Počet zobrazení stránky

Zobrazují se příspěvky se štítkemVulnerebility Details. Zobrazit všechny příspěvky
Zobrazují se příspěvky se štítkemVulnerebility Details. Zobrazit všechny příspěvky

pondělí 19. března 2012

Vulnerability Summary for CVE-2012-1774


Original release date:03/18/2012
Last revised:03/19/2012
Source: US-CERT/NIST

Overview

Unspecified vulnerability in the Open URL feature in Gretech GOM Media Player before 2.1.39.5101 has unknown impact and attack vectors, a different vulnerability than CVE-2007-5779 and CVE-2012-1264.

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:10.0 (HIGH)(AV:N/AC:L/Au:N/C:C/I:C/A:C) (legend)
Impact Subscore: 10.0
Exploitability Subscore: 10.0
CVSS Version 2 Metrics:
Access Vector: Network exploitable
Access Complexity: Low
**NOTE: Access Complexity scored Low due to insufficient information
Authentication: Not required to exploit
Impact Type:Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.
External Source: CONFIRM
Name: http://player.gomlab.com/eng/download/
Type: Advisory; Patch Information

Vulnerability Summary for CVE-2012-1264


Original release date:03/18/2012
Last revised:03/19/2012
Source: US-CERT/NIST

Overview

Unspecified vulnerability in Gretech GOM Media Player before 2.1.37.5091 allows remote attackers to execute arbitrary code via a crafted AVI file.

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:9.3 (HIGH) (AV:N/AC:M/Au:N/C:C/I:C/A:C)(legend)
Impact Subscore: 10.0
Exploitability Subscore: 8.6
CVSS Version 2 Metrics:
Access Vector: Network exploitable; Victim must voluntarily interact with attack mechanism
Access Complexity: Medium
Authentication: Not required to exploit
Impact Type:Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.
External Source: CONFIRM
Name: http://gom.gomtv.com/gomIntro.html?type=4
Type: Advisory

Vulnerability Summary for CVE-2012-0293


Original release date:03/17/2012
Last revised:03/19/2012
Source: US-CERT/NIST

Overview

Multiple SQL injection vulnerabilities in Symantec Altiris WISE Package Studio before 8.0MR1 allow remote attackers to execute arbitrary SQL commands via unspecified vectors.

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:6.8 (MEDIUM)(AV:N/AC:M/Au:N/C:P/I:P/A:P) (legend)
Impact Subscore: 6.4
Exploitability Subscore: 8.6
CVSS Version 2 Metrics:
Access Vector: Network exploitable; Victim must voluntarily interact with attack mechanism
Access Complexity: Medium
Authentication: Not required to exploit
Impact Type:Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.
External Source: CONFIRM
Name:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120314_00
Type: Advisory
External Source: BID
Name: 52392

Vulnerability Summary for CVE-2012-0326


Original release date:03/17/2012
Last revised:03/19/2012
Source: US-CERT/NIST

Overview

The twicca application 0.7.0 through 0.9.30 for Android does not properly restrict the use of network privileges, which allows remote attackers to read media files on an SD card via a crafted application.

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:5.0 (MEDIUM)(AV:N/AC:L/Au:N/C:P/I:N/A:N) (legend)
Impact Subscore: 2.9
Exploitability Subscore: 10.0
CVSS Version 2 Metrics:
Access Vector: Network exploitable
Access Complexity: Low
Authentication: Not required to exploit
Impact Type:Allows unauthorized disclosure of information

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.
External Source: CONFIRM
Name: https://play.google.com/store/apps/details?id=jp.r246.twicca
Type: Advisory; Patch Information
External Source: CONFIRM
Name: http://twicca.r246.jp/notice/
Type: Patch Information
External Source: JVNDB
Name: JVNDB-2012-000024
External Source: JVN
Name: JVN#31860555

středa 14. března 2012

Vulnerability Summary for CVE-2012-0195


Original release date:03/13/2012
Last revised:03/13/2012
Source: US-CERT/NIST

Overview

Cross-site scripting (XSS) vulnerability in the Start Center Layout and Configuration component in IBM Maximo Asset Management and Asset Management Essentials 6.2, 7.1, and 7.5; IBM Tivoli Asset Management for IT 6.2, 7.1, and 7.2; IBM Tivoli Service Request Manager 7.1 and 7.2; IBM Maximo Service Desk 6.2; and IBM Tivoli Change and Configuration Management Database (CCMDB) 6.2, 7.1, and 7.2 allows remote attackers to inject arbitrary web script or HTML via the display name.

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:4.3 (MEDIUM)(AV:N/AC:M/Au:N/C:N/I:P/A:N) (legend)
Impact Subscore: 2.9
Exploitability Subscore: 8.6
CVSS Version 2 Metrics:
Access Vector: Network exploitable
Access Complexity: Medium
Authentication: Not required to exploit
Impact Type:Allows unauthorized modification

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page tonvd@nist.gov.
External Source: XF
Name: mam-sclc-xss(72612)
External Source: CONFIRM
Name: http://www.ibm.com/support/docview.wss?uid=swg21584666
Type: Advisory
External Source: AIXAPAR
Name: IV09198

Vulnerability Summary for CVE-2012-0157


Original release date:03/13/2012
Last revised:03/13/2012
Source: US-CERT/NIST
This vulnerability is currently undergoing analysis and not all information is available.
Please check back soon to view the completed vulnerability summary.

Overview

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle window messaging, which allows local users to gain privileges via a crafted application that calls the PostMessage function, aka "PostMessage Function Vulnerability."

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page tonvd@nist.gov.
External Source: MS
Name: MS12-018

Vulnerability Summary for CVE-2012-0156


Original release date:03/13/2012
Last revised:03/13/2012
Source: US-CERT/NIST
This vulnerability is currently undergoing analysis and not all information is available.
Please check back soon to view the completed vulnerability summary.

Overview

DirectWrite in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly render Unicode characters, which allows remote attackers to cause a denial of service (application hang) via a (1) instant message or (2) web site, aka "DirectWrite Application Denial of Service Vulnerability."

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page tonvd@nist.gov.
External Source: MS
Name: MS12-019

Vulnerability Summary for CVE-2012-0152


Original release date:03/13/2012
Last revised:03/13/2012
Source: US-CERT/NIST
This vulnerability is currently undergoing analysis and not all information is available.
Please check back soon to view the completed vulnerability summary.

Overview

The Remote Desktop Protocol (RDP) service in Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows remote attackers to cause a denial of service (application hang) via a series of crafted packets, aka "Terminal Server Denial of Service Vulnerability."

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page tonvd@nist.gov.
External Source: MS
Name: MS12-020

Vulnerability Summary for CVE-2012-0124


Original release date:03/14/2012
Last revised:03/14/2012
Source: US-CERT/NIST
This vulnerability is currently undergoing analysis and not all information is available.
Please check back soon to view the completed vulnerability summary.

Overview

Unspecified vulnerability in HP Data Protector Express (aka DPX) 5.0.00 before build 59287 and 6.0.00 before build 11974 allows remote attackers to execute arbitrary code or cause a denial of service via unknown vectors.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page tonvd@nist.gov.
External Source: HP
Name: SSRT100781
External Source: HP
Name: HPSBMU02746

Vulnerability Summary for CVE-2012-0123


Original release date:03/14/2012
Last revised:03/14/2012
Source: US-CERT/NIST
This vulnerability is currently undergoing analysis and not all information is available.
Please check back soon to view the completed vulnerability summary.

Overview

Unspecified vulnerability in HP Data Protector Express (aka DPX) 5.0.00 before build 59287 and 6.0.00 before build 11974 allows remote attackers to execute arbitrary code or cause a denial of service via unknown vectors, aka ZDI-CAN-1498.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page tonvd@nist.gov.
External Source: HP
Name: SSRT100781
External Source: HP
Name: HPSBMU02746

Vulnerability Summary for CVE-2012-0122


Original release date:03/14/2012
Last revised:03/14/2012
Source: US-CERT/NIST
This vulnerability is currently undergoing analysis and not all information is available.
Please check back soon to view the completed vulnerability summary.

Overview

Unspecified vulnerability in HP Data Protector Express (aka DPX) 5.0.00 before build 59287 and 6.0.00 before build 11974 allows remote attackers to execute arbitrary code or cause a denial of service via unknown vectors, aka ZDI-CAN-1393.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page tonvd@nist.gov.
External Source: HP
Name: HPSBMU02746
External Source: HP
Name: SSRT100781

Vulnerability Summary for CVE-2012-0121


Original release date:03/14/2012
Last revised:03/14/2012
Source: US-CERT/NIST
This vulnerability is currently undergoing analysis and not all information is available.
Please check back soon to view the completed vulnerability summary.

Overview

Unspecified vulnerability in HP Data Protector Express (aka DPX) 5.0.00 before build 59287 and 6.0.00 before build 11974 allows remote attackers to execute arbitrary code or cause a denial of service via unknown vectors, aka ZDI-CAN-1392.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page tonvd@nist.gov.
External Source: HP
Name: HPSBMU02746
External Source: HP
Name: SSRT100781