARIoT IoT vulnerabilities database
| VAR-201106-0305 | No CVE | SAP NetWeaver Denial of service vulnerability |
CVSS V2: - CVSS V3: - Severity: MEDIUM |
SAP NetWeaver is the technical foundation for SAP Business Suite solutions, SAP xApps composite applications, partner solutions, and custom applications. There is an error in the authentication mechanism in the J2EE engine, and an attacker can bypass the authentication mechanism for a denial of service attack
| VAR-201106-0299 | No CVE | SAP NetWeave has an unknown vulnerability |
CVSS V2: - CVSS V3: - Severity: MEDIUM |
SAP NetWeaver is the technical foundation for SAP Business Suite solutions, SAP xApps composite applications, partner solutions, and custom applications. There is an unspecified error in the SLD (System Landscape Directory), and version information can be obtained through the /REP and /RWB directories
| VAR-201106-0307 | No CVE | SAP NetWeaver 'Deployer servlet' Input Cross-Site Scripting Vulnerability |
CVSS V2: - CVSS V3: - Severity: MEDIUM |
SAP NetWeaver is the technical foundation for SAP Business Suite solutions, SAP xApps composite applications, partner solutions, and custom applications. Inputs passed to the Deployer servlet in the Trust Center service via the \"BSNAME\" and \"REQID\" parameters are not filtered before returning to the user, which can lead to cross-site scripting attacks
| VAR-201107-0261 | CVE-2011-2961 | Sunwayland pNetPower AngelServer.exe Heap Buffer Overflow Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Heap-based buffer overflow in AngelServer.exe 6.0.11.3 in Sunway pNetPower allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UDP packet. Pnetpower is prone to a denial-of-service vulnerability. ----------------------------------------------------------------------
Frost & Sullivan 2011 Report: Secunia Vulnerability Research
\"Frost & Sullivan believes that Secunia continues to be a major player in the vulnerability research market due to its diversity of products that provide best-in-class coverage, quality, and usability.\" This is just one of the key factors that influenced Frost & Sullivan to select Secunia over other companies.
Read the report here:
http://secunia.com/products/corporate/vim/fs_request_2011/
----------------------------------------------------------------------
TITLE:
Sunway pNetPower AngelServer Buffer Overflow Vulnerability
SECUNIA ADVISORY ID:
SA44990
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44990/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44990
RELEASE DATE:
2011-06-20
DISCUSS ADVISORY:
http://secunia.com/advisories/44990/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44990/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44990
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Sunway pNetPower, which can be
exploited by malicious people to compromise a vulnerable system.
Successful exploitation may allow execution of arbitrary code.
The vulnerability is reported in version 6.1.
SOLUTION:
Apply patches (please see the vendor's advisory for details).
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Dillon Beresford, NSS Labs.
ORIGINAL ADVISORY:
http://www.sunwayland.com.cn/news_info_.asp?Nid=3593
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201106-0318 | No CVE | iPUX ICS1033 Override Access Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
iPUX ICS1033 is a webcam product. iPUX ICS1033 has an unauthorized access vulnerability in its implementation, which can be exploited by local attackers to bypass certain security restrictions. This vulnerability stems from the fact that the application includes an undisclosed \"productmaker\" account in the default credentials. ----------------------------------------------------------------------
Join Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria
See to the presentation "The Dynamics and Threats of End-Point Software Portfolios" by Secunia's Research Analyst Director, Stefan Frei.
Read more:
http://conference.first.org/
----------------------------------------------------------------------
TITLE:
iPUX ICS1033 Undocumented Account Security Issue
SECUNIA ADVISORY ID:
SA44925
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44925/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44925
RELEASE DATE:
2011-06-17
DISCUSS ADVISORY:
http://secunia.com/advisories/44925/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44925/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44925
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A security issue has been reported in iPUX ICS1033, which can be
exploited by malicious people to bypass certain security
restrictions. This
can be exploited to gain access to the web and Telnet interfaces and
e.g. conduct command injection attacks.
SOLUTION:
Restrict access to trusted hosts only.
PROVIDED AND/OR DISCOVERED BY:
Roberto Paleari
ORIGINAL ADVISORY:
http://archives.neohapsis.com/archives/bugtraq/2011-06/0064.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201106-0301 | No CVE | Siemens SIMATIC S7-1200 Controller Communication Replay Vulnerability |
CVSS V2: - CVSS V3: - Severity: HIGH |
The Siemens SIMATIC S7-1200 is a modular controller from Siemens. A security vulnerability exists in the Siemens SIMATIC S7-1200. The engine software sends unencrypted data to the programmable logic controller. The attacker can replay the replay commands sent by the engine software through a man-in-the-middle attack
| VAR-201106-0296 | No CVE | Siemens SIMATIC S7-1200 Controller Denial of Service Vulnerability |
CVSS V2: - CVSS V3: - Severity: HIGH |
The Siemens SIMATIC S7-1200 is a modular controller with Siemens exit. An unspecified error in the Siemens SIMATIC S7-1200 WEB server can trigger a denial of service attack
| VAR-201106-0382 | No CVE | SAP Netweaver Multiple Vulnerabilities |
CVSS V2: - CVSS V3: - Severity: - |
SAP Netweaver is prone to multiple cross-site scripting vulnerabilities, an information-disclosure vulnerability, and an authentication-bypass vulnerability.
An attacker may leverage the issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, disclose sensitive information, or bypass certain security restrictions.
| VAR-201108-0129 | CVE-2011-3144 | ClearSCADA Buffer Overflow Vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Control Microsystems ClearSCADA 2005, 2007, and 2009 before R2.3 and R1.4, as used in SCX before 67 R4.5 and 68 R3.9, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. The ClearSCADA application has a post-release usage error, sending a long string can trigger a heap-based buffer overflow, and successfully exploiting the vulnerability can execute arbitrary code in the application context. ClearSCADA is an integrated SCADA host platform that includes a rotation training engine, real-time database, web server, alarm processor and reporting software. ClearSCADA has a cross-site scripting vulnerability. Some unspecified input lacks filtering before returning users. Attackers can exploit vulnerabilities for cross-site scripting attacks to obtain sensitive information or hijack user sessions. ClearSCADA The application has a use error after release. ----------------------------------------------------------------------
Join Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria
See to the presentation "The Dynamics and Threats of End-Point Software Portfolios" by Secunia's Research Analyst Director, Stefan Frei.
Read more:
http://conference.first.org/
----------------------------------------------------------------------
TITLE:
ClearSCADA Cross-Site Scripting and Buffer Overflow Vulnerabilities
SECUNIA ADVISORY ID:
SA44955
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44955/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44955
RELEASE DATE:
2011-06-16
DISCUSS ADVISORY:
http://secunia.com/advisories/44955/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44955/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44955
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Two vulnerabilities have been reported in ClearSCADA, which can be
exploited by malicious people to conduct cross-site scripting attacks
and compromise a vulnerable system.
The vulnerabilities are reported the following products:
* ClearSCADA 2005 (all versions)
* ClearSCADA 2007 (all versions)
* ClearSCADA 2009 (all versions except R2.3 and R1.4)
SOLUTION:
Update to a fixed version. Please see the CERT advisory for more
information.
PROVIDED AND/OR DISCOVERED BY:
US-CERT credits Digital Bond.
ORIGINAL ADVISORY:
Digital Bond:
http://www.digitalbond.com/scadapedia/vulnerability-notes/heap-overflow-vulnerability/
http://www.digitalbond.com/scadapedia/vulnerability-notes/control-microsystems-cross-site-scripting-vulnerability/
US-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-10-314-01A.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201106-0324 | No CVE | Polycom SoundPoint IP \"reg_1.html\" Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Polycom SoundPoint is a VoIP device. An information disclosure vulnerability exists in the reg_1.html page of SoundPoint IP, which can be exploited by remote attackers to obtain sensitive information. Polycom SoundPoint IP is prone to an information-disclosure vulnerability. Information obtained will aid in further attacks
| VAR-201106-0310 | No CVE | Trend Micro Control Manager 'ApHost' Parameter Cross-Site Request Forgery Vulnerability |
CVSS V2: - CVSS V3: - Severity: MEDIUM |
Trend Micro Control Manager (TMCM) is a centralized security management console from Trend Micro that enables unified coordination of Trend Micro products and services. The \"ApHost parameter passed to the /commoncgi/servlet/CCGIServlet input lacks proper filtering before returning to the user, and the attacker can exploit the vulnerability for cross-site scripting attacks to obtain sensitive information or hijack user sessions. Trend Micro Control Manager is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. by "ApHost Parameters passed to /commoncgi/servlet/CCGIServlet The input is not properly filtered before returning to the user. ----------------------------------------------------------------------
Join Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria
See to the presentation "The Dynamics and Threats of End-Point Software Portfolios" by Secunia's Research Analyst Director, Stefan Frei.
Read more:
http://conference.first.org/
----------------------------------------------------------------------
TITLE:
Trend Micro Control Manager "ApHost" Cross-Site Scripting
Vulnerability
SECUNIA ADVISORY ID:
SA44134
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44134/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44134
RELEASE DATE:
2011-06-17
DISCUSS ADVISORY:
http://secunia.com/advisories/44134/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44134/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44134
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Sow Ching Shiong has discovered a vulnerability in Trend Micro
Control Manager, which can be exploited by malicious people to
conduct cross-site scripting attacks.
The vulnerability is confirmed in version 5.5 (Build 1250). Other
versions may also be affected.
SOLUTION:
Apply hotfix 1435. Please contact the vendor for details.
PROVIDED AND/OR DISCOVERED BY:
Sow Ching Shiong via Secunia.
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201106-0244 | CVE-2011-2604 | Intel G41 Service disruption in drivers (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The Intel G41 driver 6.14.10.5355 on Windows XP SP3 allows remote attackers to cause a denial of service (system crash) via a crafted web page that is visited with Google Chrome or Mozilla Firefox, as demonstrated by the lots-of-polys-example.html test page in the Khronos WebGL SDK. Mozilla Firefox is prone to an information-disclosure vulnerability in the WebGL implementation
Attackers can exploit this issue to obtain potentially sensitive information. There is a denial of service vulnerability in version 6.14.10.5355 of the Intel G41 driver based on the Windows XP SP3 platform
| VAR-201106-0243 | CVE-2011-2603 | NVIDIA 9400M Service disruption in drivers (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The NVIDIA 9400M driver 6.2.6 on Mac OS X 10.6.7 allows remote attackers to cause a denial of service (desktop hang) via a crafted web page that is visited with Google Chrome or Mozilla Firefox, as demonstrated by the lots-of-polys-example.html test page in the Khronos WebGL SDK. Mozilla Firefox is prone to an information-disclosure vulnerability in the WebGL implementation
Attackers can exploit this issue to obtain potentially sensitive information. A denial of service vulnerability exists in NVIDIA 9400M driver version 6.2.6 based on Mac OS X 10.6.7
| VAR-201106-0084 | CVE-2011-1889 | Microsoft Forefront Threat Management Gateway (TMG) 2010 Client's NSPLookupServiceNext Arbitrary code execution vulnerability in function |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
The NSPLookupServiceNext function in the client in Microsoft Forefront Threat Management Gateway (TMG) 2010 allows remote attackers to execute arbitrary code via vectors involving unspecified requests, aka "TMG Firewall Client Memory Corruption Vulnerability.".
An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed attacks may cause a denial-of-service condition.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA11-165A
Microsoft Updates for Multiple Vulnerabilities
Original release date: June 14, 2011
Last revised: --
Source: US-CERT
Systems Affected
* Microsoft Windows
* Microsoft Office
* Microsoft Internet Explorer
* Microsoft ISA
* Microsoft Visual Studio
* Microsoft .NET Framework
Overview
There are multiple vulnerabilities in Microsoft Windows, Office,
Internet Explorer, ISA, Visual Studio, and .NET Framework.
Microsoft has released updates to address these vulnerabilities.
I. Description
The Microsoft Security Bulletin Summary for June 2011 describes
multiple vulnerabilities in Microsoft Windows, Office, Internet
Explorer, ISA, Visual Studio, and .NET Framework. Microsoft has
released updates to address the vulnerabilities.
II.
III. Solution
Apply updates
Microsoft has provided updates for these vulnerabilities in the
Microsoft Security Bulletin Summary for June 2011. That bulletin
describes any known issues related to the updates. Administrators
are encouraged to note these issues and test for any potentially
adverse effects. In addition, administrators should consider using
an automated update distribution system such as Windows Server
Update Services (WSUS).
IV. References
____________________________________________________________________
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA11-165A.html>
____________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA11-165A Feedback VU#678478" in
the subject.
____________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________
Produced 2011 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
____________________________________________________________________
Revision History
June 14, 2011: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBTffCxz6pPKYJORa3AQJ0MAgAgkGwD6T5c3gNI3Mad6yHB/to+h0FqfPF
CXWm/J+vkP3GepdZrdVBCOfZLDdUcn7y9fwRdWD7bFzHEPY7xZTYdSCePEJbtrKK
kOX6t+PiWWim10U2LELVnSMyIjyL3Ys/ynAWIwL/kKJ94Y3pGJ+wPOdJTGGTODj/
sAscngFGya8WKMgtSPJuFV+LFAU02e1rNt0zDF4iZYUcEBSG53GhaE0QkM0MNOZ8
SxthmIeFctvW28T74BySOXdV+SzjxFeETJjT0GMC3RVjEgJO9PQVSzoeBcwXqfY8
qoSBa3YZOvLHqsEA+6bdK5VS3QAGcJv2Pvhm8p+NHaEbrBzxlqBjzw==
=PuLQ
-----END PGP SIGNATURE-----
. ----------------------------------------------------------------------
Join Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria
See to the presentation "The Dynamics and Threats of End-Point Software Portfolios" by Secunia's Research Analyst Director, Stefan Frei.
Read more:
http://conference.first.org/
----------------------------------------------------------------------
TITLE:
Microsoft Threat Management Gateway Firewall Client Vulnerability
SECUNIA ADVISORY ID:
SA44857
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44857/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44857
RELEASE DATE:
2011-06-15
DISCUSS ADVISORY:
http://secunia.com/advisories/44857/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44857/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44857
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Microsoft Forefront Threat
Management Gateway (TMG) Client, which can be exploited by malicious
people to compromise a vulnerable system.
Successful exploitation allows execution of arbitrary code.
SOLUTION:
Apply patches.
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
MS11-040 (KB2520426):
http://www.microsoft.com/technet/security/Bulletin/MS11-040.mspx
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201106-0115 | CVE-2011-2092 | plural Adobe Unknown vulnerabilities in products |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe LiveCycle Data Services 3.1 and earlier, LiveCycle 9.0.0.2 and earlier, and BlazeDS 4.0.1 and earlier do not properly restrict creation of classes during deserialization of (1) AMF and (2) AMFX data, which allows attackers to have an unspecified impact via unknown vectors, related to a "deserialization vulnerability.". BlazeDS and GraniteDS are prone to a remote code-execution vulnerability.
Successful exploits will allow attackers to execute arbitrary code within the context of the affected application.
Remote attackers can exploit this issue to bypass certain security restrictions.
NOTE: This issue was previously discussed in BID 48267 (Adobe LiveCycle Data Services and BlazeDS APSB11-15 Multiple Remote Vulnerabilities) but has been given its own record to better document it. ----------------------------------------------------------------------
Join Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria
See to the presentation "The Dynamics and Threats of End-Point Software Portfolios" by Secunia's Research Analyst Director, Stefan Frei.
Read more:
http://conference.first.org/
----------------------------------------------------------------------
TITLE:
Adobe LiveCycle / BlazeDS Two Vulnerabilities
SECUNIA ADVISORY ID:
SA44922
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44922/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44922
RELEASE DATE:
2011-06-15
DISCUSS ADVISORY:
http://secunia.com/advisories/44922/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44922/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44922
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Two vulnerabilities have been reported in Adobe LiveCycle and
BlazeDS, which can be exploited by malicious people to cause a DoS
(Denial of Service) and compromise a vulnerable system.
1) An error when handling AMF/AMFX data during object deserialization
can be exploited to execute certain class methods.
2) An error when processing certain graph objects (e.g. JFrame class)
can be exploited to cause a DoS.
The vulnerabilities are reported in the following products:
* LiveCycle Data Services 3.1, 2.6.1, 2.5.1, and earlier for Windows,
Macintosh, and UNIX.
* LiveCycle 9.0.0.2, 8.2.1.3, 8.0.1.3, and earlier for Windows,
Linux, and UNIX.
* BlazeDS 4.0.1 and earlier.
SOLUTION:
Apply updates (please see the vendor's advisory for details).
PROVIDED AND/OR DISCOVERED BY:
Wouter Coekaerts
ORIGINAL ADVISORY:
Adobe (APSB11-15):
http://www.adobe.com/support/security/bulletins/apsb11-15.html
Wouter Coekaerts:
http://wouter.coekaerts.be/2011/amf-arbitrary-code-execution
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
.
1) The administrative interface allows users to perform certain
actions via HTTP requests without performing any validity checks to
verify the requests. This can be exploited to e.g. add a user with
administrative privileges by tricking the logged in administrator
into visiting a malicious web site. No further
information is currently available.
3) Some vulnerabilities are caused due to vulnerabilities in the
bundled version of Adobe BlazeDS
| VAR-201106-0320 | No CVE | Aastra 9480i CT Information Disclosure Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
The Aastra 9480i is an IP telephony device. The application does not properly restrict access to the globalSIPsettings.html and SIPsettingsLine1.html configuration files, and an attacker can exploit the vulnerability to obtain sensitive information. Aastra 9480i CT is prone to multiple information-disclosure vulnerabilities because it fails to properly sanitize user-supplied input.
Attackers can exploit these issues using directory-traversal strings to confirm the existence of local files outside of the WordPress webroot. Information obtained can aid in launching further attacks. ----------------------------------------------------------------------
Join Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria
See to the presentation "The Dynamics and Threats of End-Point Software Portfolios" by Secunia's Research Analyst Director, Stefan Frei.
Read more:
http://conference.first.org/
----------------------------------------------------------------------
TITLE:
Aastra 9480i IP Phone Information Disclosure Security Issues
SECUNIA ADVISORY ID:
SA44848
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44848/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44848
RELEASE DATE:
2011-06-14
DISCUSS ADVISORY:
http://secunia.com/advisories/44848/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44848/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44848
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Two security issues have been reported in Aastra 9480i IP Phone,
which can be exploited by malicious people to disclose system
information. disclose credentials of connected phone lines.
SOLUTION:
Restrict access to trusted hosts only.
PROVIDED AND/OR DISCOVERED BY:
Pr0T3cT10n
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201106-0116 | CVE-2011-2093 | plural Adobe Service disruption in products (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Adobe LiveCycle Data Services 3.1 and earlier, LiveCycle 9.0.0.2 and earlier, and BlazeDS 4.0.1 and earlier do not properly handle object graphs, which allows attackers to cause a denial of service via unspecified vectors, related to a "complex object graph vulnerability.". (DoS) There is a vulnerability that becomes a condition.Denial of service by attacker (DoS) There is a possibility of being put into a state. Adobe LiveCycle Data Services and BlazeDS are prone to a remote denial-of-service vulnerability.
Remote attackers can exploit this issue to crash the affected applications, denying service to legitimate users. ----------------------------------------------------------------------
Join Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria
See to the presentation "The Dynamics and Threats of End-Point Software Portfolios" by Secunia's Research Analyst Director, Stefan Frei.
Read more:
http://conference.first.org/
----------------------------------------------------------------------
TITLE:
Adobe LiveCycle / BlazeDS Two Vulnerabilities
SECUNIA ADVISORY ID:
SA44922
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44922/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44922
RELEASE DATE:
2011-06-15
DISCUSS ADVISORY:
http://secunia.com/advisories/44922/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44922/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44922
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Two vulnerabilities have been reported in Adobe LiveCycle and
BlazeDS, which can be exploited by malicious people to cause a DoS
(Denial of Service) and compromise a vulnerable system.
1) An error when handling AMF/AMFX data during object deserialization
can be exploited to execute certain class methods.
Successful exploitation may allow execution of arbitrary code.
2) An error when processing certain graph objects (e.g. JFrame class)
can be exploited to cause a DoS.
The vulnerabilities are reported in the following products:
* LiveCycle Data Services 3.1, 2.6.1, 2.5.1, and earlier for Windows,
Macintosh, and UNIX.
* LiveCycle 9.0.0.2, 8.2.1.3, 8.0.1.3, and earlier for Windows,
Linux, and UNIX.
* BlazeDS 4.0.1 and earlier.
SOLUTION:
Apply updates (please see the vendor's advisory for details).
PROVIDED AND/OR DISCOVERED BY:
Wouter Coekaerts
ORIGINAL ADVISORY:
Adobe (APSB11-15):
http://www.adobe.com/support/security/bulletins/apsb11-15.html
Wouter Coekaerts:
http://wouter.coekaerts.be/2011/amf-arbitrary-code-execution
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
.
1) The administrative interface allows users to perform certain
actions via HTTP requests without performing any validity checks to
verify the requests. This can be exploited to e.g. add a user with
administrative privileges by tricking the logged in administrator
into visiting a malicious web site. No further
information is currently available.
3) Some vulnerabilities are caused due to vulnerabilities in the
bundled version of Adobe BlazeDS
| VAR-201106-0311 | No CVE | Trend Micro Data Loss Prevention Directory Traversal Vulnerability |
CVSS V2: - CVSS V3: - Severity: HIGH |
Trend Micro Data Loss Prevention is a data leakage management system released by Trend Micro. Trend Micro Data Loss Prevention incorrectly filters the user-submitted encoded directory traversal sequence characters. An attacker can submit a malicious request to bypass the WEB ROOT limit and view the system file contents with WEB permissions.
A remote attacker could exploit this vulnerability using directory-traversal strings (such as '../') to gain access to arbitrary files on the targeted system. This may result in the disclosure of sensitive information or lead to a complete compromise of the affected computer. ----------------------------------------------------------------------
Frost & Sullivan 2011 Report: Secunia Vulnerability Research
\"Frost & Sullivan believes that Secunia continues to be a major player in the vulnerability research market due to its diversity of products that provide best-in-class coverage, quality, and usability.\" This is just one of the key factors that influenced Frost & Sullivan to select Secunia over other companies.
Read the report here:
http://secunia.com/products/corporate/vim/fs_request_2011/
----------------------------------------------------------------------
TITLE:
Trend Micro Data Loss Prevention Management Server Directory
Traversal Vulnerability
SECUNIA ADVISORY ID:
SA44916
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44916/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44916
RELEASE DATE:
2011-06-29
DISCUSS ADVISORY:
http://secunia.com/advisories/44916/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44916/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44916
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Trend Micro Data Loss Prevention
Management Server, which can be exploited by malicious people to
disclose sensitive information.
Input appended to the URL after /dsc is not properly verified before
being used. This can be exploited to disclose the contents of
arbitrary files via directory traversal sequences.
The vulnerability is reported in version 5.5. Other versions may also
be affected.
SOLUTION:
Filter malicious characters and character sequences using a proxy.
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY:
Luis Martinez and Sergio Lopez, White Hat Consultores
ORIGINAL ADVISORY:
White Hat Consultores:
http://www.exploit-db.com/exploits/17388/
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201106-0308 | No CVE | Siemens SIMATIC PLC Use clear text unverified protocol vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: LOW |
Siemens SIMATIC S7 series PLC Used in various industrial fields, including energy, water conservancy, oil, natural gas, chemical, building automation, and manufacturing. S7-300/400 In the interface, Siemens and non-Siemens products are allowed to use the plaintext protocol. Changing the protocol will cause product compatibility issues.
| VAR-201106-0309 | No CVE | Siemens S7-1200 PLC Loophole |
CVSS V2: 9.3 CVSS V3: - Severity: critical |
Siemens SIMATIC S7 series PLC Used in various industrial fields, including energy, water conservancy, oil, natural gas, chemical, building automation, and manufacturing. Attackers can use this vulnerability to gain unauthorized access to automated networks and control S7-1200 PLC Execution of various unauthorized orders causing damage to industrial control systems