VARIoT IoT vulnerabilities database
| VAR-200706-0515 | CVE-2007-3444 | Research in Motion BlackBerry 7270 Service disruption in (DoS) Vulnerabilities |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The Research in Motion BlackBerry 7270 with 4.0 SP1 Bundle 83 allows remote attackers to cause a denial of service (blocked call reception) via a malformed SIP invite message, possibly related to multiple format string specifiers in the From field, a spoofed source IP address, and limitations of the function stack frame. BlackBerry 7270 phone is prone to a remote format-string vulnerability.
An attacker can exploit this issue to cause certain features of the phone to become unusable until the phone has been reset.
BlackBerry 7270 with BlackBerry Device Software 4.0.1.83 and earlier versions are vulnerable.
NOTE: When exploited, the device may generate the following error message:
"Uncaught exception: java.lang.IllegalArgumentException"
| VAR-200706-0514 | CVE-2007-3443 | Research in Motion BlackBerry 7270 Service disruption in (DoS) Vulnerabilities |
CVSS V2: 2.3 CVSS V3: - Severity: LOW |
The Research in Motion BlackBerry 7270 before 4.0 SP1 Bundle 108 does not properly manage transaction states, which allows remote attackers to cause a denial of service (temporary device hang) by sending a certain SIP INVITE message, but not providing an ACK when the call is answered. BlackBerry 7270 is prone to a remote denial-of-service vulnerability.
An attacker can exploit this issue to cause certain features of the phone to become unusable until the phone has been reset.
NOTE: The denial-of-service conditions will remain even when the phone re-registers with the Registrar.
BlackBerry 7270 with BlackBerry Device Software 4.0.1.83 and prior versions are vulnerable
| VAR-200706-0409 | CVE-2007-3348 | D-Link DPH-540/DPH-541 Wi-Fi Phones SDP Header Denial Of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The D-Link DPH-540/DPH-541 phone allows remote attackers to cause a denial of service (device outage) via a malformed SDP header in a SIP INVITE message. D-Link DPH-540/DPH-541 Wi-Fi phone is prone to a remote denial-of-service vulnerability.
An attacker can exploit this issue to cause certain features of the phone to become unusable until the phone has been reset. A denial of service vulnerability exists in the D-Link DPH-540/DPH-541 Wi-Fi Phones SDP Header
| VAR-200704-0125 | CVE-2007-1866 | dproxy-nexgen of dns_decode_reverse_name Stack-based buffer overflow vulnerability in functions |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Stack-based buffer overflow in the dns_decode_reverse_name function in dns_decode.c in dproxy-nexgen allows remote attackers to execute arbitrary code by sending a crafted packet to port 53/udp, a different issue than CVE-2007-1465. dproxy-nexgen of dns_decode.c of dns_decode_reverse_name The function contains a stack-based buffer overflow vulnerability. Dproxy is a small cached DNS server. Dproxy is prone to a remote buffer-overflow vulnerability because it fails to properly check boundaries on user-supplied data before copying it to an insufficiently sized buffer.
Exploiting this issue could lead to denial-of-service conditions and to the execution of arbitrary machine code with superuser privileges. A successful attack could result in the complete compromise of affected computers or routers/devices.
Version 1.c is vulnerable; other versions may also be affected.
----------------------------------------------------------------------
Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
http://corporate.secunia.com/trial/38/request/
----------------------------------------------------------------------
TITLE:
dproxy-nexgen "dns_decode_reverse_name" Buffer Overflow Vulnerability
SECUNIA ADVISORY ID:
SA24688
VERIFY ADVISORY:
http://secunia.com/advisories/24688/
CRITICAL:
Moderately critical
IMPACT:
System access
WHERE:
>From local network
SOFTWARE:
dproxy-nexgen
http://secunia.com/product/13834/
DESCRIPTION:
mu-b has discovered a vulnerability in dproxy-nexgen, which can be
exploited by malicious people to compromise a vulnerable system.
Successful exploitation allows execution of arbitrary code.
The vulnerability is confirmed in the latest available version
(2007-04-02).
SOLUTION:
Use the software only in a trusted network environment.
PROVIDED AND/OR DISCOVERED BY:
mu-b
ORIGINAL ADVISORY:
http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/053289.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200703-0308 | CVE-2007-1642 | ManageEngine Firewall Analyzer Vulnerabilities in accessing arbitrary common files |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in ManageEngine Firewall Analyzer allows remote authenticated users to "access any common file" via a direct URL request. ManageEngine Firewall Analyzer is prone to a remote information-disclosure vulnerability.
A remote authenticated attacker can leverage this issue to access sensitive data. Information obtained could aid in further attacks.
----------------------------------------------------------------------
Want a new job?
http://secunia.com/secunia_vacancies/
Secunia is looking for new researchers with a reversing background
and experience in writing exploit code:
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
http://secunia.com/Disassembling_og_Reversing/
http://secunia.com/Linux_Security_Specialist/
----------------------------------------------------------------------
TITLE:
ManageEngine Firewall Analyzer Information Disclosure
SECUNIA ADVISORY ID:
SA24707
VERIFY ADVISORY:
http://secunia.com/advisories/24707/
CRITICAL:
Less critical
IMPACT:
Exposure of sensitive information
WHERE:
>From remote
SOFTWARE:
ManageEngine Firewall Analyzer 4.x
http://secunia.com/product/13811/
DESCRIPTION:
yearsilent has reported a security issue in ManageEngine Firewall
Analyzer, which can be exploited by malicious users to disclose
potentially sensitive information.
SOLUTION:
Reportedly, the vulnerability will be fixed in build 4030. Please
contact the vendor for early access to this build version.
PROVIDED AND/OR DISCOVERED BY:
yearsilent
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200703-0600 | CVE-2007-1577 | GeBlog index.php Directory Traversal Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Directory traversal vulnerability in index.php in GeBlog 0.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the GLOBALS[tplname] parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by index.php. GeBlog of index.php Contains a directory traversal vulnerability.By a third party .. GeBlog is prone to a local file-include vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting this issue may allow an attacker to access sensitive information and to execute local script code in the context of the application; this may facilitate other attacks against the affected computer.
GeBlog 0.1 is vulnerable; other versions may also be affected
| VAR-200703-0447 | CVE-2007-1542 | Cisco IP Phone 7940 Service disruption (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in the Cisco IP Phone 7940 and 7960 running firmware before POS8-6-0 allows remote attackers to cause a denial of service via the Remote-Party-ID sipURI field in a SIP INVITE request. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Cisco 7940/7960 phones are prone to a remote denial-of-service vulnerability. Cisco IP Phone is a system for providing voice communication over IP network.
The vulnerability is caused due to an error within the handling of
certain SIP INVITE messages. This can be exploited to reboot the
device by sending a specially crafted INVITE message with a malformed
"sipURI" field of the Remote-Party-ID.
The vulnerability is reported in devices running firmware
POS3-07-4-00.
SOLUTION:
Reportedly, firmware POS8-6-0 is unaffected.
PROVIDED AND/OR DISCOVERED BY:
Humberto J. Abdelnur, Radu State, and Olivier Festor
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200703-0627 | CVE-2007-1585 | Linksys WAG200G Important information such as ( Password and configuration data ) Vulnerability to be acquired |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Linksys WAG200G with firmware 1.01.01, WRT54GC 2 with firmware 1.00.7, and WRT54GC 1 with firmware 1.03.0 and earlier allow remote attackers to obtain sensitive information (passwords and configuration data) via a packet to UDP port 916. NOTE: some of these details are obtained from third party information. Linksys WAG200G is prone to a vulnerability that may disclose sensitive information.
An attacker can exploit this issue to retrieve sensitive information that may aid in further attacks.
This issue affects firmware version 1.01.01; other versions may also be vulnerable. Linksys WAG200G is a wireless ADSL router.
----------------------------------------------------------------------
Want a new job?
http://secunia.com/secunia_vacancies/
Secunia is looking for new researchers with a reversing background
and experience in writing exploit code:
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
http://secunia.com/Disassembling_og_Reversing/
http://secunia.com/Linux_Security_Specialist/
----------------------------------------------------------------------
TITLE:
Linksys Products Information Disclosure Security Issue
SECUNIA ADVISORY ID:
SA24658
VERIFY ADVISORY:
http://secunia.com/advisories/24658/
CRITICAL:
Moderately critical
IMPACT:
Exposure of system information, Exposure of sensitive information
WHERE:
>From local network
OPERATING SYSTEM:
Linksys WAG200G
http://secunia.com/product/13810/
Linksys WRT54GC
http://secunia.com/product/13808/
DESCRIPTION:
A security issue has been reported in various Linksys products, which
can be exploited to disclose certain sensitive information. the product model, the web interface password, the PPPoA
username, the PPPoA password, the SSID, and the WPA passphrase by
sending a UDP packet to port 916 of the device.
The security issue is reported in WAG200G with firmware 1.01.03 and
earlier, WRT54GC v1 with firmware 1.03.0 and earlier, and WRT54GC v2
with firmware 1.00.7 and earlier.
PROVIDED AND/OR DISCOVERED BY:
Daniel Niggebrugge, additional information by Bartomiej Ochman
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200703-0462 | CVE-2007-1557 | F-Secure Anti-Virus Client Security Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Format string vulnerability in F-Secure Anti-Virus Client Security 6.02 allows local users to cause a denial of service and possibly gain privileges via format string specifiers in the Management Server name field on the Communication settings page. F-Secure Anti-Virus Client Security is prone to a format-string vulnerability because it fails to properly sanitize user-supplied input before using it in the format-specifier argument to a formatted-printing function.
Successfully exploiting this vulnerability may allow an attacker to access sensitive process memory or to crash the application. Code execution may potentially be possible, but this has not been confirmed. F-Secure Anti-Virus Client Security is a real-time virus monitoring and protection system on the PC platform, supporting all WINDOWS systems
| VAR-200703-0606 | CVE-2007-1467 | plural Cisco Product PreSearch.html Cross-site scripting vulnerability |
CVSS V2: 3.5 CVSS V3: - Severity: LOW |
Multiple cross-site scripting (XSS) vulnerabilities in (1) PreSearch.html and (2) PreSearch.class in Cisco Secure Access Control Server (ACS), VPN Client, Unified Personal Communicator, MeetingPlace, Unified MeetingPlace, Unified MeetingPlace Express, CallManager, IP Communicator, Unified Video Advantage, Unified Videoconferencing 35xx products, Unified Videoconferencing Manager, WAN Manager, Security Device Manager, Network Analysis Module (NAM), CiscoWorks and related products, Wireless LAN Solution Engine (WLSE), 2006 Wireless LAN Controllers (WLC), and Wireless Control System (WCS) allow remote attackers to inject arbitrary web script or HTML via the text field of the search form. Multiple Cisco products are prone to a cross-site scripting vulnerability because they fail to properly sanitize user-supplied input.
An attacker may leverage this issue by enticing a victim into following a maliciously crafted URI.
Attackers may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco IDs: CSCsh91761, CSCsh52300, CSCsh91884, CSCsi12435, CSCsh91901, CSCsi10405, CSCsh91953, CSCsh93070, CSCsh93854, CSCek71039, CSCsh95009, CSCsi10818, CSCsi10674, CSCsi10982, CSCsi13743, CSCsi13763. A remote attacker can inject arbitrary web script or HTML with the help of a text field in search format.
Input passed to the search code of PreSearch.html or PreSearch.class
(depending on software or device) is not properly sanitised before
being returned to the user.
SOLUTION:
If possible, the vendor recommends deleting or renaming the
PreSearch.html and PreSearch.class files.
PROVIDED AND/OR DISCOVERED BY:
Independently discovered by Erwin Paternotte from Fox-IT and Cassio
Goldschmidt.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sr-20070315-xss.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200703-0615 | CVE-2007-1476 | Symantec Norton Personal Firewall Such as SYMTDI.SYS Service disruption in (DoS) Vulnerabilities |
CVSS V2: 1.9 CVSS V3: - Severity: LOW |
The SymTDI device driver (SYMTDI.SYS) in Symantec Norton Personal Firewall 2006 9.1.1.7 and earlier, Internet Security 2005 and 2006, AntiVirus Corporate Edition 3.0.x through 10.1.x, and other Norton products, allows local users to cause a denial of service (system crash) by sending crafted data to the driver's \Device file, which triggers invalid memory access, a different vulnerability than CVE-2006-4855. Symantec 'SYMTDI.SYS' device driver is prone to a local denial-of-service vulnerability.
A local authenticated attacker may exploit this issue to crash affected computers, denying service to legitimate users.
This issue is similar to the one described in BID 22961. Symantec is currently investigating this issue; we will update this BID as more information emerges. Norton Personal Firewall does not adequately protect its \Device\SymEvent driver and does not validate input buffers, so a local attacker can open the driver and send arbitrary data that is considered valid. A specially crafted IRP sent to an IOCTL handler function could allow memory to be overwritten because the address space was not properly validated in some versions of the driver. A potential attacker must be logged into the computer to attempt an exploit. A successful exploit of this vulnerability could potentially allow that user to crash their computer.
Symantec Response
Symantec engineers have verified that the vulnerability exists in the products listed in the Affected Products section above, and have provided updates for all affected products. Consumer (Norton) products can be updated by running LiveUpdate. Symantec AntiVirus Corporate Edition customers can obtain the update from the Symantec web site.
Symantec is not aware of any customers impacted by this issue, or of any attempts to exploit the issue.
References
This issue is a candidate for inclusion in the Common Vulnerabilities and Exposures (CVE) list (http://cve.mitre.org), which standardizes names for security problems. The CVE initiative has assigned CVE-2007-1476 to this issue.
SecurityFocus has assigned BID 22977 to this vulnerability.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Symantec Product Security
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.6 (Build 6060)
iQEVAwUBRuVg1/9Lqygkbb6BAQiy8gf/aQDO+uftL8+Ia+FLbnOuuEUzfR/LWBHn
SFSBw8hk38Gq4DAGMYeBI2Am74cUxjWQ5e3NqG4sQgHD2bfjTkrcPdMabiL8JaM9
j8TaCNBxgyClAcfI79dFinbgBTg4tNMfLbcLeg31gKV64WhQ962cfiZhbURXseS9
gdQMhVEDyyalFvpFFhtWkY+XigLMFeEMeMdjC77nw4jedwgQBS0FV4IAnGn8diHN
2yEHef2I4/pUj8JxHSV2DY5FudWaAc3TbdesBi5jVA/aXg2DOwHGrq05QRG1/qbp
/45TREnS+hw0w3xyGs1JbZH0vlqiWoWjwKkv+xrL46bJ7laCTVON3Q==
=Cd3j
-----END PGP SIGNATURE-----
| VAR-200703-0571 | CVE-2007-1441 | RIM BlackBerry 8100 Running on 4thPass Denial of service in browsers (DoS) Vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The 4thPass browser (BlackBerry Browser) on the RIM BlackBerry 8100 (Pearl) before 4.2.1 allows remote attackers to cause a denial of service (temporary functionality loss) via a long href attribute in a link in a WML page. Blackberry 8100 is prone to a denial-of-service vulnerability
| VAR-200703-0122 | CVE-2007-1278 | Adobe JRun and ColdFusion MX of IIS Service disruption in connectors (DoS) Vulnerabilities |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in the IIS connector in Adobe JRun 4.0 Updater 6, and ColdFusion MX 6.1 and 7.0 Enterprise, when using Microsoft IIS 6, allows remote attackers to cause a denial of service via unspecified vectors, involving the request of a file in the JRun web root. Adobe JRun and ColdFusion MX of IIS Connector has a service disruption (DoS) There is a vulnerability that becomes a condition.Service disruption by a third party (DoS) There is a possibility of being put into a state. Adobe JRun is prone to a denial-of-service vulnerability because the application fails to handle exceptional conditions.
An attacker can exploit this issue to crash the affected application, denying service to legitimate users.
This issue affects Microsoft IIS 6 installations running JRun 4 Updater 6.
----------------------------------------------------------------------
Want a new job?
http://secunia.com/secunia_vacancies/
Secunia is looking for new researchers with a reversing background
and experience in writing exploit code:
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
http://secunia.com/Disassembling_og_Reversing/
----------------------------------------------------------------------
TITLE:
Adobe JRun IIS 6 Connector Denial of Service
SECUNIA ADVISORY ID:
SA24488
VERIFY ADVISORY:
http://secunia.com/advisories/24488/
CRITICAL:
Moderately critical
IMPACT:
DoS
WHERE:
>From remote
SOFTWARE:
Adobe ColdFusion MX 7.x
http://secunia.com/product/4984/
Macromedia ColdFusion MX 6.x
http://secunia.com/product/864/
Macromedia Jrun 4.x
http://secunia.com/product/863/
DESCRIPTION:
A vulnerability has been reported in Adobe JRun, which potentially
can be exploited by malicious people to cause a DoS (Denial of
Service).
The vulnerability is caused due to an error within JRun\x92s IIS
connector when handling certain requests for resources. This can be
exploited via e.g. requesting a file within the web root and then
performing certain actions.
The vulnerability is reported in the following products with IIS 6:
* JRun 4 Updater 6
* Adobe ColdFusion MX 7.0 Enterprise Edition, if installed as the
"Multi-Server" option
* Adobe ColdFusion MX 6.1 Enterprise, if installed with the "J2EE"
option and deployed on JRun 4.0 Updater 6
Adobe ColdFusion MX 6.1 and 7.0 Standard editions are not affected by
this issue.
SOLUTION:
Apply hotfix (see the vendor's advisory for details).
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Shoji Kamiichi, NEC.
ORIGINAL ADVISORY:
Adobe:
http://www.adobe.com/support/security/bulletins/apsb07-07.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200703-0565 | CVE-2007-1435 | D-Link TFTP Server Vulnerable to buffer overflow |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Buffer overflow in D-Link TFTP Server 1.0 allows remote attackers to cause a denial of service (crash) via a long (1) GET or (2) PUT request, which triggers memory corruption. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. D-Link TFTP Server is a TFTP service program built into D-Link wireless AP. D-Link TFTP Server has a vulnerability in processing malformed TFTP access requests, and remote attackers may use this vulnerability to control the server. Test code: http://www.securityfocus.com/data/vulnerabilities/exploits/22923.rb Patching plan: The vendor has not released upgrade patches for the time being, please pay attention to the vendor address in time: http://www.dlink.com. D-Link TFTP is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before storing it in a finite-sized buffer. Given the nature of this issue, the attacker may presumably be able to execute code.
D-Link TFTP 1.0 is vulnerable; other versions may also be affected.
----------------------------------------------------------------------
Want a new job?
http://secunia.com/secunia_vacancies/
Secunia is looking for new researchers with a reversing background
and experience in writing exploit code:
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
http://secunia.com/Disassembling_og_Reversing/
----------------------------------------------------------------------
TITLE:
D-Link TFTP Server Data Handling Memory Corruption
SECUNIA ADVISORY ID:
SA24360
VERIFY ADVISORY:
http://secunia.com/advisories/24360/
CRITICAL:
Moderately critical
IMPACT:
System access
WHERE:
>From local network
SOFTWARE:
D-Link TFTP Server 1.x
http://secunia.com/product/13596/
DESCRIPTION:
Parvez Anwar has discovered a vulnerability in D-Link TFTP Server,
which can be exploited by malicious people to compromise a vulnerable
system.
The vulnerability is caused due to an error within the handling of
received data. This can be exploited to corrupt certain structures in
memory via an overly long (greater than 300 bytes), specially crafted
GET or PUT request.
The vulnerability is confirmed in version 1.0.
SOLUTION:
Use in a trusted network environment only.
PROVIDED AND/OR DISCOVERED BY:
Parvez Anwar
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200703-0303 | CVE-2007-1637 | Ipswitch IMail Server of IMAILAPILib ActiveX Control buffer overflow vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control. A buffer overflow vulnerability exists in the IMAILAPILib ActiveX control (IMailAPI.dll) of Ipswitch IMail Server versions prior to 2006.2.
----------------------------------------------------------------------
Want a new job?
http://secunia.com/secunia_vacancies/
Secunia is looking for new researchers with a reversing background
and experience in writing exploit code:
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
http://secunia.com/Disassembling_og_Reversing/
----------------------------------------------------------------------
TITLE:
Ipswitch IMail Server/Collaboration Suite Multiple Buffer Overflows
SECUNIA ADVISORY ID:
SA24422
VERIFY ADVISORY:
http://secunia.com/advisories/24422/
CRITICAL:
Highly critical
IMPACT:
System access
WHERE:
>From remote
SOFTWARE:
Ipswitch Collaboration Suite 2006
http://secunia.com/product/8652/
IMail Server 2006
http://secunia.com/product/8653/
DESCRIPTION:
Some vulnerabilities have been reported in Ipswitch IMail
Server/Collaboration Suite, which potentially can be exploited by
malicious people to compromise a vulnerable system.
1) Unspecified errors within the IMailServer.WebConnect,
IMailLDAPService.Sync3, IMailLDAPService.Init3, IMailServer.Connect,
and IMailUserCollection.SetReplyTo components can be exploited to
cause buffer overflows via specially crafted packets.
2) An error within an unspecified ActiveX control can be exploited to
execute arbitrary code when a user e.g. visits a malicious web site.
SOLUTION:
Update to version 2006.2 (Standard Edition only):
ftp://ftp.ipswitch.com/Ipswitch/Product_Downloads/ICS_Standard.exe
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
Ipswitch:
http://www.ipswitch.com/support/ics/updates/ics20062.asp
http://support.ipswitch.com/kb/IM-20070305-JH01.htm
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200703-0045 | CVE-2007-1338 | Apple AirPort Extreme of AirPort Vulnerability that bypasses access restrictions in utility default settings |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
The default configuration of the AirPort utility in Apple AirPort Extreme creates an IPv6 tunnel but does not enable the "Block incoming IPv6 connections" setting, which might allow remote attackers to bypass intended access restrictions by establishing IPv6 sessions that would have been rejected over IPv4. Airport Extreme is prone to a security bypass vulnerability.
----------------------------------------------------------------------
Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
http://corporate.secunia.com/trial/38/request/
----------------------------------------------------------------------
TITLE:
Apple AirPort Extreme Base Station Two Weaknesses
SECUNIA ADVISORY ID:
SA24830
VERIFY ADVISORY:
http://secunia.com/advisories/24830/
CRITICAL:
Less critical
IMPACT:
Security Bypass, Exposure of system information, Exposure of
sensitive information
WHERE:
>From remote
OPERATING SYSTEM:
Apple Airport Extreme
http://secunia.com/product/4504/
DESCRIPTION:
Two weaknesses have been reported in Apple AirPort Extreme Base
Station, which can be exploited by malicious people to bypass certain
security restrictions or to disclose certain sensitive information.
2) An unspecified error in the AirPort Disk Feature of AirPort
Extreme Base Stations with 802.11n can be exploited to disclose
filenames on password-protected disks.
Successful exploitation of weakness #2 requires access to the local
network.
SOLUTION:
Update to firmware version 7.1.
http://www.apple.com/support/downloads/airportextremebasestationwith80211nfirmware71.html
PROVIDED AND/OR DISCOVERED BY:
1) Iljitsch van Beijnum
2) Reported by the vendor
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=305366
1) http://arstechnica.com/journals/apple.ars/2007/2/14/7063
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200703-0036 | CVE-2007-1324 | SnapGear Service disruption in (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613. SnapGear is prone to a denial-of-service vulnerability because the device fails to handle exceptional conditions.
An attacker can exploit this issue to cause the affected device to stop processing packets, denying service to legitimate users.
This issue affects the 560, 585, 580, 640, 710, and 720 models. This vulnerability is different from CVE-2006-4613.
----------------------------------------------------------------------
Want a new job?
http://secunia.com/secunia_vacancies/
Secunia is looking for new researchers with a reversing background
and experience in writing exploit code:
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
http://secunia.com/Disassembling_og_Reversing/
----------------------------------------------------------------------
TITLE:
SnapGear Packet Handling Denial of Service
SECUNIA ADVISORY ID:
SA24388
VERIFY ADVISORY:
http://secunia.com/advisories/24388/
CRITICAL:
Less critical
IMPACT:
DoS
WHERE:
>From remote
OPERATING SYSTEM:
SnapGear 3.x
http://secunia.com/product/11807/
DESCRIPTION:
A vulnerability has been reported in SnapGear, which can be exploited
by malicious people to cause a DoS (Denial of Service).
An unspecified error can be exploited to cause all packets to be
dropped when the device is under a packet flood.
SOLUTION:
Update to firmware version 3.1.4u5.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cyberguard.info/snapgear/releases.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200703-0031 | CVE-2007-1307 | IBM Lenovo ThinkPad Used on the system Lenovo Intel PRO/1000 LAN Vulnerability in adapter |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in Lenovo Intel PRO/1000 LAN adapter before Build 135400, as used on IBM Lenovo ThinkPad systems, has unknown impact and attack vectors.
Currently, very little is known about this issue. This BID will be updated as more information becomes available.
Versions prior to build 135400 are vulnerable.
SOLUTION:
Update to build 135400.
http://www-307.ibm.com/pc/support/site.wss/license.do?filename=mobiles/7ira09ww.exe
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
Lenovo:
http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-62922
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200703-0025 | CVE-2007-0724 | Apple Mac OS X DirectoryService may allow arbitrary users to change the root password |
CVSS V2: 6.9 CVSS V3: - Severity: MEDIUM |
The IOKit HID interface in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 does not sufficiently limit access to certain controls, which allows local users to gain privileges by using HID device events to read keystrokes from the console. A vulnerabilty in the Apple Mac OS X DirectoryService may allow unprivileged users to change the root password. Apple ColorSync contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code. A vulnerability exists in the version of the telnet daemon included with the MIT Kerberos 5 distribution that may allow a remote, unauthorized attacker to log on to the system with elevated privileges. According to Apple information, keystrokes can be captured and potentially sensitive information such as passwords can be read. Mac OS X is prone to multiple vulnerabilities including stack-based buffer-overflow issues, denial-of-service vulnerabilities, two memory-corruption issues, an integer-overflow issue, two authentication-bypass issues, an information-disclosure vulnerability, and an insecure command-execution issue.
An attacker can exploit these issues to execute arbitrary code in the context of the user running the application, cause denial-of-service conditions, compromise the application, and access or modify data.
Few details regarding these issues are currently available. Separate BIDs for each issue will be created as new information becomes available.
Mac OS X and Mac OS X Server versions 10.3.9 and 10.4 through 10.4.8 are vulnerable.
----------------------------------------------------------------------
Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
http://corporate.secunia.com/trial/38/request/
----------------------------------------------------------------------
TITLE:
rPath updates for krb5
SECUNIA ADVISORY ID:
SA24757
VERIFY ADVISORY:
http://secunia.com/advisories/24757/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass, DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
rPath Linux 1.x
http://secunia.com/product/10614/
DESCRIPTION:
rPath has issued updates for krb5 packages. These fix some
vulnerabilities, which can be exploited by malicious users to cause a
DoS (Denial of Service) or compromise a vulnerable system and by
malicious people to bypass certain security restrictions.
For more information:
SA24740
SOLUTION:
Update to the latest versions:
krb5=/conary.rpath.com@rpl:devel//1/1.4.1-7.6-1
krb5-server=/conary.rpath.com@rpl:devel//1/1.4.1-7.6-1
krb5-services=/conary.rpath.com@rpl:devel//1/1.4.1-7.6-1
krb5-test=/conary.rpath.com@rpl:devel//1/1.4.1-7.6-1
krb5-workstation=/conary.rpath.com@rpl:devel//1/1.4.1-7.6-1
ORIGINAL ADVISORY:
http://lists.rpath.com/pipermail/security-announce/2007-April/000167.html
OTHER REFERENCES:
SA24740:
http://secunia.com/advisories/24740/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200703-0018 | CVE-2007-0717 | Apple QuickTime 3GP integer overflow |
CVSS V2: 5.8 CVSS V3: - Severity: MEDIUM |
Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QTIF file. The Apple QuickTime player contains a heap buffer overflow vulnerability. This vulnerability may allow an attacker to execute arbitrary code or create a denial-of-service condition. Apple QuickTime is prone to multiple unspecified remote code-execution vulnerabilities including mulitple heap and stack-based buffer-overflow and integer-overflow issues.
These issues arise when the application handles specially crafted 3GP, MIDI, MOV, PICT, and QTIF files. Successful attacks can result in the compromise of the applicaiton or can cause denial-of-service conditions.
Few details regarding these issues are currently available. Separate BIDs for each issue will be created as new information becomes available.
QuickTime versions prior to 7.1.5 are vulnerable. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. There are multiple buffer overflow vulnerabilities in QuickTime's processing of various media formats. Remote attackers may exploit these vulnerabilities to control the user's machine by enticing the user to open and process malformed media files. There was an integer overflow in QuickTime's handling of QTIF files. (CVE-2007-0717)