Mostrando entradas con la etiqueta Denial of Service Vulnerability. Mostrar todas las entradas
Mostrando entradas con la etiqueta Denial of Service Vulnerability. Mostrar todas las entradas

Nuevas vulnerabilidades que afectan a Cisco

Posted: 21/7/11 by komz in Etiquetas: , , , ,
0

Apache APR 'apr_fnmatch.c' Denial of Service Vulnerability

Posted: 23/5/11 by komz in Etiquetas: , ,
0

Apache APR is prone to a denial-of-service vulnerability.

NOTE: This issue is introduced in the Apache APR 1.4.4 due to an improper fix for CVE-2011-0419.

Successful exploits may allow the attacker to cause excessive CPU usage, resulting in denial-of-service conditions.

Apache APR 1.4.4 is affected.

Desde Vulnerability Team exortamos a los usuarios y administradores revisar las notificaciones y aplicar las actualizaciones necesarias, para ayudar a mitigar los riesgos.

fuente: securityfocus.com

Post to Twitter

0
0

1. Linux Kernel SCTP INIT/INIT-ACK Chunk Length Remote Denial of Service Vulnerability

The Linux kernel is prone to a remote denial-of-service vulnerability related to SCTP protocol implementation.

Attackers can exploit this issue to cause a kernel panic, denying service to legitimate users.

REFERNECE: http://www.securityfocus.com/bid/47308/info


2. Linux Kernel 'inotify_init1()' Double Free Local Denial of Service Vulnerability

The Linux kernel is prone to a local denial-of-service vulnerability.

Attackers can exploit this issue to cause an out-of-memory condition, denying service to legitimate users.

REFERNECE: http://www.securityfocus.com/bid/47296/info


The Vulnerability Team adviced to users and administrators to review and apply the updates notifications
necessary to help mitigate the risks.

source: securityfocus.com 

0

Adobe has released a security advisory to alert users of a vulnerability affecting the following products:

  • Adobe Flash Player 10.2.152.33 and earlier versions for Windows, Macintosh, Linux, and Solaris
  • Adobe Flash Player 10.2.154.18 and earlier versions for Google Chrome users
  • Adobe Flash Player 10.1.106.16 and earlier versions for Android 
  • The Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.1) and earlier 10.x and 9.x versions for Windows and Macintosh.

Exploitation of this vulnerability may allow an attacker to execute arbitrary code or cause a denial-of-service condition. At this time, the vendor has not released a fix for this vulnerability. The Adobe advisory indicates that this vulnerability is being actively exploited via a Flash (.swf) file embedded in a Microsoft Excel (.xls) file delivered as an email attachment.

Adobe has indicated that it expects to release a fix for this vulnerability during the week of March 21, 2011. In the interim, users and administrators are encouraged to implement the following workarounds to help reduce the risks.
  • Disable Flash in the web browser as described in the Securing Your Web Browser document.
  • Disable Flash and 3D & Multimedia support in Adobe Reader 9 and later.
  • Disable JavaScript in Adobe Reader and Acrobat.
  • Prevent Internet Explorer from automatically opening PDF documents.
  • Disable the displaying of PDF documents in the web browser.
  • Enable DEP in Microsoft Windows.
  • Utilize Microsoft EMET to enable runtime mitgations for Microsoft Internet Explorer and Excel.
ADOBE SECURITY ADVISORY

The Vulnerability Team adviced to users and administrators to review and apply the updates notifications
necessary to help mitigate the risks.

source: us-cert.org 

Apple Releases Java Updates for Mac OS X 10.5 and OS X 10.6

Posted: 10/3/11 by komz in Etiquetas: , , ,
0

Apple has released Java for Mac OS X 10.5 Update 9 and Java for Mac OS X 10.6 Update 4 to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code or cause a denial-of-service condition.

Relevant Url(s):

The Vulnerability Team adviced to users and administrators to review and apply the updates notifications necessary to help mitigate the risks.

source: securityfocus.com 

0

Se ha descubierto una vulnerabilidad en Windows, por la que un atacante remoto no autenticado puede provocar una denegación de servicio u obtener el control completo de un sistema vulnerable. El problema lo causa un fallo de desbordamiento de pila en una función dentro del driver "mrxsmb.sys" cuando se procesan peticiones de selección de navegador malformadas. Esto puede provocar que los atacantes remotos no autenticados hagan fallar el sistema afectado o puedan potencialmente ejecutar código con privilegios elevados.

Esta vulnerabilidad se ha confirmado para Windows Server 2003 SP2 y Windows XP SP3 completamente parcheados (en concreto la versión 5.2.3790.4671 de la librería mrxsmb.sys), aunque otras versiones pueden estar igualmente afectadas.

Solución: Microsoft no ha publicado ninguna información al respecto, pero se recomiendan filtrar los puertos 138, 139 y 445, y restringir el acceso a los equipos potencialmente vulnerables a usuarios de confianza.

Más Información:
http://secunia.com/advisories/43299
http://www.vupen.com/english/advisories/2011/0394
http://seclists.org/fulldisclosure/2011/Feb/285
http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0284.html


fuente: csirtcv.es

0

Sun Java is prone to a remote denial-of-service vulnerability.

Successful attacks will cause applications written in Java to hang, creating a denial-of-service condition.

This issue affects both the Java compiler and Runtime Environment.

REFERENCIA.

EXPLOIT

Desde Vulnerability Team exortamos a los usuarios y administradores revisar las notificaciones y aplicar las actualizaciones necesarias, para ayudar a mitigar los riesgos.


fuente: securityfocus.com 

0

Cisco Content Services Gateway Malformed TCP Packet (CVE-2011-0350) Denial of Service Vulnerability
Cisco Content Services Gateway is prone to a denial-of-service vulnerability. Successful exploits will cause the affected device to reload or hang, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCth41891.

Cisco Content Services Gateway Service Policy Security Bypass Vulnerability
Cisco Content Services Gateway is prone to a security-bypass vulnerability. Exploiting this issue may allow attackers to access sites that are non-accounted or billed. This may lead to other attacks. This issue is being tracked by Cisco Bug ID CSCtk35917.

Desde Vulnerability Team exortamos a los usuarios y administradores revisar las notificaciones y aplicar las actualizaciones necesarias, para ayudar a mitigar los riesgos.

fuente: securityfocus.com






0

Múltiples vulnerabilidades han sido identificadas en Cisco IOS que podrían ser explotadas por atacantes para provocar una denegación de servicio o eludir restricciones de seguridad. Estos problemas están causados por errores relacionados con el tráfico IRC, la implementación H.323, CallManager Express (CME), los mensajes SIP, la depuración de TFTP, manejo de certificados, STCAPP (CCPC aplicación de control de telefonía) y el descubrimiento de vecinos (ND), que podrían ser explotados por atacantes remotos para crear una condición de denegación de servicio o la validación de certificados de derivación (bypass certificate validation).

Paralelamente, múltiples vulnerabilidades han sido identificadas en Cisco ASA 5500 Series Adaptive Security Appliances, que podrían ser explotadas por atacantes para eludir restricciones de seguridad, causar una denegación de servicio o el filtrado de información sensible. Estos problemas están causados por errores relacionados con la inspección SIP, ACL, Seguridad Móvil del usuario de servicios (MUS), el tráfico de multidifusión, sesiones de IPsec de LAN a LAN (L2L) , ASDM, Descubrimiento de vecinos (ND), el tráfico de EIGRP, TELNET, el tráfico IPsec , emWEB, puesta en marcha del dispositivo, conexiones Online Certificate Status Protocol (OCSP), CIFS, inspección SMTP y autenticación LDAP, que podrían permitir a un atacante eludir restricciones de seguridad, crear una condición de denegación de servicio o revelar información crítica.

Referencias:

http://www.cisco.com/en/US/docs/ios/15_0/15_0x/15_01_XA/rn800xa.pdf
http://www.cisco.com/en/US/docs/security/asa/asa83/release/notes/asarn83.pdf
http://www.cisco.com/en/US/docs/security/asa/asa82/release/notes/asarn82.pdf
http://www.vupen.com/english/advisories/2011/0129
http://www.vupen.com/english/advisories/2011/0130

fuente: csirtcv.es

0

Nuevas vulnerabilidades que afectan a SAP

Posted: 13/1/11 by komz in Etiquetas: , , ,
0

1. SAP Kernel 'sapstartsrv' SOAP Server Information Disclosure Vulnerability
Remote attackers can exploit this issue to obtain sensitive information. Information obtained may aid in further attacks and facilitate access to other services.


2. SAP Kernel Command Handling Denial Of Service Vulnerability

Attackers can exploit this issue to cause the affected application to crash, denying service to legitimate users.

fuente: securityfocus.com

0

Google Chrome is prone to multiple vulnerabilities.

Attackers may exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks are also possible.

Chrome versions 8.x prior to 8.0.552.237 are vulnerable.

REFERENSE

fuente: securityfocus.com

0

Cisco IOS is prone to a remote denial-of-service vulnerability.

An attacker can exploit these issues to cause an affected device to crash, denying service to legitimate users.

This issue is being tracked by Cisco Bug ID CSCtg41733.

REFERENSE

fuente: securityfocus.com 



 

0

RIM a publicado un security advisory para hacer frente a la vulnerabilidad en el PDF distiller del servicio de ficheros adjuntos del BlackBerry para el Servidor Enterprise de BlackBerry. Esta vulnerabilidad podria permitir a un atacante ejecutar codigo arbitrario o causar un ataque de denegacion de servicio.

RIM Security Advisory

fuente: us-cert.org

0
0

1. Linux Kernel 'install_special_mapping()' Local Security Bypass Vulnerability

The Linux kernel is prone to a local security-bypass vulnerability because the 'install_special_mapping()' function fails to adequately perform certain security checks. Attackers can exploit this issue to bypass security restrictions and perform unauthorized actions.

2. Linux Kernel 'AF_ECONET' Protocol NULL Pointer Dereference Denial of Service Vulnerability


The Linux kernel is prone to a denial-of-service vulnerability.Attackers can exploit this issue to cause the kernel to panic, denying service to legitimate users. Due to the nature of this issue, attackers may be able to execute arbitrary code; this has not been confirmed.

Desde Vulnerability Team exortamos a los usuarios y administradores revisar las notificaciones y aplicar las actualizaciones necesarias, para ayudar a mitigar los riesgos.

fuente: securityfocus.com