Weekly Vulnerabilities Reports > March 11 to 17, 2013

Overview

114 new vulnerabilities reported during this period, including 21 critical vulnerabilities and 24 high severity vulnerabilities. This weekly summary report vulnerabilities in 98 products from 36 vendors including Microsoft, Linux, Redhat, Apple, and Apache. Vulnerabilities are notably categorized as "Information Exposure", "Resource Management Errors", "Permissions, Privileges, and Access Controls", "Improper Restriction of Operations within the Bounds of a Memory Buffer", and "Numeric Errors".

  • 82 reported vulnerabilities are remotely exploitables.
  • 4 reported vulnerabilities have public exploit available.
  • 13 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
  • 106 reported vulnerabilities are exploitable by an anonymous user.
  • Microsoft has the most reported vulnerabilities, with 33 reported vulnerabilities.
  • Microsoft has the most reported critical vulnerabilities, with 18 reported vulnerabilities.

TOTAL
VULNERABILITIES
CRITICAL RISK
VULNERABILITIES
HIGH RISK
VULNERABILITIES
MEDIUM RISK
VULNERABILITIES
LOW RISK
VULNERABILITIES
REMOTELY
EXPLOITABLE
LOCALLY
EXPLOITABLE
EXPLOIT
AVAILABLE
EXPLOITABLE
ANONYMOUSLY
AFFECTING
WEB APPLICATION

Vulnerability Details

The following table list reported vulnerabilities for the period covered by this report:

Expand/Hide

21 Critical Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2013-03-14 CVE-2013-1049 Debian Buffer Errors vulnerability in Debian Cfingerd 1.4.33

Buffer overflow in the RFC1413 (ident) client in cfingerd 1.4.3-3 allows remote IDENT servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted response.

10.0
2013-03-13 CVE-2013-1375 Adobe
Apple
Microsoft
Linux
Google
Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Adobe products

Heap-based buffer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.

10.0
2013-03-13 CVE-2013-1371 Adobe
Apple
Microsoft
Linux
Google
Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Adobe products

Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.

10.0
2013-03-13 CVE-2013-0650 Adobe
Apple
Microsoft
Linux
Google
Resource Management Errors vulnerability in Adobe products

Use-after-free vulnerability in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.

10.0
2013-03-13 CVE-2013-0646 Adobe
Apple
Microsoft
Linux
Google
Numeric Errors vulnerability in Adobe products

Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.

10.0
2013-03-13 CVE-2013-2558 Microsoft Denial of Service vulnerability in Microsoft Windows 8

Unspecified vulnerability in Microsoft Windows 8 allows remote attackers to cause a denial of service (reboot) or possibly have unknown other impact via a crafted TrueType Font (TTF) file, as demonstrated by the 120612-69701-01.dmp error report.

10.0
2013-03-11 CVE-2012-4702 360Systems Credentials Management vulnerability in 360Systems Image Server 2000, Image Server Maxx and Maxx

360 Systems Maxx, Image Server Maxx, and Image Server 2000 have a hardcoded password for the root account, which makes it easier for remote attackers to execute arbitrary code, or modify video content or scheduling, via an SSH session.

10.0
2013-03-11 CVE-2013-2555 Adobe
Google
Apple
Microsoft
Linux
Opensuse
Suse
Redhat
Integer Overflow OR Wraparound vulnerability in multiple products

Integer overflow in Adobe Flash Player before 10.3.183.75 and 11.x before 11.7.700.169 on Windows and Mac OS X, before 10.3.183.75 and 11.x before 11.2.202.280 on Linux, before 11.1.111.50 on Android 2.x and 3.x, and before 11.1.115.54 on Android 4.x; Adobe AIR before 3.7.0.1530; and Adobe AIR SDK & Compiler before 3.7.0.1530 allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.

10.0
2013-03-13 CVE-2013-1288 Microsoft Resource Management Errors vulnerability in Microsoft Internet Explorer 8

Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CTreeNode Use After Free Vulnerability."

9.3
2013-03-13 CVE-2013-0094 Microsoft Resource Management Errors vulnerability in Microsoft Internet Explorer

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer removeChild Use After Free Vulnerability."

9.3
2013-03-13 CVE-2013-0093 Microsoft Resource Management Errors vulnerability in Microsoft Internet Explorer

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer onBeforeCopy Use After Free Vulnerability."

9.3
2013-03-13 CVE-2013-0092 Microsoft Resource Management Errors vulnerability in Microsoft Internet Explorer

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer GetMarkupPtr Use After Free Vulnerability."

9.3
2013-03-13 CVE-2013-0091 Microsoft Resource Management Errors vulnerability in Microsoft Internet Explorer 8

Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CElement Use After Free Vulnerability."

9.3
2013-03-13 CVE-2013-0090 Microsoft Resource Management Errors vulnerability in Microsoft Internet Explorer

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CCaret Use After Free Vulnerability."

9.3
2013-03-13 CVE-2013-0089 Microsoft Resource Management Errors vulnerability in Microsoft Internet Explorer

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkupBehaviorContext Use After Free Vulnerability."

9.3
2013-03-13 CVE-2013-0088 Microsoft Resource Management Errors vulnerability in Microsoft Internet Explorer

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer saveHistory Use After Free Vulnerability."

9.3
2013-03-13 CVE-2013-0087 Microsoft Resource Management Errors vulnerability in Microsoft Internet Explorer

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer OnResize Use After Free Vulnerability."

9.3
2013-03-13 CVE-2013-0079 Microsoft Remote Code Execution vulnerability in Microsoft Office Filter Pack, Visio and Visio Viewer

Microsoft Visio Viewer 2010 SP1 allows remote attackers to execute arbitrary code via a crafted Visio file that triggers incorrect memory allocation, aka "Visio Viewer Tree Object Type Confusion Vulnerability."

9.3
2013-03-13 CVE-2013-0074 Microsoft
Apple
Remote Code Execution vulnerability in Microsoft Silverlight Double Deference

Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference Vulnerability."

9.3
2013-03-11 CVE-2013-2551 Microsoft USE After Free vulnerability in Microsoft Internet Explorer

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.

9.3
2013-03-11 CVE-2013-0787 Mozilla Resource Management Errors vulnerability in Mozilla products

Use-after-free vulnerability in the nsEditor::IsPreformatted function in editor/libeditor/base/nsEditor.cpp in Mozilla Firefox before 19.0.2, Firefox ESR 17.x before 17.0.4, Thunderbird before 17.0.4, Thunderbird ESR 17.x before 17.0.4, and SeaMonkey before 2.16.1 allows remote attackers to execute arbitrary code via vectors involving an execCommand call.

9.3

24 High Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2013-03-11 CVE-2012-1999 HP Unspecified vulnerability in HP Systems Insight Manager

Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.0 allows remote authenticated users to obtain sensitive information or modify data via unknown vectors.

8.5
2013-03-15 CVE-2013-2560 Foscam Path Traversal vulnerability in Foscam Fi8919W

Directory traversal vulnerability in the web interface on Foscam devices with firmware before 11.37.2.49 allows remote attackers to read arbitrary files via a ..

7.8
2013-03-13 CVE-2013-0085 Microsoft Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Microsoft Sharepoint Foundation and Sharepoint Server

Buffer overflow in Microsoft SharePoint Server 2010 SP1 and SharePoint Foundation 2010 SP1 allows remote attackers to cause a denial of service (W3WP process crash and site outage) via a crafted URL, aka "Buffer Overflow Vulnerability."

7.8
2013-03-12 CVE-2013-2292 Bitcoin Resource Management Errors vulnerability in Bitcoin Bitcoin-Qt, Bitcoin Core and Bitcoind

bitcoind and Bitcoin-Qt 0.8.0 and earlier allow remote attackers to cause a denial of service (electricity consumption) by mining a block to create a nonstandard Bitcoin transaction containing multiple OP_CHECKSIG script opcodes.

7.8
2013-03-12 CVE-2012-4684 Bitcoin Resource Management Errors vulnerability in Bitcoin products

The alert functionality in bitcoind and Bitcoin-Qt before 0.7.0 supports different character representations of the same signature data, but relies on a hash of this signature, which allows remote attackers to cause a denial of service (resource consumption) via a valid modified signature for a circulating alert.

7.8
2013-03-11 CVE-2013-1627 Advantech
Indusoft
Path Traversal vulnerability in multiple products

Absolute path traversal vulnerability in NTWebServer.exe in Indusoft Studio 7.0 and earlier and Advantech Studio 7.0 and earlier allows remote attackers to read arbitrary files via a full pathname in an argument to the sub_401A90 CreateFileW function.

7.8
2013-03-14 CVE-2013-1468 Piwigo Cross-Site Request Forgery (CSRF) vulnerability in Piwigo

Cross-site request forgery (CSRF) vulnerability in the LocalFiles Editor plugin in Piwigo before 2.4.7 allows remote attackers to hijack the authentication of administrators for requests that create arbitrary PHP files via unspecified vectors.

7.6
2013-03-14 CVE-2013-1667 Perl Resource Management Errors vulnerability in Perl

The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.

7.5
2013-03-13 CVE-2013-0084 Microsoft Path Traversal vulnerability in Microsoft Sharepoint Foundation and Sharepoint Server

Directory traversal vulnerability in Microsoft SharePoint Server 2010 SP1 and SharePoint Foundation 2010 SP1 allows remote attackers to bypass intended read restrictions for content, and hijack user accounts, via a crafted URL, aka "SharePoint Directory Traversal Vulnerability."

7.5
2013-03-13 CVE-2013-0080 Microsoft Permissions, Privileges, and Access Controls vulnerability in Microsoft Sharepoint Foundation and Sharepoint Server

Microsoft SharePoint Server 2010 SP1 and SharePoint Foundation 2010 SP1 allow remote attackers to bypass intended read restrictions for content, and hijack user accounts, via a crafted URL, aka "Callback Function Vulnerability."

7.5
2013-03-12 CVE-2012-5629 Redhat Permissions, Privileges, and Access Controls vulnerability in Redhat products

The default configuration of the (1) LdapLoginModule and (2) LdapExtLoginModule modules in JBoss Enterprise Application Platform (EAP) 4.3.0 CP10, 5.2.0, and 6.0.1, and Enterprise Web Platform (EWP) 5.2.0 allow remote attackers to bypass authentication via an empty password.

7.5
2013-03-11 CVE-2013-1081 Novell Path Traversal vulnerability in Novell Zenworks Mobile Management 2.6.1/2.7.0

Directory traversal vulnerability in MDM.php in Novell ZENworks Mobile Management (ZMM) 2.6.1 and 2.7.0 allows remote attackers to include and execute arbitrary local files via the language parameter.

7.5
2013-03-11 CVE-2012-1997 HP Unspecified vulnerability in HP Systems Insight Manager

Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.0 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors, a different vulnerability than CVE-2012-1998.

7.5
2013-03-11 CVE-2013-2557 Microsoft Buffer Errors vulnerability in Microsoft Internet Explorer 9

The sandbox protection mechanism in Microsoft Internet Explorer 9 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, as demonstrated against Adobe Flash Player by VUPEN during a Pwn2Own competition at CanSecWest 2013.

7.5
2013-03-11 CVE-2013-2556 Microsoft ASLR Security Bypass vulnerability in Microsoft Windows 7, Windows Server 2008 and Windows Vista

Unspecified vulnerability in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 through SP1 allows attackers to bypass the ASLR protection mechanism via unknown vectors, as demonstrated against Adobe Flash Player by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "ASLR Security Feature Bypass Vulnerability."

7.5
2013-03-11 CVE-2013-2554 Microsoft Security Bypass vulnerability in Microsoft Windows 7

Unspecified vulnerability in Microsoft Windows 7 allows attackers to bypass the ASLR and DEP protection mechanisms via unknown vectors, as demonstrated against Firefox by VUPEN during a Pwn2Own competition at CanSecWest 2013, a different vulnerability than CVE-2013-0787.

7.5
2013-03-11 CVE-2013-2552 Microsoft Remote Code Execution vulnerability in Microsoft Internet Explorer 10

Unspecified vulnerability in Microsoft Internet Explorer 10 on Windows 8 allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a Medium integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.

7.5
2013-03-11 CVE-2013-2550 Adobe Use After Free Remote Code Execution vulnerability in Adobe Acrobat Reader 11.0.02

Unspecified vulnerability in Adobe Reader 11.0.02 allows attackers to bypass the sandbox protection mechanism via unknown vectors, as demonstrated by George Hotz during a Pwn2Own competition at CanSecWest 2013.

7.5
2013-03-11 CVE-2013-2549 Adobe Code Injection vulnerability in Adobe Acrobat Reader 11.0.02

Unspecified vulnerability in Adobe Reader 11.0.02 allows remote attackers to execute arbitrary code via vectors related to a "break into the sandbox," as demonstrated by George Hotz during a Pwn2Own competition at CanSecWest 2013.

7.5
2013-03-11 CVE-2013-0912 Google Code Injection vulnerability in Google Chrome

WebKit in Google Chrome before 25.0.1364.160 allows remote attackers to execute arbitrary code via vectors that leverage "type confusion."

7.5
2013-03-13 CVE-2013-1287 Microsoft Permissions, Privileges, and Access Controls vulnerability in Microsoft products

The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1285 and CVE-2013-1286.

7.2
2013-03-13 CVE-2013-1286 Microsoft Permissions, Privileges, and Access Controls vulnerability in Microsoft products

The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1285 and CVE-2013-1287.

7.2
2013-03-13 CVE-2013-1285 Microsoft Permissions, Privileges, and Access Controls vulnerability in Microsoft products

The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1286 and CVE-2013-1287.

7.2
2013-03-11 CVE-2013-2553 Microsoft Local Privilege Escalation vulnerability in Microsoft Windows 7

Unspecified vulnerability in the kernel in Microsoft Windows 7 allows local users to gain privileges via unknown vectors, as demonstrated by Nils and Jon of MWR Labs during a Pwn2Own competition at CanSecWest 2013, a different vulnerability than CVE-2013-0912.

7.2

46 Medium Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2013-03-14 CVE-2013-1423 Fusionforge Link Following vulnerability in Fusionforge 5.0/5.1/5.2

(1) contrib/gforge-3.0-cronjobs.patch, (2) cronjobs/homedirs.php, (3) deb-specific/fileforge.pl, (4) deb-specific/group_dump_update.pl, (5) deb-specific/ssh_dump_update.pl, (6) deb-specific/user_dump_update.pl, (7) plugins/scmbzr/common/BzrPlugin.class.php, (8) plugins/scmcvs/common/CVSPlugin.class.php, (9) plugins/scmcvs/cronjobs/cvs.php, (10) plugins/scmcvs/cronjobs/ssh_create.php, (11) plugins/scmgit/common/GitPlugin.class.php, (12) plugins/scmsvn/common/SVNPlugin.class.php, (13) plugins/wiki/cronjobs/create_groups.php, (14) utils/cvs1/cvscreate.sh, and (15) utils/include.pl in FusionForge 5.0, 5.1, and 5.2 allows local users to change arbitrary file permissions, obtain sensitive information, and have other unspecified impacts via a (1) symlink or (2) hard link attack on certain files.

6.9
2013-03-12 CVE-2012-5660 Redhat Permissions, Privileges, and Access Controls vulnerability in Redhat Automatic BUG Reporting Tool

abrt-action-install-debuginfo in Automatic Bug Reporting Tool (ABRT) 2.0.9 and earlier allows local users to set world-writable permissions for arbitrary files and possibly gain privileges via a symlink attack on "the directories used to store information about crashes."

6.9
2013-03-15 CVE-2013-2492 Firebirdsql
Microsoft
Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Firebirdsql Firebird

Stack-based buffer overflow in Firebird 2.1.3 through 2.1.5 before 18514, and 2.5.1 through 2.5.3 before 26623, on Windows allows remote attackers to execute arbitrary code via a crafted packet to TCP port 3050, related to a missing size check during extraction of a group number from CNCT information.

6.8
2013-03-15 CVE-2013-0976 Apple Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple mac OS X

IOAcceleratorFamily in Apple Mac OS X before 10.8.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted graphics image.

6.8
2013-03-15 CVE-2013-0973 Apple Remote Code Execution vulnerability in Apple Mac OS X

Software Update in Apple Mac OS X through 10.7.5 does not prevent plugin loading within the marketing-text WebView, which allows man-in-the-middle attackers to execute plugin code by modifying the client-server data stream.

6.8
2013-03-15 CVE-2013-0971 Apple Resource Management Errors vulnerability in Apple mac OS X and mac OS X Server

Use-after-free vulnerability in PDFKit in Apple Mac OS X before 10.8.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted ink annotations in a PDF document.

6.8
2013-03-15 CVE-2013-0961 Apple Memory Corruption vulnerability in WebKit

WebKit in Apple Safari before 6.0.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2013-0960.

6.8
2013-03-15 CVE-2013-0960 Apple Memory Corruption vulnerability in WebKit

WebKit in Apple Safari before 6.0.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2013-0961.

6.8
2013-03-14 CVE-2012-4446 Apache Improper Authentication vulnerability in Apache Qpid

The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request.

6.8
2013-03-11 CVE-2012-1998 HP Unspecified vulnerability in HP Systems Insight Manager

Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.0 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors, a different vulnerability than CVE-2012-1997.

6.8
2013-03-14 CVE-2013-1794 Openafs Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Openafs

Buffer overflow in certain client utilities in OpenAFS before 1.6.2 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long fileserver ACL entry.

6.5
2013-03-15 CVE-2013-2373 Tibco Permissions, Privileges, and Access Controls vulnerability in Tibco Spotfire web Player

The Engine in TIBCO Spotfire Web Player 3.3.x before 3.3.3, 4.0.x before 4.0.3, 4.5.x before 4.5.1, and 5.0.x before 5.0.1 does not properly implement access control, which allows remote attackers to obtain sensitive information or modify data via unspecified vectors.

6.4
2013-03-15 CVE-2013-0966 Apple Authentication Bypass vulnerability in Apple Mac OS X

The Apple mod_hfs_apple module for the Apache HTTP Server in Apple Mac OS X before 10.8.3 does not properly handle ignorable Unicode characters, which allows remote attackers to bypass intended directory authentication requirements via a crafted pathname in a URI.

6.4
2013-03-11 CVE-2012-4703 Emerson Resource Management Errors vulnerability in Emerson products

The Emerson DeltaV SE3006 through 11.3.1, DeltaV VE3005 through 10.3.1 and 11.x through 11.3.1, and DeltaV VE3006 through 10.3.1 and 11.x through 11.3.1 allow remote attackers to cause a denial of service (device restart) via a crafted packet on (1) TCP port 23, (2) UDP port 161, or (3) TCP port 513.

6.1
2013-03-12 CVE-2011-4966 Freeradius Credentials Management vulnerability in Freeradius

modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.

6.0
2013-03-12 CVE-2012-5633 Apache Improper Authentication vulnerability in Apache CXF

The URIMappingInterceptor in Apache CXF before 2.5.8, 2.6.x before 2.6.5, and 2.7.x before 2.7.2, when using the WSS4JInInterceptor, bypasses WS-Security processing, which allows remote attackers to obtain access to SOAP services via an HTTP GET request.

5.8
2013-03-11 CVE-2013-2503 Privoxy Improper Input Validation vulnerability in Privoxy

Privoxy before 3.0.21 does not properly handle Proxy-Authenticate and Proxy-Authorization headers in the client-server data stream, which makes it easier for remote HTTP servers to spoof the intended proxy service via a 407 (aka Proxy Authentication Required) HTTP status code.

5.8
2013-03-12 CVE-2012-6118 Redhat Permissions, Privileges, and Access Controls vulnerability in Redhat Aeolus Conductor

The Administer tab in Aeolus Conductor allows remote authenticated users to bypass intended quota restrictions by updating the Maximum Running Instances quota user setting.

5.5
2013-03-12 CVE-2011-1165 David King Remote Security vulnerability in Vino

Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the "Configure network to automatically accept connections" setting is enabled, which might make it easier for remote attackers to perform further attacks.

5.1
2013-03-15 CVE-2013-2371 Tibco Information Exposure vulnerability in Tibco Spotfire Statistics Services 3.3/4.5.0/5.0.0

The Web API in the Statistics Server in TIBCO Spotfire Statistics Services 3.3.x before 3.3.1, 4.5.x before 4.5.1, and 5.0.x before 5.0.1 allows remote attackers to obtain sensitive information via an unspecified HTTP request.

5.0
2013-03-14 CVE-2013-1795 Openafs Numeric Errors vulnerability in Openafs

Integer overflow in ptserver in OpenAFS before 1.6.2 allows remote attackers to cause a denial of service (crash) via a large list from the IdToName RPC, which triggers a heap-based buffer overflow.

5.0
2013-03-14 CVE-2012-4460 Apache Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apache Qpid

The serializing/deserializing functions in the qpid::framing::Buffer class in Apache Qpid 0.20 and earlier allow remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors.

5.0
2013-03-14 CVE-2012-4459 Apache Numeric Errors vulnerability in Apache Qpid

Integer overflow in the qpid::framing::Buffer::checkAvailable function in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (crash) via a crafted message, which triggers an out-of-bounds read.

5.0
2013-03-14 CVE-2012-4458 Apache Numeric Errors vulnerability in Apache Qpid

The AMQP type decoder in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (memory consumption and server crash) via a large number of zero width elements in the client-properties map in a connection.start-ok message.

5.0
2013-03-13 CVE-2013-0312 Fedoraproject Numeric Errors vulnerability in Fedoraproject 389 Directory Server

389 Directory Server before 1.3.0.4 allows remote attackers to cause a denial of service (crash) via a zero length LDAP control sequence.

5.0
2013-03-13 CVE-2013-0095 Microsoft Information Exposure vulnerability in Microsoft Office 2008/2011

Outlook in Microsoft Office for Mac 2008 before 12.3.6 and Office for Mac 2011 before 14.3.2 allows remote attackers to trigger access to a remote URL and consequently confirm the rendering of an HTML e-mail message by including unspecified HTML5 elements and leveraging the installation of a WebKit browser on the victim's machine, aka "Unintended Content Loading Vulnerability."

5.0
2013-03-13 CVE-2013-0086 Microsoft Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Microsoft Sharepoint Foundation and Sharepoint Server

Microsoft OneNote 2010 SP1 does not properly determine buffer sizes during memory allocation, which allows remote attackers to obtain sensitive information via a crafted OneNote file, aka "Buffer Size Validation Vulnerability."

5.0
2013-03-12 CVE-2013-0239 Apache Improper Authentication vulnerability in Apache CXF

Apache CXF before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3, when the plaintext UsernameToken WS-SecurityPolicy is enabled, allows remote attackers to bypass authentication via a security header of a SOAP request containing a UsernameToken element that lacks a password child element.

5.0
2013-03-12 CVE-2013-0252 Boost Improper Input Validation vulnerability in Boost

boost::locale::utf::utf_traits in the Boost.Locale library in Boost 1.48 through 1.52 does not properly detect certain invalid UTF-8 sequences, which might allow remote attackers to bypass input validation protection mechanisms via crafted trailing bytes.

5.0
2013-03-12 CVE-2013-2293 Bitcoin Resource Management Errors vulnerability in Bitcoin Bitcoin-Qt, Bitcoin Core and Bitcoind

The CTransaction::FetchInputs method in bitcoind and Bitcoin-Qt before 0.8.0rc1 copies transactions from disk to memory without incrementally checking for spent prevouts, which allows remote attackers to cause a denial of service (disk I/O consumption) via a Bitcoin transaction with many inputs corresponding to many different parts of the stored block chain.

5.0
2013-03-12 CVE-2013-2273 Bitcoin Information Exposure vulnerability in Bitcoin Bitcoin-Qt, Bitcoin Core and Bitcoind

bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 make it easier for remote attackers to obtain potentially sensitive information about returned change by leveraging certain predictability in the outputs of a Bitcoin transaction.

5.0
2013-03-12 CVE-2013-2272 Bitcoin Information Exposure vulnerability in Bitcoin Bitcoin-Qt, Bitcoin Core and Bitcoind

The penny-flooding protection mechanism in the CTxMemPool::accept method in bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 allows remote attackers to determine associations between wallet addresses and IP addresses via a series of large Bitcoin transactions with insufficient fees.

5.0
2013-03-15 CVE-2013-0969 Apple Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X 10.8.0/10.8.1/10.8.2

Login Window in Apple Mac OS X before 10.8.3 does not prevent application launching with the VoiceOver feature, which allows physically proximate attackers to bypass authentication and make arbitrary System Preferences changes via unspecified use of the keyboard.

4.9
2013-03-12 CVE-2011-1164 David King Configuration vulnerability in David King Vino

Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks.

4.6
2013-03-12 CVE-2012-6076 Inkscape Permissions, Privileges, and Access Controls vulnerability in Inkscape

Inkscape before 0.48.4 reads .eps files from /tmp instead of the current directory, which might cause Inkspace to process unintended files, allow local users to obtain sensitive information, and possibly have other unspecified impacts.

4.4
2013-03-15 CVE-2013-2372 Tibco Cross-Site Scripting vulnerability in Tibco Spotfire web Player

Cross-site scripting (XSS) vulnerability in the Engine in TIBCO Spotfire Web Player 3.3.x before 3.3.3, 4.0.x before 4.0.3, 4.5.x before 4.5.1, and 5.0.x before 5.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

4.3
2013-03-15 CVE-2013-2566 Oracle
Fujitsu
Canonical
Mozilla
Inadequate Encryption Strength vulnerability in multiple products

The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.

4.3
2013-03-15 CVE-2013-0970 Apple Security Bypass vulnerability in Apple mac OS X 10.8.0/10.8.1/10.8.2

Messages in Apple Mac OS X before 10.8.3 allows remote attackers to bypass the FaceTime call-confirmation prompt via a crafted FaceTime: URL.

4.3
2013-03-15 CVE-2013-0967 Apple Security Bypass vulnerability in Apple Mac OS X

CoreTypes in Apple Mac OS X before 10.8.3 includes JNLP files in the list of safe file types, which allows remote attackers to bypass a Java plug-in disabled setting, and trigger the launch of Java Web Start applications, via a crafted web site.

4.3
2013-03-14 CVE-2013-0275 Ganglia Cross-Site Scripting vulnerability in Ganglia Ganglia-Web

Multiple cross-site scripting (XSS) vulnerabilities in Ganglia Web before 3.5.6 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

4.3
2013-03-14 CVE-2012-4462 Condor Project
Redhat
Improper Input Validation vulnerability in multiple products

aviary/jobcontrol.py in Condor, as used in Red Hat Enterprise MRG 2.3, when removing a job, allows remote attackers to cause a denial of service (condor_schedd restart) via square brackets in the cproc option.

4.3
2013-03-13 CVE-2013-0083 Microsoft Cross-Site Scripting vulnerability in Microsoft Sharepoint Foundation and Sharepoint Server

Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Server 2010 SP1 allows remote attackers to inject arbitrary web script or HTML via crafted content, leading to administrative command execution, aka "SharePoint XSS Vulnerability."

4.3
2013-03-11 CVE-2012-1996 HP Unspecified vulnerability in HP Systems Insight Manager

Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.0 allows remote attackers to modify data via unknown vectors.

4.3
2013-03-14 CVE-2013-1814 Apache Information Exposure vulnerability in Apache Rave

The users/get program in the User RPC API in Apache Rave 0.11 through 0.20 allows remote authenticated users to obtain sensitive information about all user accounts via the offset parameter, as demonstrated by discovering password hashes in the password field of a response.

4.0
2013-03-13 CVE-2013-1469 Piwigo Path Traversal vulnerability in Piwigo

Directory traversal vulnerability in install.php in Piwigo before 2.4.7 allows remote attackers to read and delete arbitrary files via a ..

4.0
2013-03-12 CVE-2013-0168 Redhat Permissions, Privileges, and Access Controls vulnerability in Redhat Enterprise Virtualization Manager

The MoveDisk command in Red Hat Enterprise Virtualization Manager (RHEV-M) 3.1 and earlier does not properly check permissions on storage domains, which allows remote authenticated storage admins to cause a denial of service (free space consumption of other storage domains) via unspecified vectors.

4.0

23 Low Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2013-03-12 CVE-2012-5659 Redhat Unspecified vulnerability in Redhat Automatic BUG Reporting Tool

Untrusted search path vulnerability in plugins/abrt-action-install-debuginfo-to-abrt-cache.c in Automatic Bug Reporting Tool (ABRT) 2.0.9 and earlier allows local users to load and execute arbitrary Python modules by modifying the PYTHONPATH environment variable to reference a malicious Python module.

3.7
2013-03-15 CVE-2013-0248 Apache Permissions, Privileges, and Access Controls vulnerability in Apache Commons Fileupload

The default configuration of javax.servlet.context.tempdir in Apache Commons FileUpload 1.0 through 1.2.2 uses the /tmp directory for uploaded files, which allows local users to overwrite arbitrary files via an unspecified symlink attack.

3.3
2013-03-11 CVE-2012-1995 HP Unspecified vulnerability in HP Systems Insight Manager

Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.0 allows local users to obtain sensitive information or modify data via unknown vectors.

3.2
2013-03-15 CVE-2013-2548 Linux
Redhat
Cryptographic Issues vulnerability in Linux Kernel

The crypto_report_one function in crypto/crypto_user.c in the report API in the crypto user configuration API in the Linux kernel through 3.8.2 uses an incorrect length value during a copy operation, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability.

2.1
2013-03-15 CVE-2013-2547 Linux
Redhat
Cryptographic Issues vulnerability in Linux Kernel

The crypto_report_one function in crypto/crypto_user.c in the report API in the crypto user configuration API in the Linux kernel through 3.8.2 does not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability.

2.1
2013-03-15 CVE-2013-2546 Linux
Redhat
Cryptographic Issues vulnerability in Linux Kernel

The report API in the crypto user configuration API in the Linux kernel through 3.8.2 uses an incorrect C library function for copying strings, which allows local users to obtain sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability.

2.1
2013-03-15 CVE-2012-6536 Linux Information Exposure vulnerability in Linux Kernel

net/xfrm/xfrm_user.c in the Linux kernel before 3.6 does not verify that the actual Netlink message length is consistent with a certain header field, which allows local users to obtain sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability and providing a (1) new or (2) updated state.

2.1
2013-03-12 CVE-2012-6115 Redhat Credentials Management vulnerability in Redhat Enterprise Virtualization Manager

The domain management tool (rhevm-manage-domains) in Red Hat Enterprise Virtualization Manager (RHEV-M) 3.1 and earlier, when the validate action is enabled, logs the administrative password to a world-readable log file, which allows local users to obtain sensitive information by reading this file.

2.1
2013-03-12 CVE-2012-6117 Redhat Permissions, Privileges, and Access Controls vulnerability in Redhat Cloudforms Cloud Engine 1.0/1.1

Aeolus Configuration Server, as used in Red Hat CloudForms Cloud Engine before 1.1.2, uses world-readable permissions for /var/log/aeolus-configserver/configserver.log, which allows local users to read plaintext passwords by reading the log file.

2.1
2013-03-12 CVE-2012-5509 Redhat Permissions, Privileges, and Access Controls vulnerability in Redhat Cloudforms Cloud Engine 1.0/1.1

aeolus-configserver-setup in the Aeolas Configuration Server, as used in Red Hat CloudForms Cloud Engine before 1.1.2, uses world-readable permissions for a temporary file in /tmp, which allows local users to read credentials by reading this file.

2.1
2013-03-15 CVE-2012-6549 Linux Information Exposure vulnerability in Linux Kernel

The isofs_export_encode_fh function in fs/isofs/export.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted application.

1.9
2013-03-15 CVE-2012-6548 Linux
Redhat
Information Exposure vulnerability in Linux Kernel

The udf_encode_fh function in fs/udf/namei.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted application.

1.9
2013-03-15 CVE-2012-6547 Linux Information Exposure vulnerability in Linux Kernel

The __tun_chr_ioctl function in drivers/net/tun.c in the Linux kernel before 3.6 does not initialize a certain structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.

1.9
2013-03-15 CVE-2012-6546 Linux
Redhat
Information Exposure vulnerability in Linux Kernel

The ATM implementation in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.

1.9
2013-03-15 CVE-2012-6545 Redhat
Linux
Information Exposure vulnerability in multiple products

The Bluetooth RFCOMM implementation in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application.

1.9
2013-03-15 CVE-2012-6544 Linux
Redhat
Information Exposure vulnerability in Linux Kernel

The Bluetooth protocol stack in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that targets the (1) L2CAP or (2) HCI implementation.

1.9
2013-03-15 CVE-2012-6543 Linux Information Exposure vulnerability in Linux Kernel

The l2tp_ip6_getname function in net/l2tp/l2tp_ip6.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.

1.9
2013-03-15 CVE-2012-6542 Linux
Redhat
Information Exposure vulnerability in Linux Kernel

The llc_ui_getname function in net/llc/af_llc.c in the Linux kernel before 3.6 has an incorrect return value in certain circumstances, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that leverages an uninitialized pointer argument.

1.9
2013-03-15 CVE-2012-6541 Linux Information Exposure vulnerability in Linux Kernel

The ccid3_hc_tx_getsockopt function in net/dccp/ccids/ccid3.c in the Linux kernel before 3.6 does not initialize a certain structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.

1.9
2013-03-15 CVE-2012-6540 Linux Information Exposure vulnerability in Linux Kernel

The do_ip_vs_get_ctl function in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 3.6 does not initialize a certain structure for IP_VS_SO_GET_TIMEOUT commands, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.

1.9
2013-03-15 CVE-2012-6539 Linux Information Exposure vulnerability in Linux Kernel

The dev_ifconf function in net/socket.c in the Linux kernel before 3.6 does not initialize a certain structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.

1.9
2013-03-15 CVE-2012-6538 Linux
Redhat
Information Exposure vulnerability in Linux Kernel

The copy_to_user_auth function in net/xfrm/xfrm_user.c in the Linux kernel before 3.6 uses an incorrect C library function for copying a string, which allows local users to obtain sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability.

1.9
2013-03-15 CVE-2012-6537 Linux
Redhat
Information Exposure vulnerability in Linux Kernel

net/xfrm/xfrm_user.c in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability.

1.9