SecurityFocus News
SecurityFocus Newsletter #507 Jul 14 2009 11:20PM
sfa securityfocus com
SecurityFocus Newsletter #507
----------------------------------------

This issue is sponsored by Ironkey

INTRODUCING THE WORLD'S ONLY FIPS 140-2 LEVEL 3 VALIDATED USB FLASH DRIVE

Designed to meet the needs of military, government and demanding enterprise users, the IronKey. S200 series USB flash drives have passed the stringent Security Level 3 tests for the FIPS 140-2 standard. A rugged, tamper-resistant and tamper-evident enclosure protects the critical components, while strong AES 256-bit hardware encryption and active malware defenses safeguard even the most sensitive data. Enterprise-class central management capabilities also make it easy to enforce security policies on fleets of drives and even remotely destroy drives in the field.

Learn more at https://www.ironkey.com/S200_Launch

------------------------------------------------------------------
I. FRONT AND CENTER
1. Hacker-Tool Law Still Does Little
2. A Botnet by Any Other Name
II. BUGTRAQ SUMMARY
1. Oracle Database CVE-2009-0987 Remote Upgrade Vulnerability
2. Oracle Secure Backup CVE-2009-1977 Remote Oracle Secure Backup Vulnerability
3. Irssi 'WALLOPS' Message Off By One Heap Memory Corruption Vulnerability
4. Adobe Reader and Acrobat Unspecified Memory Corruption Vulnerability
5. Adobe Reader 'getAnnots()' JavaScript Function Remote Code Execution Vulnerability
6. Joomla! 'com_category' Component SQL Injection Vulnerability
7. RunCMS 'upload.php' Arbitrary File Upload Vulnerability
8. FreeBSD ATA Device Local Denial of Service Vulnerability
9. Linux Kernel 'PER_CLEAR_ON_SETID' Incomplete Personality List Access Validation Vulnerability
10. Joomla! and Mambo gigCalendar Component 'venuedetails.php' SQL Injection Vulnerability
11. Multiple Browser Malicious Proxy HTTPS Man In The Middle Vulnerability
12. Mozilla Firefox/Thunderbird/SeaMonkey Null Owner Document Arbitrary Code Execution Vulnerability
13. Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2009 -07 -08 -09 and -11 Multiple Remote Vulnerabilities
14. Mozilla Firefox and SeaMonkey JavaScript Chrome Privilege Escalation Vulnerability
15. Mozilla Firefox/Thunderbird/SeaMonkey Double Frame Construction Memory Corruption Vulnerability
16. Mozilla Firefox/Thunderbird/SeaMonkey Multiple Browser Engine Memory Corruption Vulnerabilities
17. Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2009 -01 to -06 Multiple Remote Vulnerabilities
18. Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2009 -14 through -22 Multiple Remote Vulnerabilities
19. phpScheduleIt 'reserve.php' Remote Code Execution Vulnerability
20. Mozilla Firefox International Domain Name Subdomain URI Spoofing Vulnerability
21. eEye Retina WiFi Scanner '.rws' File Buffer Overflow Vulnerability
22. WebKit SVGList Objects Remote Memory Corruption Vulnerability
23. Computer Associates BrightStor ARCserve Backup UniversalAgent Remote Buffer Overflow Vulnerability
24. Apache 'mod_proxy_ajp' Information Disclosure Vulnerability
25. Mumbles Firefox Plugin Remote Arbitrary Shell Command Injection Vulnerability
26. strongSwan Crafted X.509 Certificate Multiple Remote Denial Of Service Vulnerabilities
27. Oracle WebLogic Server CVE-2009-1974 Remote Vulnerability
28. Oracle Config Management CVE-2009-1966 Unspecified Security Vulnerability
29. Oracle Weblogic Server CVE-2009-1975 Remote Vulnerability
30. ISC DHCP 'dhcpd -t' Command Insecure Temporary File Creation Vulnerability
31. ISC DHCP 'dhclient' 'script_write_params()' Stack Buffer Overflow Vulnerability
32. Apache 'mod_proxy' Remote Denial Of Service Vulnerability
33. Apache 'Options' and 'AllowOverride' Directives Security Bypass Vulnerability
34. Apache 'mod_deflate' Remote Denial Of Service Vulnerability
35. Linux Kernel NFS 'MAY_EXEC' Security Bypass Vulnerability
36. Linux Kernel 'e1000/e1000_main.c' Remote Denial of Service Vulnerability
37. Linux Kernel CIFS 'decode_unicode_ssetup()' Remote Buffer Overflow Vulnerability
38. Linux Kernel 'splice(2)' Double Lock Local Denial of Service Vulnerability
39. Linux Kernel RTL8169 NIC Remote Denial of Service Vulnerability
40. Mozilla Firefox 3.5 'Tracemonkey' Component Remote Code Execution Vulnerability
41. ISC DHCP Server Host Definition Remote Denial Of Service Vulnerability
42. Oracle July 2009 Critical Patch Update Multiple Vulnerabilities
43. Microsoft DirectX DirectShow Length Record Remote Code Execution Vulnerability
44. Sun Java Runtime Environment and Java Development Kit Multiple Security Vulnerabilities
45. Microsoft Virtual PC and Virtual Server Privilege Escalation Vulnerability
46. Microsoft ISA Server Radius OTP Authentication Bypass Vulnerability
47. Microsoft Windows Embedded OpenType Font Engine Integer Overflow Vulnerability
48. Microsoft Windows Embedded OpenType Font Engine Heap Overflow Vulnerability
49. Microsoft Windows 'MPEG2TuneRequest' ActiveX Control Remote Code Execution Vulnerability
50. Microsoft DirectX DirectShow Pointer Validation Remote Code Execution Vulnerability
51. Microsoft Publisher Object Handler Data Pointer Dereference Remote Code Execution Vulnerability
52. Microsoft DirectX DirectShow QuickTime Video Remote Code Execution Vulnerability
53. Hitachi Web Server Client SSL Certificate Handling Unspecified Vulnerability
54. Hitachi Web Server Reverse Proxy Remote Denial of Service Vulnerability
55. Sun Fire V215 Servers Remote Denial Of Service Vulnerability
56. Novell eDirectory Multiple Vulnerabilities
57. Microsoft Office Web Components ActiveX Control 'msDataSourceObject' Code Execution Vulnerability
58. Wyse Thin Client 'hagent.exe' Unspecified Buffer Overflow Vulnerability
59. Wyse Device Manager Unspecified Remote Buffer Overflow Vulnerability
60. djbdns Long Response Packet Remote Cache Poisoning Vulnerability
61. Horde 'Passwd' Module Cross Site Scripting Vulnerability
62. Openswan IPsec Livetest Insecure Temporary File Creation Vulnerability
63. Oracle Config Management CVE-2009-1967 Remote Unspecified Vulnerability
64. Oracle Database CVE-2009-1973 Remote Virtual Private Database Vulnerability
65. Oracle E-Business Suite CVE-2009-1980 Remote Vulnerability
66. Oracle Advanced Replication CVE-2009-1021 Remote Unspecified Vulnerability
67. Oracle Database CVE-2009-1970 Remote Listener Vulnerability
68. Oracle Database CVE-2009-1015 Remote Core RDBMS Vulnerability
69. Oracle Database CVE-2009-1968 Remote Secure Enterprise Search Vulnerability
70. Oracle Database CVE-2009-1019 Remote Network Authentication Vulnerability
71. Oracle Secure Backup CVE-2009-1978 Remote Oracle Secure Backup Vulnerability
72. Oracle Database CVE-2009-1963 Remote Network Foundation
73. Oracle Complex Event Processing CVE-2009-1523 Remote Vulnerability
74. IETF and W3C XML Digital Signature Specification HMAC Truncation Authentication Bypass Vulnerability
75. Icarus '.icp' File Remote Stack Buffer Overflow Vulnerability
76. Git Parameter Processing Remote Denial Of Service Vulnerability
77. Adobe Reader and Acrobat JBIG Segments 'Text Region' Memory Corruption Vulnerability
78. Adobe Reader and Acrobat FlateDecode Filter Integer Overflow Vulnerability
79. Adobe Reader and Acrobat JBIG 'Pattern Dictionary' Remote Heap Buffer Overflow Vulnerability
80. Adobe Reader and Acrobat JBIG 'Halftone Region' Remote Heap Buffer Overflow Vulnerability
81. Adobe Reader and Acrobat TrueType Font Handling Memory Corruption Vulnerability
82. Adobe Reader and Acrobat JBIG Halftone Region Grid Area Remote Heap Buffer Overflow Vulnerability
83. Adobe Reader and Acrobat Huffman-encoded JBIG2 Text Heap Overflow Vulnerability
84. Adobe Reader and Acrobat JBIG2 Filter Unspecified Memory Corruption Vulnerability
85. LibTIFF 'LZWDecodeCompat()' Remote Buffer Underflow Vulnerability
86. Novell NetIdentity Agent 'XTIERRPCPIPE' Remote Code Execution Vulnerability
87. LibTIFF Multiple Remote Integer Overflow Vulnerabilities
88. Microsoft Windows Print Spooler Local Information Disclosure Vulnerability
89. HP ProCurve Threat Management Services zl Module VPN Remote Denial of Service Vulnerability
90. HP ProCurve Threat Management Services zl Module CRL Security Bypass Vulnerability
91. HP ProCurve Threat Management Services zl Module 'httpd' Denial of Service Vulnerability
92. CamlImages PNG Image Parsing Multiple Integer Overflow Vulnerabilities
93. HP ProCurve Threat Management Services zl Module DNS Remote Denial of Service Vulnerability
94. Adobe Reader 'spell.customDictionaryOpen()' JavaScript Function Remote Code Execution Vulnerability
95. Adobe Reader & Acrobat JBIG Pattern Dictionary Allocation Remote Heap Buffer Overflow Vulnerability
96. D-Bus 'dbus_signature_validate()' Type Signature Denial of Service Vulnerability
97. Adobe Reader and Acrobat U3D Model Remote Stack Buffer Overflow Vulnerability
98. Adobe Reader and Acrobat Multiple Unspecified Remote Heap Buffer Overflow Vulnerabilities
99. Adobe Reader and Acrobat JBIG 'Halftone Region' Remote Heap Buffer Overflow Vulnerability
100. Adobe Reader and Acrobat 9.1.1 and Prior Multiple Remote Vulnerabilities
III. SECURITYFOCUS NEWS
1. Web attacks hit U.S., South Korean sites
2. FTC persuades court to shutter rogue ISP
3. Obama launches cybersecurity initiative
4. Browsers bashed first in hacking contest
IV. SECURITY JOBS LIST SUMMARY
V. INCIDENTS LIST SUMMARY
VI. VULN-DEV RESEARCH LIST SUMMARY
VII. MICROSOFT FOCUS LIST SUMMARY
VIII. SUN FOCUS LIST SUMMARY
IX. LINUX FOCUS LIST SUMMARY
X. UNSUBSCRIBE INSTRUCTIONS
XI. SPONSOR INFORMATION

I. FRONT AND CENTER
---------------------
1. Hacker-Tool Law Still Does Little
By Mark Rasch
On August 10, 2007, a new section of the German Penal code went into effect. The statute, intended to implement certain provisions of the Council of Europe Treaty on Cybercrime, could be interpreted to make the creation or distribution of computer security software a criminal offense.
http://www.securityfocus.com/columnists/502

2. A Botnet by Any Other Name
By Gubter Ollmann
The news has been awash the last few weeks with fears over globe-spanning botnets and their criminal intent: Conficker managed to hog the limelight for well over a month, and then came Finjan's disclosure of a previously unknown - and currently unnamed - botnet consisting of some 1.9 million malicious agents.
http://www.securityfocus.com/columnists/501

II. BUGTRAQ SUMMARY
--------------------
1. Oracle Database CVE-2009-0987 Remote Upgrade Vulnerability
BugTraq ID: 35679
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35679
Summary:
Oracle Database is prone to a remote vulnerability affecting the 'Upgrade' component.

An attacker with 'Create Session' privileges can exploit the vulnerability over the 'Oracle Net' protocol.

The following are vulnerable:

Oracle Oracle9i 9.2.0.8 and 9.2.0.8DV
Oracle Oracle10g 10.1.0.5 and 10.2.0.3

Other versions may also be affected.

2. Oracle Secure Backup CVE-2009-1977 Remote Oracle Secure Backup Vulnerability
BugTraq ID: 35672
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35672
Summary:
Oracle Secure Backup is prone to a remote vulnerability that can be exploited over the 'HTTP' protocol. An attacker doesn't require privileges to exploit this vulnerability.

This vulnerability affects versions prior to Oracle Secure Backup 10.2.0.3.

3. Irssi 'WALLOPS' Message Off By One Heap Memory Corruption Vulnerability
BugTraq ID: 35399
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35399
Summary:
Irssi is prone to an off-by-one, heap-based, memory-corruption vulnerability because it fails to properly bounds-check user-supplied data before copying it into a memory buffer.

Attackers can exploit this issue to crash the vulnerable client, resulting in a denial-of-service condition. Given the nature of this issue, attackers may also be able to run arbitrary code within the context of the vulnerable application, but this has not been confirmed.

Iirssi 0.8.13 is vulnerable; other versions may also be affected.

4. Adobe Reader and Acrobat Unspecified Memory Corruption Vulnerability
BugTraq ID: 35289
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35289
Summary:
Adobe Reader and Acrobat are prone to an unspecified memory-corruption vulnerability.

Exploiting this issue will allow remote attackers to execute arbitrary code within the context of the affected application or crash the application.

NOTE: This issue was previously covered in BID 35274 (Adobe Reader and Acrobat 9.1.1 and Prior Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.

5. Adobe Reader 'getAnnots()' JavaScript Function Remote Code Execution Vulnerability
BugTraq ID: 34736
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/34736
Summary:
Adobe Reader is prone to a remote code-execution vulnerability.

An attacker can exploit this issue to execute arbitrary code with the privileges of the user running the application or crash the application, denying service to legitimate users.

Reader 8.1.4 and 9.1 for Linux are vulnerable; other versions or platforms may also be affected.

UPDATE (April 28, 2009): The vendor is investigating this issue. We will update this BID as more information emerges.

UPDATE (May 1, 2009): The vendor indicates that fixes will be available by May 12, 2009. Please see the referenced advisory for more information.

UPDATE (May 18, 2009): The vendor indicates that fixes for Adobe Reader 7 for Apple Mac OS X will be available by the end of June, 2009. Please see the updated advisory for more information.

6. Joomla! 'com_category' Component SQL Injection Vulnerability
BugTraq ID: 35638
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35638
Summary:
The 'com_category' component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

7. RunCMS 'upload.php' Arbitrary File Upload Vulnerability
BugTraq ID: 35646
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35646
Summary:
RunCMS is prone to a vulnerability that lets attackers upload arbitrary files. The issue occurs because the application fails to adequately validate user-supplied input.

An attacker can exploit this vulnerability to upload arbitrary code and execute it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

RunCMS 1.6.3 is vulnerable; other versions may also be affected.

8. FreeBSD ATA Device Local Denial of Service Vulnerability
BugTraq ID: 35645
Remote: No
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35645
Summary:
FreeBSD is prone to a local denial-of-service vulnerability when the kernel handles a specially crafted IOCTL request to an ATA device.

Exploiting this issue allows attackers with local, interactive access to affected computers to trigger kernel panics, which will deny further service to legitimate users.

9. Linux Kernel 'PER_CLEAR_ON_SETID' Incomplete Personality List Access Validation Vulnerability
BugTraq ID: 35647
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35647
Summary:
The Linux Kernel is prone to an unauthorized-access vulnerability because of an error in the definition of the 'PER_CLEAR_ON_SETID' personalities mask. These masks are defined in the 'include/linux/personality.h' source file.

An attacker can exploit this issue to perform privileged operations on a vulnerable computer, which may aid in further attacks.

10. Joomla! and Mambo gigCalendar Component 'venuedetails.php' SQL Injection Vulnerability
BugTraq ID: 33863
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/33863
Summary:
The gigCalendar component for Joomla! and Mambo is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

gigCalendar 1.0 is vulnerable; other versions may also be affected.

11. Multiple Browser Malicious Proxy HTTPS Man In The Middle Vulnerability
BugTraq ID: 35380
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35380
Summary:
Multiple web browsers are prone to a man-in-the-middle vulnerability.

Attacker-supplied HTML and script code would run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how sites are rendered to the user. Other attacks are also possible.

NOTE: This issue was previously covered in BID 35326 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2009-24 through -32 Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.

UPDATE (June 17, 2009): This BID had been updated to reflect that the issue affects multiple browsers, not just Mozilla products.

12. Mozilla Firefox/Thunderbird/SeaMonkey Null Owner Document Arbitrary Code Execution Vulnerability
BugTraq ID: 35383
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35383
Summary:
Mozilla Firefox, Thunderbird, and SeaMonkey are prone to a remote code-execution vulnerability.

Attackers can exploit this issue to execute arbitrary JavaScript code with chrome privileges. This may result in elevated privileges or lead to a denial-of-service condition. Other attacks may also be possible.

NOTE: This issue was previously covered in BID 35326 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2009-24 through -32 Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.

13. Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2009 -07 -08 -09 and -11 Multiple Remote Vulnerabilities
BugTraq ID: 33990
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/33990
Summary:
The Mozilla Foundation has released multiple security advisories specifying various vulnerabilities in Firefox, Thunderbird, and SeaMonkey.

Attackers can exploit these issues to bypass same-origin restrictions, obtain potentially sensitive information, and execute arbitrary script code with elevated privileges; other attacks are also possible.

14. Mozilla Firefox and SeaMonkey JavaScript Chrome Privilege Escalation Vulnerability
BugTraq ID: 35373
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35373
Summary:
Mozilla Firefox and SeaMonkey are prone to a privilege-escalation vulnerability in the browser's sidebar and FeedWriter.

Attackers can exploit this issue to execute arbitrary code with the object's chrome privileges.

NOTE: This issue was previously covered in BID 35326 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2009-24 through -32 Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.

15. Mozilla Firefox/Thunderbird/SeaMonkey Double Frame Construction Memory Corruption Vulnerability
BugTraq ID: 35371
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35371
Summary:
Mozilla Firefox, Thunderbird, and SeaMonkey are prone to a remote memory-corruption vulnerability.

An attacker can exploit these issues to corrupt memory on the affected computer and run arbitrary code in the context of the user running the affected application. Failed exploit attempts will cause denial-of-service conditions.

NOTE: This issue was previously covered in BID 35326 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2009-24 through -32 Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.

16. Mozilla Firefox/Thunderbird/SeaMonkey Multiple Browser Engine Memory Corruption Vulnerabilities
BugTraq ID: 35370
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35370
Summary:
Mozilla Firefox, Thunderbird, and SeaMonkey are prone to multiple remote memory-corruption vulnerabilities.

An attacker can exploit these issues to corrupt memory on the affected computer and run arbitrary code in the context of the user running the affected application. Failed exploit attempts will cause denial-of-service conditions.

NOTE: In some cases, arbitrary code execution may not be possible.

NOTE: These issues were previously covered in BID 35326 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2009-24 through -32 Multiple Remote Vulnerabilities), but have been assigned their own record to better document them.

17. Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2009 -01 to -06 Multiple Remote Vulnerabilities
BugTraq ID: 33598
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/33598
Summary:
The Mozilla Foundation has released multiple security advisories specifying various vulnerabilities in Mozilla Firefox, Thunderbird, and SeaMonkey.

Attackers can exploit these issues to bypass same-origin restrictions, obtain potentially sensitive information, bypass certain security settings, and execute arbitrary script code with elevated privileges; other attacks are also possible.

18. Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2009 -14 through -22 Multiple Remote Vulnerabilities
BugTraq ID: 34656
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/34656
Summary:
The Mozilla Foundation has released multiple security advisories specifying various vulnerabilities in Firefox, Thunderbird, and SeaMonkey.

Attackers can exploit these issues to bypass same-origin restrictions, obtain potentially sensitive information, and execute arbitrary script code with elevated privileges; other attacks are also possible.

19. phpScheduleIt 'reserve.php' Remote Code Execution Vulnerability
BugTraq ID: 31520
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/31520
Summary:
phpScheduleIt is prone to a vulnerability that lets remote attackers execute arbitrary code because the application fails to sanitize user-supplied input.

An attacker can leverage this issue to execute arbitrary PHP code on an affected computer with the privileges of the webserver process.

phpScheduleIt 1.2.10 is vulnerable; other versions may also be affected.

20. Mozilla Firefox International Domain Name Subdomain URI Spoofing Vulnerability
BugTraq ID: 33837
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/33837
Summary:
Mozilla Firefox is affected by a URI-spoofing vulnerability because it fails to adequately handle specific characters in international domain name (IDN) subdomains.

An attacker may leverage this issue to spoof the source URI of a site presented to an unsuspecting user. This may lead to a false sense of trust because the user may be presented with a source URI of a trusted site while interacting with the attacker's malicious site.

Firefox 3.0.6 is vulnerable; other versions may also be affected.

21. eEye Retina WiFi Scanner '.rws' File Buffer Overflow Vulnerability
BugTraq ID: 35624
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35624
Summary:
eEye Retina WiFi Scanner is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input.

Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

eEye Retina WiFi Scanner 1.0.8.68 is vulnerable; other versions may also be affected.

22. WebKit SVGList Objects Remote Memory Corruption Vulnerability
BugTraq ID: 34924
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/34924
Summary:
WebKit is prone to a remote memory-corruption vulnerability.

An attacker can exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition.

The issue also affects the following:

Apple Safari prior to 3.2.3
Apple Mac OS X v10.5 through v10.5.6,
Apple Mac OS X Server v10.5 through v10.5.6
Google Chrome prior to 1.0.154.65

23. Computer Associates BrightStor ARCserve Backup UniversalAgent Remote Buffer Overflow Vulnerability
BugTraq ID: 13102
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/13102
Summary:
A remote buffer-overflow vulnerability affects BrightStor ARCserve and ARCserve Enterprise agent because the application fails to securely copy data from the network.

A remote attacker may exploit this issue to execute arbitrary code on a vulnerable computer, potentially facilitating unauthorized superuser access. A denial-of-service condition may arise as well.

BrightStor ARCserve Backup v11 for Win32 platforms is vulnerable; other versions may also be affected.

24. Apache 'mod_proxy_ajp' Information Disclosure Vulnerability
BugTraq ID: 34663
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/34663
Summary:
The 'mod_proxy_ajp' module for Apache is prone to a remote information-disclosure vulnerability.

Attackers can exploit this issue to obtain sensitive information that may lead to further attacks.

This issue affects 'mod_proxy_ajp' 2.2.1; other versions may also be affected.

25. Mumbles Firefox Plugin Remote Arbitrary Shell Command Injection Vulnerability
BugTraq ID: 35640
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35640
Summary:
Mumbles is prone to a remote command-injection vulnerability because it fails to adequately sanitize user-supplied input data. The issue affects the Firefox plugin.

Remote attackers may be able to exploit this issue to execute arbitrary shell commands with the privileges of the user running the application.

Mumbles 0.4 is vulnerable; other versions may also be affected.

26. strongSwan Crafted X.509 Certificate Multiple Remote Denial Of Service Vulnerabilities
BugTraq ID: 35452
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35452
Summary:
strongSwan is prone to multiple remote denial-of-service vulnerabilities.

Attackers can exploit these issues to crash the application, denying access to legitimate users.

Versions prior to strongSwan 2.8.10, 4.3.2, and 4.2.16 are vulnerable.

27. Oracle WebLogic Server CVE-2009-1974 Remote Vulnerability
BugTraq ID: 35674
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35674
Summary:
Oracle WebLogic Server is prone to a remote vulnerability that can be exploited over the 'HTTP' protocol. A successful exploit can occur if the attacker has 'Servlet Container Package' privileges.

This vulnerability affects the following supported versions:

10.3
10.0 MP1
9.2 MP3
9.1
9.0
8.1 SP6
7.0 SP7

28. Oracle Config Management CVE-2009-1966 Unspecified Security Vulnerability
BugTraq ID: 35676
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35676
Summary:
Oracle Config Management is prone to an unspecified remote vulnerability.

An attacker with 'Valid Session' privileges can exploit this issue over the 'HTTP' protocol.

29. Oracle Weblogic Server CVE-2009-1975 Remote Vulnerability
BugTraq ID: 35673
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35673
Summary:
Oracle WebLogic Server is prone to a remote vulnerability that can be exploited over the 'HTTP' protocol. A successful exploit can occur if the attacker has 'WLS Console Package' privileges.

This vulnerability affects Oracle WebLogic Server 10.3.

30. ISC DHCP 'dhcpd -t' Command Insecure Temporary File Creation Vulnerability
BugTraq ID: 35670
Remote: No
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35670
Summary:
ISC DHCP creates temporary files in an insecure manner.

An attacker with local access could potentially exploit this issue to perform symbolic link attacks to overwrite arbitrary attacker-specified files.

31. ISC DHCP 'dhclient' 'script_write_params()' Stack Buffer Overflow Vulnerability
BugTraq ID: 35668
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35668
Summary:
The ISC DHCP client 'dhclient' is prone to a remote stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it into a fixed-length buffer.

Successfully exploiting this issue allows a remote attacker to execute arbitrary code with superuser privileges, resulting in a complete compromise of the affected computer.

32. Apache 'mod_proxy' Remote Denial Of Service Vulnerability
BugTraq ID: 35565
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35565
Summary:
The Apache 'mod_proxy' module is prone to a denial-of-service vulnerability.

Successful exploits may allow remote attackers to cause denial-of-service conditions and prevent legitimate users from accessing the services.

33. Apache 'Options' and 'AllowOverride' Directives Security Bypass Vulnerability
BugTraq ID: 35115
Remote: No
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35115
Summary:
Apache HTTP server is prone to a security-bypass vulnerability related to the handling of specific configuration directives.

A local attacker may exploit this issue to execute arbitrary code within the context of the webserver process. This may result in elevated privileges or aid in further attacks.

Versions prior to Apache 2.2.11 are vulnerable.

34. Apache 'mod_deflate' Remote Denial Of Service Vulnerability
BugTraq ID: 35623
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35623
Summary:
The Apache 'mod_deflate' module is prone to a denial-of-service vulnerability.

Successful exploits may allow remote attackers to cause denial-of-service conditions and prevent legitimate users from accessing the services.

35. Linux Kernel NFS 'MAY_EXEC' Security Bypass Vulnerability
BugTraq ID: 34934
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/34934
Summary:
The Linux Kernel is prone to an security-bypass vulnerability that affects the NFS (Network File System) implementation.

An attacker can exploit this issue to perform privileged operations on a vulnerable computer, which may aid in further attacks.

36. Linux Kernel 'e1000/e1000_main.c' Remote Denial of Service Vulnerability
BugTraq ID: 35185
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35185
Summary:
The Linux kernel is prone to a remote denial-of-service vulnerability.

Attackers can exploit this issue via crafted packets to cause a kernel panic, denying service to legitimate users.

37. Linux Kernel CIFS 'decode_unicode_ssetup()' Remote Buffer Overflow Vulnerability
BugTraq ID: 34612
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/34612
Summary:
The Linux Kernel is prone to a remote buffer-overflow vulnerability because the software fails to perform adequate boundary checks on user-supplied data.

An attacker can exploit this issue to execute arbitrary code with kernel-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition.

38. Linux Kernel 'splice(2)' Double Lock Local Denial of Service Vulnerability
BugTraq ID: 35143
Remote: No
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35143
Summary:
The Linux kernel is prone to a local denial-of-service vulnerability.

Attackers can exploit this issue to cause an affected process to hang, denying service to legitimate users. Other denial-of-service attacks are also possible.

This issue was introduced in Linux Kernel 2.6.19. The following versions have been fixed:

Linux Kernel 2.6.30-rc3
Linux Kernel 2.6.27.24
Linux Kernel 2.6.29.4

39. Linux Kernel RTL8169 NIC Remote Denial of Service Vulnerability
BugTraq ID: 35281
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35281
Summary:
The Linux Kernel is prone to a remote denial-of-service vulnerability.

An attacker can exploit this issue to crash the system, denying service to legitimate users.
Given the nature of this issue, the attacker may also be able to run arbitrary code, but this has not been confirmed.

Versions prior to Linux Kernel 2.6.30 are vulnerable.

40. Mozilla Firefox 3.5 'Tracemonkey' Component Remote Code Execution Vulnerability
BugTraq ID: 35660
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35660
Summary:
Mozilla Firefox is prone to a remote code-execution vulnerability.

Successful exploits may allow an attacker to execute arbitrary code in the context of the user running the affected application. Failed attempts will likely result in denial-of-service conditions.

The issue affects Firefox 3.5; other versions may also be vulnerable.

NOTE: Remote code execution was confirmed in Firefox 3.5 running on Microsoft Windows XP SP2. A crash was observed in Firefox 3.5 on Windows XP SP3.

41. ISC DHCP Server Host Definition Remote Denial Of Service Vulnerability
BugTraq ID: 35669
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35669
Summary:
ISC DHCP Server is prone to a remote denial-of-service vulnerability because it fails to adequately handle specially crafted DHCP requests.

Attackers can exploit this issue to cause the server to terminate, thus denying service to legitimate users.

42. Oracle July 2009 Critical Patch Update Multiple Vulnerabilities
BugTraq ID: 35618
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35618
Summary:
Oracle has released the July 2009 critical patch update, which addresses the following 30 vulnerabilities:

Application Server is vulnerable to the following two issues:

CVE-2009-0217 - This issue affects the Oracle Security Developer Tools component and requires HTTP access. No authentication is required. Successful attacks may compromise the integrity of the server.

CVE-2009-1976 - This issue affects the HTTP Server component and requires HTTP access. No authentication is required. Successful attacks may compromise the integrity of the server.

Oracle E-Business Suite is vulnerable to the following five issues:

CVE-2009-1980 - This issue affects the Oracle Application Object Library component and requires HTTP access. Successful authentication is required. Successful attacks may compromise the confidentiality, integrity, and availability of the server.

CVE-2009-1982 - This issue affects the Oracle Applications Framework component and requires HTTP access. No authentication is required. Successful attacks may compromise the integrity of the server.

CVE-2009-1983 - This issue affects the Oracle iStore component and requires HTTP access. No authentication is required. Successful attacks may compromise the integrity of the server.

CVE-2009-1984 - This issue affects the Application Install component and requires local access. No authentication is required. Successful attacks may compromise the confidentiality, integrity, and availability of the server.

CVE-2009-1986 - This issue affects the Oracle Applications Manager component and requires HTTP access. No authentication is required. Successful attacks may compromise the confidentiality of the server.

BEA Products Suite is vulnerable to the following five issues:

CVE-2009-1094 - This issue affects the JRockit component and requires HTTP access. No authentication is required. Successful attacks may compromise the confidentiality, integrity, and availability of the server.

CVE-2009-1523 - This issue affects the Oracle Complex Event Processing component and requires HTTP access. No authentication is required. Successful attacks may compromise the confidentiality of the server.

CVE-2009-1974 - This issue affects the WebLogic Server component and requires HTTP access. No authentication is required. Successful attacks may compromise the confidentiality, integrity, and availability of the server.

CVE-2009-1975 - This issue affects the WebLogic Server component and requires HTTP access. No authentication is required. Successful attacks may compromise the confidentiality, integrity, and availability of the server.

Oracle Database is vulnerable to the following 10 issues:

CVE-2009-0987 - This issue affects the Upgrade component and requires Oracle Net access. Successful authentication is required. Successful attacks may compromise the confidentiality and integrity of the server.

CVE-2009-1015 - This issue affects the Core RDBMS component and requires Oracle Net access. Successful authentication is required. Successful attacks may compromise the integrity of the server.

CVE-2009-1019 - This issue affects the Network Authentication component and requires Oracle Net access. No authentication is required. Successful attacks may compromise the confidentiality, integrity, and availability of the server.

CVE-2009-1020 - This issue affects the Network Foundation component and requires Oracle Net access. Successful authentication is required. Successful attacks may compromise the confidentiality, integrity, and availability of the server.

CVE-2009-1021 - This issue affects the Advanced Replication component and requires Oracle Net access. Successful authentication is required. Successful attacks may compromise the confidentiality and integrity of the server.

CVE-2009-1963 - This issue affects the Network Foundation component and requires Oracle Net access. Successful authentication is required. Successful attacks may compromise the integrity and availability of the server.

CVE-2009-1968 - This issue affects the Secure Enterprise Search component and requires HTTP access. No authentication is required. Successful attacks may compromise the integrity of the server.

CVE-2009-1969 - This issue affects the Auditing component and requires Oracle Net access. Successful authentication is required. Successful attacks may compromise the confidentiality of the server.

CVE-2009-1970 - This issue affects the Listener component and requires Oracle Net access. No authentication is required. Successful attacks may compromise the availability of the server.

CVE-2009-1973 - This issue affects the Virtual Private Database component and requires Oracle Net access. Successful authentication is required. Successful attacks may compromise the confidentiality and integrity of the server.

Oracle Enterprise Manager is vulnerable to the following two issues:

CVE-2009-1966 - This issue affects the Config Management component and requires HTTP access. Successful authentication is required. Successful attacks may compromise the confidentiality and integrity of the server.

CVE-2009-1967 - This issue affects the Config Management component and requires HTTP access. Successful authentication is required. Successful attacks may compromise the confidentiality and integrity of the server.

Oracle Secure Backup is vulnerable to the following two issues:

CVE-2009-1977 - This issue affects the Oracle Secure Backup component and requires HTTP access. No authentication is required. Successful attacks may compromise the confidentiality, integrity, and availability of the server.

CVE-2009-1978 - This issue affects the Oracle Secure Backup component and requires HTTP access. Successful authentication is required. Successful attacks may compromise the confidentiality, integrity, and availability of the server.

Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne are vulnerable to the following three issues:

CVE-2009-1987 - This issue affects the PeopleSoft Enterprise PeopleTools - Enterprise Portal component and requires HTTP access. No authentication is required. Successful attacks may compromise the integrity of the server.

CVE-2009-1988 - This issue affects the PeopleSoft Enterprise HRMS eProfile Manager component and requires HTTP access. Successful authentication is required. Successful attacks may compromise the confidentiality of the server.

CVE-2009-1989 - This issue affects the PeopleSoft Enterprise FMS component and requires HTTP access. Successful authentication is required. Successful attacks may compromise the confidentiality and integrity of the server.

Siebel Products Suite is vulnerable to the following issue:

CVE-2009-1981 - This issue affects the Highly Interactive Client component and requires HTTP access. Successful authentication is required. Successful attacks may compromise the confidentiality and integrity of the server.

43. Microsoft DirectX DirectShow Length Record Remote Code Execution Vulnerability
BugTraq ID: 35616
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35616
Summary:
Microsoft DirectX is prone to a remote code-execution vulnerability that resides in the DirectShow component.

Successful exploits allow remote attackers to execute arbitrary code in the context of the user running the application that uses DirectX. Failed exploit attempts will result in a denial-of-service condition.

44. Sun Java Runtime Environment and Java Development Kit Multiple Security Vulnerabilities
BugTraq ID: 34240
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/34240
Summary:
Sun Java Runtime Environment and Java Development Kit are prone to multiple security vulnerabilities.

Successful exploits may allow attackers to violate the same-origin policy, obtain sensitive information, bypass security restrictions, run untrusted applets with elevated privileges, and cause denial-of-service conditions. This may result in a compromise of affected computers.

These issues affect versions *prior to* the following:

JDK and JRE 6 Update 13
JDK and JRE 5.0 Update 18
SDK and JRE 1.4.2_20
SDK and JRE 1.3.1_25

45. Microsoft Virtual PC and Virtual Server Privilege Escalation Vulnerability
BugTraq ID: 35601
Remote: No
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35601
Summary:
Microsoft Virtual PC and Virtual Server are prone to a privilege-escalation vulnerability caused by an error in decoding privileged instructions.

Note that this issue affects only systems that do not use hardware-assisted virtualization.

Successful exploits may allow local attackers to elevate privileges within a guest operating system.

46. Microsoft ISA Server Radius OTP Authentication Bypass Vulnerability
BugTraq ID: 35631
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35631
Summary:
Microsoft ISA Server is prone to an authentication-bypass vulnerability.

An attacker with knowledge of a valid account name can exploit this issue to bypass authentication and gain access to arbitrary resources within the context of the selected account.

47. Microsoft Windows Embedded OpenType Font Engine Integer Overflow Vulnerability
BugTraq ID: 35187
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35187
Summary:
Microsoft Windows is prone to a remotely exploitable integer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it into an insufficiently sized memory buffer.

Remote attackers can exploit this issue to execute arbitrary machine code in the context of the vulnerable software on the targeted user's computer.

48. Microsoft Windows Embedded OpenType Font Engine Heap Overflow Vulnerability
BugTraq ID: 35186
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35186
Summary:
Microsoft Windows is prone to a remotely exploitable heap-overflow vulnerability because the software fails to properly bounds-check user-supplied input before copying it into an insufficiently sized memory buffer.

Remote attackers can exploit this issue to execute arbitrary machine code in the context of the vulnerable software on the targeted user's computer.

49. Microsoft Windows 'MPEG2TuneRequest' ActiveX Control Remote Code Execution Vulnerability
BugTraq ID: 35558
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35558
Summary:
Microsoft Windows is prone to a remote code-execution vulnerability that affects the TV Tuner library.

An attacker could exploit this issue by enticing a victim to visit a maliciously crafted website.

Successfully exploiting this issue would allow the attacker to execute arbitrary code in the context of the currently logged-in user.

Windows XP SP3 and Windows Server 2003 are vulnerable; other versions may also be affected.

50. Microsoft DirectX DirectShow Pointer Validation Remote Code Execution Vulnerability
BugTraq ID: 35600
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35600
Summary:
Microsoft DirectX is prone to a remote code-execution vulnerability that resides in the DirectShow component.

Successful exploits allow remote attackers to execute arbitrary code in the context of the user running the application that uses DirectX. Failed exploit attempts will result in a denial-of-service condition.

51. Microsoft Publisher Object Handler Data Pointer Dereference Remote Code Execution Vulnerability
BugTraq ID: 35599
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35599
Summary:
Microsoft Publisher is prone to a remote code-execution vulnerability.

An attacker can exploit this issue by enticing a victim to open a malicious Publisher file.

Successfully exploiting this issue would allow the attacker to execute arbitrary code in the context of the currently logged-in user.

52. Microsoft DirectX DirectShow QuickTime Video Remote Code Execution Vulnerability
BugTraq ID: 35139
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35139
Summary:
Microsoft DirectX is prone to a remote code-execution vulnerability because the DirectShow component fails to properly handle QuickTime media files.

Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application that uses DirectX. Failed exploit attempts will result in a denial-of-service condition.

53. Hitachi Web Server Client SSL Certificate Handling Unspecified Vulnerability
BugTraq ID: 35665
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35665
Summary:
Hitachi Web Server is prone to an unspecified vulnerability when handling client SSL certificates.

Attackers may exploit this issue to manipulate certain environment variables and potentially gain unauthorized access to the vulnerable server.

54. Hitachi Web Server Reverse Proxy Remote Denial of Service Vulnerability
BugTraq ID: 35663
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35663
Summary:
Hitachi Web Server is prone to a denial-of-service vulnerability because the reverse proxy function fails to properly handle invalid responses from a remote backend server.

Attackers may exploit this issue to cause denial-of-service conditions.

55. Sun Fire V215 Servers Remote Denial Of Service Vulnerability
BugTraq ID: 35661
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35661
Summary:
Sun Fire V215 servers are prone to a remote denial-of-service vulnerability.

An attacker may exploit this issue to panic the system, denying services to legitimate users.

56. Novell eDirectory Multiple Vulnerabilities
BugTraq ID: 35666
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35666
Summary:
Novell eDirectory is prone to multiple buffer-overflow and denial-of-service vulnerabilities.

Successful exploits may allow attackers to execute arbitrary code within the context of the affected application or cause denial-of-service conditions.

These issues affect eDirectory 8.8 SP3 and 8.8 SP3 FTF3.

57. Microsoft Office Web Components ActiveX Control 'msDataSourceObject' Code Execution Vulnerability
BugTraq ID: 35642
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35642
Summary:
Microsoft Office Web Components is prone to a remote code-execution vulnerability that affects the OWC Spreadsheet ActiveX control. The control is identified by the following CLSIDs:

0002E541-0000-0000-C000-000000000046
0002E559-0000-0000-C000-000000000046

An attacker could exploit this issue by enticing a victim to visit a maliciously crafted site.

Successfully exploiting this issue would allow the attacker to execute arbitrary code in the context of the currently logged-in user.

58. Wyse Thin Client 'hagent.exe' Unspecified Buffer Overflow Vulnerability
BugTraq ID: 35650
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35650
Summary:
Wyse Thin Client is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data before copying it to insufficiently sized buffers.

Exploiting this issue will allow an attacker to execute arbitrary code in the context of the application, corrupt memory, or to cause denial-of-service conditions.

This issue affects unknown versions of Wyse Thin Client. This BID will be updated when more details become available.

59. Wyse Device Manager Unspecified Remote Buffer Overflow Vulnerability
BugTraq ID: 35649
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35649
Summary:
Wyse Device Manager is prone to a remote buffer-overflow vulnerability.

An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

60. djbdns Long Response Packet Remote Cache Poisoning Vulnerability
BugTraq ID: 33937
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/33937
Summary:
The 'djbdns' package is prone to a remote cache-poisoning vulnerability.

An attacker may leverage this issue to manipulate cache data, potentially facilitating man-in-the-middle, site-impersonation, or denial-of-service attacks.

This issue affects djbdns 1.05; other versions may also be vulnerable.

61. Horde 'Passwd' Module Cross Site Scripting Vulnerability
BugTraq ID: 35573
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35573
Summary:
The Horde 'Passwd' module is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.

Versions prior to Horde 'Passwd' 3.1.1 are vulnerable.

62. Openswan IPsec Livetest Insecure Temporary File Creation Vulnerability
BugTraq ID: 31243
Remote: No
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/31243
Summary:
Openswan creates temporary files in an insecure manner.

An attacker with local access could potentially exploit these issues to perform symbolic-link attacks, overwriting arbitrary files in the context of the affected application.

Successfully mounting a symlink attack may allow the attacker to delete or corrupt sensitive files, which may result in a denial of service. Other attacks may also be possible.

UPDATE (March 9, 2009): The vendor disputes the validity of this issue, stating that the vulnerable code was incomplete and never run from within the application. The vendor also reports that the latest version of Openswan has disabled the offending code.

63. Oracle Config Management CVE-2009-1967 Remote Unspecified Vulnerability
BugTraq ID: 35692
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35692
Summary:
Oracle Config Management is prone to a remote unspecified vulnerability.

The vulnerability can be exploited over the 'HTTP' protocol. A successful exploit can occur if the attacker has 'Valid Session' privileges.

64. Oracle Database CVE-2009-1973 Remote Virtual Private Database Vulnerability
BugTraq ID: 35687
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35687
Summary:
Oracle Database is prone to a remote vulnerability affecting the 'Virtual Private Database' component.

The vulnerability can be exploited over the 'Oracle Net' protocol. A successful exploit can occur if the attacker has privileges to access tables with VPD (Virtual Private Database) policies.

The following are vulnerable; other versions may also be affected:

Oracle10g 10.1.0.5 and 10.2.0.4
Oracle11g 11.1.0.7

65. Oracle E-Business Suite CVE-2009-1980 Remote Vulnerability
BugTraq ID: 35686
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35686
Summary:
Oracle E-Business Suite is prone to a remote vulnerability in the Application Object Library component.

The vulnerability can be exploited over the 'HTTP' protocol. An attacker does not require privileges to exploit this vulnerability.

This vulnerability affects the following versions of E-Business Suite:

11.5.10.2, 12.0.6 and 12.1

66. Oracle Advanced Replication CVE-2009-1021 Remote Unspecified Vulnerability
BugTraq ID: 35685
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35685
Summary:
Oracle Advanced Replication is prone to a remote unspecified vulnerability.

The vulnerability can be exploited over the 'Oracle Net' protocol. A successful exploit can occur if the attacker has 'Create Session' privileges.

67. Oracle Database CVE-2009-1970 Remote Listener Vulnerability
BugTraq ID: 35683
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35683
Summary:
Oracle Database is prone to a remote vulnerability affecting the 'Listener' component.

The vulnerability can be exploited over the 'Oracle Net' protocol. An attacker does not require privileges to exploit this vulnerability.

The following are vulnerable; other versions may also be affected:

Oracle9i 9.2.0.8 and 9.2.0.8DV
Oracle10g 10.1.0.5 and 10.2.0.4
Oracle11g 11.1.0.7

68. Oracle Database CVE-2009-1015 Remote Core RDBMS Vulnerability
BugTraq ID: 35682
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35682
Summary:
Oracle Database is prone to a remote vulnerability in Core RDBMS.

The vulnerability can be exploited over the 'Oracle Net' protocol. A successful exploit can occur if the attacker has 'Create Session' privileges.

69. Oracle Database CVE-2009-1968 Remote Secure Enterprise Search Vulnerability
BugTraq ID: 35681
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35681
Summary:
Oracle Database is prone to a remote vulnerability in Secure Enterprise Search.

The vulnerability can be exploited over the 'HTTP' protocol. An attacker does not require privileges to exploit this vulnerability.

70. Oracle Database CVE-2009-1019 Remote Network Authentication Vulnerability
BugTraq ID: 35680
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35680
Summary:
Oracle Database is prone to a remote vulnerability in Network Authentication.

The vulnerability can be exploited over the 'Oracle Net' protocol. An attacker does not require privileges to exploit this vulnerability.

This vulnerability affects the following supported versions:
9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.4, 11.1.0.7

71. Oracle Secure Backup CVE-2009-1978 Remote Oracle Secure Backup Vulnerability
BugTraq ID: 35678
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35678
Summary:
Oracle Secure Backup is prone to a remote vulnerability.

The vulnerability can be exploited over the 'HTTP' protocol. A successful exploit can occur if the attacker has 'Valid Session' privileges.

72. Oracle Database CVE-2009-1963 Remote Network Foundation
BugTraq ID: 35677
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35677
Summary:
Oracle Database is prone to a remote vulnerability in Network Foundation.

The vulnerability can be exploited over the 'Oracle Net' protocol. An attacker does not require privileges to exploit this vulnerability.

73. Oracle Complex Event Processing CVE-2009-1523 Remote Vulnerability
BugTraq ID: 35675
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35675
Summary:
Oracle Complex Event Processing is prone to a remote vulnerability.

The vulnerability can be exploited over the 'HTTP' protocol. A successful exploit can occur if the attacker has 'Jetty Server Package' privileges.

This vulnerability affects the following supported versions:

Complex Event Processing 10.3
WebLogic Event Server (EVS) 2.0

74. IETF and W3C XML Digital Signature Specification HMAC Truncation Authentication Bypass Vulnerability
BugTraq ID: 35671
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35671
Summary:
The IETF and W3C XML Digital Signature Specification is prone to an authentication-bypass vulnerability.

Attackers may exploit this issue to forge signatures to arbitrary XML data. This may lead to further attacks.

Note that the specification does not require implementations to accept all truncation length values. As a result not all implementations of the XML Digital Signature Specification will be affected by this issue.

75. Icarus '.icp' File Remote Stack Buffer Overflow Vulnerability
BugTraq ID: 35667
Remote: Yes
Last Updated: 2009-07-14
Relevant URL: http://www.securityfocus.com/bid/35667
Summary:
Icarus is prone to a remote stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input.

Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

Icarus 2.0 is vulnerable; other versions may also be affected.

76. Git Parameter Processing Remote Denial Of Service Vulnerability
BugTraq ID: 35338
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35338
Summary:
Git is prone to a denial-of-service vulnerability because it fails to properly handle some client requests.

Attackers can exploit this issue to cause a daemon process to enter an infinite loop. Repeated exploits may consume excessive system resources, resulting in a denial-of-service condition.

Git 1.4.4.5 through 1.6.3.2 are vulnerable; other versions may also be affected.

77. Adobe Reader and Acrobat JBIG Segments 'Text Region' Memory Corruption Vulnerability
BugTraq ID: 35303
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35303
Summary:
Adobe Reader and Acrobat are prone to a memory corruption vulnerability.

An attacker can exploit these issues by tricking a victim into opening a malicious file to execute arbitrary code and to cause denial-of-service conditions.

NOTE: This issue was previously covered in BID 35274 (Adobe Reader and Acrobat 9.1.1 and Prior Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.

78. Adobe Reader and Acrobat FlateDecode Filter Integer Overflow Vulnerability
BugTraq ID: 35294
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35294
Summary:
Adobe Reader and Acrobat are prone to an integer-overflow vulnerability.

An attacker can exploit this issue to execute arbitrary code. Failed exploit attempts will likely cause denial-of-service conditions.

NOTE: This issue was previously covered in BID 35274 (Adobe Reader and Acrobat 9.1.1 and Prior Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.

79. Adobe Reader and Acrobat JBIG 'Pattern Dictionary' Remote Heap Buffer Overflow Vulnerability
BugTraq ID: 35299
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35299
Summary:
Adobe Reader and Acrobat are prone to a remote heap-based buffer-overflow vulnerability because they fail to sufficiently sanitize user-supplied input.

An attacker can exploit this issue by tricking a victim into opening a malicious file to execute arbitrary code and to cause denial-of-service conditions.

NOTE: This issue was previously covered in BID 35274 (Adobe Reader and Acrobat 9.1.1 and Prior Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.

80. Adobe Reader and Acrobat JBIG 'Halftone Region' Remote Heap Buffer Overflow Vulnerability
BugTraq ID: 35301
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35301
Summary:
Adobe Reader and Acrobat are prone to a remote heap-based buffer-overflow vulnerability because they fail to sufficiently sanitize user-supplied input.

An attacker can exploit this issue by tricking a victim into opening a malicious file to execute arbitrary code and to cause denial-of-service conditions.

NOTE: This issue was previously covered in BID 35274 (Adobe Reader and Acrobat 9.1.1 and Prior Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.

81. Adobe Reader and Acrobat TrueType Font Handling Memory Corruption Vulnerability
BugTraq ID: 35296
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35296
Summary:
Adobe Reader and Acrobat are prone to a memory-corruption vulnerability.

An attacker can exploit this issue to execute arbitrary code. Failed exploit attempts will likely cause denial-of-service conditions.

NOTE: This issue was previously covered in BID 35274 (Adobe Reader and Acrobat 9.1.1 and Prior Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.

82. Adobe Reader and Acrobat JBIG Halftone Region Grid Area Remote Heap Buffer Overflow Vulnerability
BugTraq ID: 35291
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35291
Summary:
Adobe Reader and Acrobat are prone to a remote heap-based buffer-overflow vulnerability because they fail to sufficiently sanitize user-supplied input.

An attacker can exploit this issue by tricking a victim into opening a malicious file to execute arbitrary code and to cause denial-of-service conditions.

NOTE: This issue was previously covered in BID 35274 (Adobe Reader and Acrobat 9.1.1 and Prior Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.

83. Adobe Reader and Acrobat Huffman-encoded JBIG2 Text Heap Overflow Vulnerability
BugTraq ID: 35302
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35302
Summary:
Adobe Reader and Acrobat are prone to a heap-based buffer-overflow vulnerability.

An attacker can exploit these issues by tricking a victim into opening a malicious file to execute arbitrary code and to cause denial-of-service conditions.

NOTE: This issue was previously covered in BID 35274 (Adobe Reader and Acrobat 9.1.1 and Prior Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.

84. Adobe Reader and Acrobat JBIG2 Filter Unspecified Memory Corruption Vulnerability
BugTraq ID: 35298
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35298
Summary:
Adobe Reader and Acrobat are prone to an unspecified memory-corruption vulnerability.

An attacker can exploit this issue by tricking a victim into opening a malicious file to execute arbitrary code and to cause denial-of-service conditions.

NOTE: This issue was previously covered in BID 35274 (Adobe Reader and Acrobat 9.1.1 and Prior Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.

85. LibTIFF 'LZWDecodeCompat()' Remote Buffer Underflow Vulnerability
BugTraq ID: 35451
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35451
Summary:
LibTIFF is prone to a remote buffer-underflow vulnerability because it fails to perform adequate boundary checks on user-supplied data.

An attacker can exploit this issue to execute arbitrary malicious code in the context of a user running an application that uses the affected library. Failed exploit attempts will likely crash the application.

LibTIFF 3.8.2 is vulnerable; other versions may be affected as well.

86. Novell NetIdentity Agent 'XTIERRPCPIPE' Remote Code Execution Vulnerability
BugTraq ID: 34400
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/34400
Summary:
Novell NetIdentity Agent is prone to a remote code-execution vulnerability.

Attackers could exploit this issue to execute arbitrary code with SYSTEM-level privileges. Failed exploit attempts will likely cause denial-of-service conditions.

Novell NetIdentity Agent 1.2.3 is vulnerable; other versions may be affected as well.

87. LibTIFF Multiple Remote Integer Overflow Vulnerabilities
BugTraq ID: 35652
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35652
Summary:
LibTIFF is prone to multiple remote integer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data.

An attacker can exploit these issues to execute arbitrary malicious code in the context of a user running an application that uses the affected library. Failed exploit attempts will likely crash the application.

LibTIFF 3.8.2, 3.9, and 4.0 are vulnerable; other versions may also be affected.

88. Microsoft Windows Print Spooler Local Information Disclosure Vulnerability
BugTraq ID: 35208
Remote: No
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35208
Summary:
Microsoft Windows Messenger is prone to a local information-disclosure vulnerability that affects the Print Spooler service.

Successfully exploiting this issue allows attackers to obtain sensitive information that may aid in further attacks.

89. HP ProCurve Threat Management Services zl Module VPN Remote Denial of Service Vulnerability
BugTraq ID: 35654
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35654
Summary:
HP ProCurve Threat Management Services zl Module is prone to a denial-of-service vulnerability.

Attackers can exploit this issue to crash the affected application, denying service to legitimate users.

HP ProCurve Threat Management Services zl Module J9155A running vST.1.0.090213 firmware or prior is vulnerable.

90. HP ProCurve Threat Management Services zl Module CRL Security Bypass Vulnerability
BugTraq ID: 35659
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35659
Summary:
HP ProCurve Threat Management Services zl Module is prone to a security-bypass vulnerability.

Successful exploits may allow attackers to bypass certain security restrictions, which may aid in launching further attacks.

ProCurve Threat Management Services zl Module J9155A running vST.1.0.090213 firmware or prior is vulnerable.

91. HP ProCurve Threat Management Services zl Module 'httpd' Denial of Service Vulnerability
BugTraq ID: 35653
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35653
Summary:
HP ProCurve Threat Management Services zl Module is prone to a denial-of-service vulnerability because the device's webserver fails to automatically restart if it is stopped.

An attacker may leverage this issue cause a denial of service to the device's management interface.

ProCurve Threat Management Services zl Module J9155A running vST.1.0.090213 firmware or prior is vulnerable.

92. CamlImages PNG Image Parsing Multiple Integer Overflow Vulnerabilities
BugTraq ID: 35556
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35556
Summary:
CamlImages is prone to multiple integer-overflow vulnerabilities because it fails to properly validate user-supplied input.

Successful exploits may allow attackers to execute arbitrary code in the context of applications that use the affected library. Failed exploit attempts will likely result in denial-of-service conditions.

CamlImages 2.2 and prior are vulnerable; other versions may also be affected.

93. HP ProCurve Threat Management Services zl Module DNS Remote Denial of Service Vulnerability
BugTraq ID: 35655
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35655
Summary:
HP ProCurve Threat Management Services zl Module is prone to a denial-of-service vulnerability when handling specially crafted DNS requests or responses.

An attacker can exploit this issue to cause a denial-of-service condition.

ProCurve Threat Management Services z1 Module J9155A running vST.1.0.090213 firmware or prior is vulnerable.

94. Adobe Reader 'spell.customDictionaryOpen()' JavaScript Function Remote Code Execution Vulnerability
BugTraq ID: 34740
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/34740
Summary:
Adobe Reader is prone to a remote code-execution vulnerability.

An attacker can exploit this issue to execute arbitrary code with the privileges of the user running the application or crash the application, denying service to legitimate users.

Reader 8.1.4 for Linux is vulnerable; other versions or platforms may also be affected.

UPDATE (April 30, 2009): Further information from the reporter states that the issue does not affect Reader 9.1; only 8.1.4 is affected.

UPDATE (May 1, 2009): The vendor indicates that fixes will be available by May 12, 2009. Please see the referenced advisory for more information.

UPDATE (May 18, 2009): The vendor indicates that fixes for Adobe Reader 7 for Apple Mac OS X will be available by the end of June, 2009. Please see the updated advisory for more information.

95. Adobe Reader & Acrobat JBIG Pattern Dictionary Allocation Remote Heap Buffer Overflow Vulnerability
BugTraq ID: 35300
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35300
Summary:
Adobe Reader and Acrobat are prone to a remote heap-based buffer-overflow vulnerability because they fail to sufficiently sanitize user-supplied input.

An attacker can exploit this issue by tricking a victim into opening a malicious file to execute arbitrary code and to cause denial-of-service conditions.

NOTE: This issue was previously covered in BID 35274 (Adobe Reader and Acrobat 9.1.1 and Prior Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.

96. D-Bus 'dbus_signature_validate()' Type Signature Denial of Service Vulnerability
BugTraq ID: 31602
Remote: No
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/31602
Summary:
D-Bus is prone to a local denial-of-service vulnerability because it fails to handle malformed signatures contained in messages.

Local attackers can exploit this issue to crash an application that uses the affected library, denying service to legitimate users.

This issue affects D-BUS 1.2.1; other versions may also be affected.

97. Adobe Reader and Acrobat U3D Model Remote Stack Buffer Overflow Vulnerability
BugTraq ID: 35282
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35282
Summary:
Adobe Reader and Acrobat are prone to a remote stack-based buffer-overflow vulnerability because they fail to adequately bounds-check user-supplied data.

An attacker can exploit this issue by tricking a victim into opening a malicious file to execute arbitrary code and to cause denial-of-service conditions.

NOTE: This issue was previously covered in BID 35274 (Adobe Reader and Acrobat 9.1.1 and Prior Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.

98. Adobe Reader and Acrobat Multiple Unspecified Remote Heap Buffer Overflow Vulnerabilities
BugTraq ID: 35295
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35295
Summary:
Adobe Reader and Acrobat are prone to multiple remote heap-based buffer-overflow vulnerabilities because they fail to sufficiently sanitize user-supplied input.

An attacker can exploit these issues by tricking a victim into opening a malicious file to execute arbitrary code and to cause denial-of-service conditions.

NOTE: These issues were previously covered in BID 35274 (Adobe Reader and Acrobat 9.1.1 and Prior Multiple Remote Vulnerabilities), but has been assigned their own record to better document the issues.

99. Adobe Reader and Acrobat JBIG 'Halftone Region' Remote Heap Buffer Overflow Vulnerability
BugTraq ID: 35293
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35293
Summary:
Adobe Reader and Acrobat are prone to a remote heap-based buffer-overflow vulnerability because they fail to sufficiently sanitize user-supplied input.

An attacker can exploit this issue by tricking a victim into opening a malicious file to execute arbitrary code and to cause denial-of-service conditions.

NOTE: This issue was previously covered in BID 35274 (Adobe Reader and Acrobat 9.1.1 and Prior Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.

100. Adobe Reader and Acrobat 9.1.1 and Prior Multiple Remote Vulnerabilities
BugTraq ID: 35274
Remote: Yes
Last Updated: 2009-07-13
Relevant URL: http://www.securityfocus.com/bid/35274
Summary:
Adobe Reader and Acrobat are prone to multiple remote vulnerabilities.

An attacker can exploit these issues by tricking a victim into opening a malicious file to execute arbitrary code and to cause denial-of-service conditions.

The following individual records have been created to better document some of these issues:

35298 Adobe Reader and Acrobat JBIG2 Filter Unspecified Memory Corruption Vulnerability
35295 Adobe Reader and Acrobat Multiple Unspecified Remote Heap Buffer Overflow Vulnerabilities
35294 Adobe Reader and Acrobat 9.1.1 and Prior Integer Overflow Vulnerability
35296 Adobe Reader and Acrobat 9.1.1 and Prior Unspecified Memory Corruption Vulnerability
35289 Adobe Reader and Acrobat Unspecified Memory Corruption Vulnerability
35293 Adobe Reader and Acrobat JBIG 'Halftone Region' Remote Heap Buffer Overflow Vulnerability
35291 Adobe Reader and Acrobat JBIG Halftone Region Grid Area Remote Heap Buffer Overflow Vulnerability
35282 Adobe Reader and Acrobat U3D Model Remote Stack Buffer Overflow Vulnerability
35299 Adobe Reader and Acrobat JBIG 'Pattern Dictionary' Remote Heap Buffer Overflow Vulnerability
35300 Adobe Reader & Acrobat JBIG Pattern Dictionary Allocation Remote Heap Buffer Overflow Vulnerability
35301 Adobe Reader and Acrobat JBIG 'Halftone Region' Remote Heap Buffer Overflow Vulnerability
35302 Adobe Reader and Acrobat Huffman-encoded JBIG2 Text Heap Overflow Vulnerability
35303 Adobe Reader and Acrobat JBIG Segments 'Text Region' Memory Corruption Vulnerability

The vendor reports other unspecified security issues have also been addressed. Information regarding these issues is currently not available. We will update this BID as more information emerges.

III. SECURITYFOCUS NEWS ARTICLES
--------------------------------
1. Web attacks hit U.S., South Korean sites
By: Robert Lemos
In its fourth day, a widespread distributed denial-of-service attack continued to inundate U.S. government and South Korean Web sites with network traffic.
http://www.securityfocus.com/news/11554

2. FTC persuades court to shutter rogue ISP
By: Robert Lemos
A federal district court shuts down Triple Fiber Network, after the Federal Trade Commission documents the Internet service provider's cooperation with online criminals and child pornographers.
http://www.securityfocus.com/news/11552

3. Obama launches cybersecurity initiative
By: Robert Lemos
The U.S. president announces that the nation's networks will be considered a "strategic national asset" and creates a top position in the White House to formulate a better cybersecurity policy.
http://www.securityfocus.com/news/11551

4. Browsers bashed first in hacking contest
By: Robert Lemos
A security researcher keeps a vulnerability on ice for an entire year, before using it at the Pwn2Own contest to exploit Apple's browser. Microsoft's Internet Explorer 8 falls soon after.
http://www.securityfocus.com/news/11549

IV. SECURITY JOBS LIST SUMMARY
-------------------------------
V. INCIDENTS LIST SUMMARY
---------------------------
VI. VULN-DEV RESEARCH LIST SUMMARY
-----------------------------------
VII. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
VIII. SUN FOCUS LIST SUMMARY
----------------------------
IX. LINUX FOCUS LIST SUMMARY
----------------------------
X. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to sf-news-unsubscribe (at) securityfocus (dot) com [email concealed] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email listadmin (at) securityfocus (dot) com [email concealed] and ask to be manually removed.

XI. SPONSOR INFORMATION
------------------------
This issue is sponsored by Ironkey

INTRODUCING THE WORLD'S ONLY FIPS 140-2 LEVEL 3 VALIDATED USB FLASH DRIVE

Designed to meet the needs of military, government and demanding enterprise users, the IronKey. S200 series USB flash drives have passed the stringent Security Level 3 tests for the FIPS 140-2 standard. A rugged, tamper-resistant and tamper-evident enclosure protects the critical components, while strong AES 256-bit hardware encryption and active malware defenses safeguard even the most sensitive data. Enterprise-class central management capabilities also make it easy to enforce security policies on fleets of drives and even remotely destroy drives in the field.

. Always-On AES 256-bit Hardware Encryption

. FIPS 140-2 Level 3 Validated

. Hardened Case.Waterproof Beyond MIL-STD-810F

. Remote Management Software

Research for the IronKey architecture was funded in part by the U.S. Department of Homeland Security. In addition, IronKey maintains a trusted supply chain: all research and development is performed in the USA, and all boards are built and all drives are assembled in secure facilities in the USA.

IronKey Basic S200 drives will also be available in high-capacity 16GB models.

https://www.ironkey.com/S200_Launch?ik_c=s200_launch&ik_s=security_focus
&ik_t=newsletter

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus