VARIoT IoT vulnerabilities database

VAR-201003-0212 | CVE-2010-0533 | Apple Mac OS X of AFP Server traversal vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Directory traversal vulnerability in AFP Server in Apple Mac OS X before 10.6.3 allows remote attackers to list a share root's parent directory, and read and modify files in that directory, via unspecified vectors. Apple Mac OS X is prone to a security-bypass vulnerability that occurs in the Apple Filing Protocol (AFP) Server.
Remote attackers with 'guest' access can exploit this issue to access files outside of the Public AFP share.
NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it
VAR-201003-0205 | CVE-2010-0525 | Apple Mac OS X of Mail Vulnerability in which important information is obtained |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Mail in Apple Mac OS X before 10.6.3 does not properly enforce the key usage extension during processing of a keychain that specifies multiple certificates for an e-mail recipient, which might make it easier for remote attackers to obtain sensitive information via a brute-force attack on a weakly encrypted e-mail message. Apple Mac OS X is prone to a security-bypass vulnerability in Mail.
Attackers can exploit this issue, likely with a man-in-the-middle attack, to potentially decrypt email messages that were encrypted with unexpectedly weak encryption keys. Other attacks may also be possible.
The following are vulnerable:
Mac OS X 10.5.8
Mac OS X Server 10.5.8
Mac OS X 10.6 through 10.6.2
Mac OS X Server 10.6 through 10.6.2
NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it. There is a logic error in Mail's handling of encryption certificates. Mail may choose an encryption key that was not intended when there are multiple certificates for the recipient in the keychain. If the key is cryptographically weaker than the expected key, it can cause security issues
VAR-201003-0204 | CVE-2010-0537 | Apple Mac OS X of DesktopServices Remote file copy vulnerability |
CVSS V2: 2.6 CVSS V3: - Severity: LOW |
DesktopServices in Apple Mac OS X 10.6 before 10.6.3 does not properly resolve pathnames in certain circumstances involving an application's save panel, which allows user-assisted remote attackers to trigger unintended remote file copying via a crafted share name. Apple Mac OS X is prone to a security-bypass vulnerability in the DesktopServices component.
Remote attackers can exploit this issue to bypass intended security restrictions and obtain sensitive information.
Mac OS X and Mac OS X Server 10.6 through 10.6.2 are vulnerable.
NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it
VAR-201003-0202 | CVE-2010-0535 | Apple Mac OS X of Dovecot Vulnerable to access restrictions |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors. Dovecot is prone to a security-bypass vulnerability.
An authenticated attacker may perform unauthorized email actions.
NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it. Mac OS X is the operating system used by the Apple family of machines. Permissions and access control vulnerabilities exist in Dovecot for Apple Mac OS
VAR-201003-0192 | CVE-2010-0497 | Apple Mac OS X Disk image arbitrary code execution vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Disk Images in Apple Mac OS X before 10.6.3 does not provide the expected warning for an unsafe file type in an internet enabled disk image, which makes it easier for user-assisted remote attackers to execute arbitrary code via a package file type. User interaction is required to exploit this vulnerability in that the target must open a malicious file.The specific flaw exists in the handling of internet enabled disk image files. When a specially crafted Menu Extras plugin is included in the disk image, it is executed without further interaction allowing for arbitrary code execution under the context of the current user.
Mac OS X and OS X Server 10.5.8, and 10.6.through 10.6.2 are vulnerable.
NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it.
-- Vendor Response:
Apple has issued an update to correct this vulnerability. More
details can be found at:
http://support.apple.com/kb/HT4077
-- Disclosure Timeline:
2009-08-10 - Vulnerability reported to vendor
2010-04-02 - Coordinated public release of advisory
-- Credit:
This vulnerability was discovered by:
* Brian Mastenbrook
-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.
Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:
http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.
Our vulnerability disclosure policy is available online at:
http://www.zerodayinitiative.com/advisories/disclosure_policy/
Follow the ZDI on Twitter:
http://twitter.com/thezdi
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
VAR-201003-0206 | CVE-2010-0526 | Apple Mac OS X of QuickTime Heap-based buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Heap-based buffer overflow in QuickTimeMPEG.qtx in QuickTime in Apple Mac OS X before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted genl atom in a QuickTime movie file with MPEG encoding, which is not properly handled during decompression. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists during the parsing of MPEG content. Upon reading a field used for compression within a 'genl' atom in the movie container, the application will decompress outside the boundary of an allocated buffer. Successful exploitation can lead to code execution under the context of the application. A heap overflow is caused when QuickTime fails to perform proper bounds checking on the amount of data copied to the heap by a set of nested loops which can result in arbitrary code execution.
Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.
The following are vulnerable:
Mac OS X 10.6 prior to 10.6.3
Mac OS X Server 10.6 prior to 10.6.3
QuickTime 7 prior to 7.6.6 on Mac OS X 10.5.8 and Microsoft Windows XP, Vista, and 7.
NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it. ZDI-10-045: Apple QuickTime MPEG-1 genl Atom Remote Code Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-045
April 2, 2010
-- CVE ID:
CVE-2010-0526
-- Affected Vendors:
Apple
-- Affected Products:
Apple OS X
-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 9629.
-- Vendor Response:
Apple states:
http://support.apple.com/kb/HT4104
http://support.apple.com/kb/HT4077
-- Disclosure Timeline:
2009-11-06 - Vulnerability reported to vendor
2010-04-02 - Coordinated public release of advisory
-- Credit:
This vulnerability was discovered by:
* Anonymous
-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.
Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:
http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.
Our vulnerability disclosure policy is available online at:
http://www.zerodayinitiative.com/advisories/disclosure_policy/
Follow the ZDI on Twitter:
http://twitter.com/thezdi
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
VAR-201003-0144 | CVE-2010-0065 | Apple Mac OS X Disk image arbitrary code execution vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Disk Images in Apple Mac OS X before 10.6.3 allows user-assisted remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted disk image with bzip2 compression.
Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.
The following are vulnerable:
Mac OS X 10.5.8
Mac OS X Server 10.5.8
Mac OS X 10.6 through 10.6.2
Mac OS X Server 10.6 through 10.6.2
NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it. Mounting a malicious disk image can lead to unexpected termination or arbitrary code execution
VAR-201003-0143 | CVE-2010-0064 | Apple Mac OS X of DesktopServices In disk-quota Vulnerabilities that can be bypassed |
CVSS V2: 6.9 CVSS V3: - Severity: MEDIUM |
DesktopServices in Apple Mac OS X 10.6 before 10.6.3 preserves file ownership during an authenticated Finder copy, which might allow local users to bypass intended disk-quota restrictions and have unspecified other impact by copying files owned by other users. Apple Mac OS X is prone to a security-bypass vulnerability in the DesktopServices component.
Attackers can exploit this issue to bypass security restrictions on file ownership.
Mac OS X and Mac OS X Server 10.6 through 10.6.2 are vulnerable.
NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it
VAR-201003-0142 | CVE-2010-0063 | Apple Mac OS X of CoreTypes In any JavaScript Vulnerability to be executed |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Incomplete blacklist vulnerability in CoreTypes in Apple Mac OS X before 10.6.3 makes it easier for user-assisted remote attackers to execute arbitrary JavaScript via a web page that offers a download with a Content-Type value that is not on the list of possibly unsafe content types for Safari, as demonstrated by the values for the (1) .ibplugin and (2) .url extensions.
Remote attackers can exploit this issue to trick a user into executing arbitrary code if affected content types are downloaded and manually opened from a malicious website.
The following are vulnerable:
Mac OS X 10.5.8
Mac OS X Server 10.5.8
Mac OS X 10.6 prior to 10.6.3
Mac OS X Server 10.6 prior to 10.6.3
NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it. There is an incomplete blacklist vulnerability in CoreTypes of Apple Mac OS. This update adds the .ibplugin and .url file types to the list of content types that the system marks as unsafe
VAR-201003-0138 | CVE-2010-0058 | Apple Mac OS X of ClamAV Vulnerability in introducing viruses into systems |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
freshclam in ClamAV in Apple Mac OS X 10.5.8 with Security Update 2009-005 has an incorrect launchd.plist ProgramArguments key and consequently does not run, which might allow remote attackers to introduce viruses into the system.
Successful exploits will allow attackers to bypass virus scanning, possibly allowing malicious files to escape detection.
This issue affects Mac OS X 10.5.8 and Mac OS X Server 10.5.8. It does not work because the wrong launchd.plist ProgramArguments key is set, allowing an attacker to bypass antivirus checks
VAR-201003-0137 | CVE-2010-0057 | Apple Mac OS X of AFP Vulnerabilities that prevent access restrictions on the server |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
AFP Server in Apple Mac OS X before 10.6.3 does not prevent guest use of AFP shares when guest access is disabled, which allows remote attackers to bypass intended access restrictions via a mount request.
NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it
VAR-201003-0136 | CVE-2010-0056 | Apple Mac OS X of Cocoa Buffer overflow vulnerability in the spell check function |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Buffer overflow in Cocoa spell checking in AppKit in Apple Mac OS X 10.5.8 allows user-assisted remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted document. Apple Mac OS X is prone to a buffer-overflow vulnerability that exists in the AppKit component.
An attacker can exploit this issue to execute arbitrary code with the privileges of the user running the affected software. Failed attacks will cause denial-of-service conditions.
NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it
VAR-201003-0135 | CVE-2010-0055 | Apple Mac OS X of xar Vulnerable to package signature verification processing |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
xar in Apple Mac OS X 10.5.8 does not properly validate package signatures, which allows attackers to have an unspecified impact via a modified package. xar (eXtensible ARchiver) is prone to a security-bypass vulnerability because it fails to properly verify signatures in a modified xar archive.
Attackers can exploit this issue to make modified archives appear to have a valid signature. This may lead to other attacks.
Versions prior to xar 1.5.3 are vulnerable.
NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it. Mac OS X is the operating system used by the Apple family of machines. A remote attacker forges a modified package as a validly signed package, causing unknown impact
VAR-201003-0139 | CVE-2010-0059 | Apple Mac OS X of CoreAudio Vulnerable to arbitrary code execution |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
CoreAudio in Apple Mac OS X before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted audio content with QDM2 encoding, which triggers a buffer overflow due to inconsistent length fields, related to QDCA. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists during the rendering of an audio stream utilizing QDesign's audio codec. The application will perform an allocation utilizing a field specified in the sample's description. Later when initializing the buffer, the application will utilize a different length. If the lengths differ, then a buffer overflow will occur. This can lead to code execution under the context of the currently logged in user. Apple QuickTime is prone to a memory-corruption vulnerability when parsing QDM2 and QDCA encoded audio data. Failed exploit attempts will likely result in a denial-of-service condition.
NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it. Mac OS X is the operating system used by the Apple family of machines. A buffer overflow vulnerability exists in CoreAudio versions of Apple Mac OS prior to 10.6.3.
-- Vendor Response:
Apple has issued an update to correct this vulnerability. More
details can be found at:
http://support.apple.com/kb/HT4077
-- Disclosure Timeline:
2009-08-10 - Vulnerability reported to vendor
2010-04-02 - Coordinated public release of advisory
-- Credit:
This vulnerability was discovered by:
* Anonymous
-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.
Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:
http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.
Our vulnerability disclosure policy is available online at:
http://www.zerodayinitiative.com/advisories/disclosure_policy/
Follow the ZDI on Twitter:
http://twitter.com/thezdi
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
VAR-201003-0113 | CVE-2009-2801 | Apple Mac OS X Vulnerability that can bypass access restrictions in the application firewall |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
The Application Firewall in Apple Mac OS X 10.5.8 drops unspecified firewall rules after a reboot, which might allow remote attackers to bypass intended access restrictions via packet data, related to a "timing issue.".
Attackers can exploit this issue to bypass firewall rules. This may lead to other attacks.
Mac OS X 10.5.8 and Mac OS X Server 10.5.8 are vulnerable.
NOTE: This issue was previously covered in BID 39020 (Apple Mac OS X APPLE-SA-2010-03-29-1 Multiple Security Vulnerabilities) but has been assigned its own record to better document it. The vulnerability is related to "timing issues"
VAR-201310-0002 | CVE-2010-1159 | Aircrack-ng EAPOL Packet Processing Buffer Overflow Vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Multiple heap-based buffer overflows in Aircrack-ng before 1.1 allow remote attackers to cause a denial of service (crash) and execute arbitrary code via a (1) large length value in an EAPOL packet or (2) long EAPOL packet. Aircrack-ng is a wireless crack attack tool. Aircrack-ng handles EAPOL messages with boundary errors. When a specially constructed wireless message is submitted to aircrack-ng or airedump-ng is used to open a specially constructed message capture file, a heap-based buffer overflow can be triggered. Successful exploitation of a vulnerability can execute arbitrary instructions with application privileges. Aircrack-ng is prone to a buffer-overflow vulnerability. Failed attacks will likely cause denial-of-service conditions. ----------------------------------------------------------------------
Secunia CSI
+ Microsoft SCCM
-----------------------
= Extensive Patch Management
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
----------------------------------------------------------------------
TITLE:
Aircrack-ng EAPOL Parsing Buffer Overflow Vulnerability
SECUNIA ADVISORY ID:
SA39150
VERIFY ADVISORY:
http://secunia.com/advisories/39150/
DESCRIPTION:
Lukas Lueg has reported a vulnerability in Aircrack-ng, which can be
exploited by malicious people to potentially compromise a user's
system.
The vulnerability is caused due to a boundary error in the processing
of EAPOL packets. This can be exploited to cause a heap-based buffer
overflow via e.g.
SOLUTION:
Do not process untrusted data using the Aircrack-ng tools.
PROVIDED AND/OR DISCOVERED BY:
Lukas Lueg
ORIGINAL ADVISORY:
http://pyrit.googlecode.com/svn/tags/opt/aircrackng_exploit.py
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201310-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Aircrack-ng: User-assisted execution of arbitrary code
Date: October 07, 2013
Bugs: #311797
ID: 201310-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
A buffer overflow vulnerability in Aircrack-ng could result in
execution of arbitrary code or Denial of Service.
Background
==========
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can
recover keys once enough data packets have been captured.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-wireless/aircrack-ng
< 1.1-r2 >= 1.1-r2
Description
===========
A buffer overflow vulnerability has been discovered in Aircrack-ng.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Aircrack-ng users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=net-wireless/aircrack-ng-1.1-r2"
References
==========
[ 1 ] CVE-2010-1159
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1159
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201310-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2013 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1159
http://advisories.mageia.org/MGASA-2013-0307.html
_______________________________________________________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
746eb2a4209b308b4a8fd77518f540e1 mbs1/x86_64/aircrack-ng-1.1-5.1.mbs1.x86_64.rpm
df9505748ad1c627a1ee101bc478ab33 mbs1/SRPMS/aircrack-ng-1.1-5.1.mbs1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFSYNQAmqjQ0CJFipgRAtfPAKCcTsBxz3mP0w8xnyUicJdv7FBVVwCg7VQu
S4oGoEhYNfQCG/SkLo8CEeA=
=nq84
-----END PGP SIGNATURE-----
VAR-201003-0489 | CVE-2010-1180 | Apple iPhone/iPod touch Safari malformation 'Throw' exception remote code execution vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Safari on Apple iPhone OS 3.1.3 for iPod touch allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long exception string in a throw statement, possibly a related issue to CVE-2009-1514. iPod touch is an MP4 player released by Apple, and the iPhone is its released smartphone. Careful construction of WEB data may execute arbitrary instructions with application privileges.
Successful exploits can allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks may cause denial-of-service conditions
VAR-201003-0485 | CVE-2010-1176 | Apple iPhone/iPod touch Safari malformed image remote code execution vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Safari on Apple iPhone OS 3.1.3 for iPod touch allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to an array of long strings, an array of IMG elements with crafted strings in their SRC attributes, a TBODY element with no associated TABLE element, and certain calls to the delete operator and the cloneNode, clearAttributes, and CollectGarbage methods, possibly a related issue to CVE-2009-0075. iPod touch for Apple iPhone OS of Safari There is a service disruption ( Application crash ) A vulnerability exists that could lead to a condition or arbitrary code execution. The problem is CVE-2009-0075 The problem is related to.Service disruption by a third party via: ( Application crash ) Could be put into a state or execute arbitrary code. iPod touch is an MP4 player released by Apple, and the iPhone is its released smartphone. Apple's iPhone/iPod touch includes a problem with Safari handling web pages that contain malformed \"img\" tags, and remote attackers can exploit vulnerabilities to crash applications. Careful construction of WEB data may execute arbitrary instructions with application privileges.
Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks may cause denial-of-service conditions. Apple iPhone is a smart phone of Apple (Apple)
VAR-201003-0488 | CVE-2010-1179 | Apple iPhone malformation VML data remote code execution vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Safari on Apple iPhone OS 3.1.3 for iPod touch allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a large integer in the numcolors attribute of a recolorinfo element in a VML file, possibly a related issue to CVE-2007-0024. iPod touch is an MP4 player released by Apple, and the iPhone is its released smartphone. Apple's iPhone/iPod touch includes a problem with Safari that handles web pages containing malformed \"VML\" data, and remote attackers can exploit the vulnerability to crash the application. Careful construction of WEB data may execute arbitrary instructions with application privileges. Apple Safari running on iPhone is prone to an unspecified remote code-execution vulnerability.
Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions.
Apple Safari included in iPhone 3.1.3 and prior are vulnerable
VAR-201003-0486 | CVE-2010-1177 | Apple iPhone/iPod touch Safari malformation WEB page remote code execution vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Safari on Apple iPhone OS 3.1.3 for iPod touch allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving document.write calls with long crafted strings. iPod touch is an MP4 player released by Apple, and the iPhone is its released smartphone. Careful construction of WEB data may execute arbitrary instructions with application privileges.
Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks may cause denial-of-service conditions. Apple iPhone is a smart phone of Apple (Apple)