Vulnerability Summary for the Week of February 10, 2014

Vulnerability Summary for the Week of February 10, 2014

Vulnerability Summary for the Week of February 10, 2014 Please Note: • The vulnerabilities are cattegorized by their level of severity which is either High, Medium or Low. • The !" indentity number is the #ublicly $nown %& given to that #articular vulnerability. Therefore you can search the status of that #articular vulnerability using that %&. • The !'S (Common !ulnerability 'coring System) score is a standard scoring system used to determine the severity of the vulnerability. High Severity Vulnerabilities The Primary Vendor --- Description Date CVSS The CVE Product Published Score Identity adobe ** ,dobe 'hoc$wave Player before -..0.9.-10 2014-02-11 10.0 CVE-2014-0500 shoc$wave+#layer allows remote attac$ers to e2ecute arbitrary code or cause a denial of service (memory corru#tion) via uns#ecified vectors, a different vulnerability than !"*./-1*/3/-. adobe ** ,dobe 'hoc$wave Player before -..0.9.-10 2014-02-11 10.0 CVE-2014-0501 shoc$wave+#layer allows remote attac$ers to e2ecute arbitrary code or cause a denial of service (memory corru#tion) via uns#ecified vectors, a different vulnerability than !"*./-1*/3//. cisco ** 'QL in5ection vulnerability in the %P Manager 2014-02-13 7.5 CVE-2014-0726 unified_communications+ ,ssistant (%PM,) interface in isco 6nified manager ommunications Manager (6 M) -/.0(-) and earlier allows remote attac$ers to e2ecute arbitrary 'QL commands via a crafted 67L, a$a 8ug %D ' um/39.:. cisco ** 'QL in5ection vulnerability in the allManager 2014-02-13 7.5 CVE-2014-0727 unified_communications+ %nteractive !oice 7es#onse ( M%!7) interface in manager isco 6nified ommunications Manager (6 M) allows remote attac$ers to e2ecute arbitrary 'QL commands via a crafted 67L, a$a 8ug %D ' um/39-;. cisco ** 'QL in5ection vulnerability in the <ava database 2014-02-13 7.5 CVE-2014-0728 unified_communications+ interface in isco 6nified ommunications manager Manager (6 M) -/.0(-) and earlier allows remote attac$ers to e2ecute arbitrary 'QL commands via a crafted 67L, a$a 8ug %D ' um/39-9. cisco ** 'QL in5ection vulnerability in the Enter#rise 2014-02-13 7.5 CVE-2014-0729 unified_communications+ Mobility ,##lication (EM,##) interface in isco manager 6nified ommunications Manager (6 M) allows remote attac$ers to e2ecute arbitrary 'QL commands via a crafted 67L, a$a 8ug %D ' um/39/.. codeaurora ** android- Multi#le integer overflows in the <P"= engine 2014-02-10 7.8 CVE-2013-4736 msm drivers in the M'M camera driver for the Linu2 $ernel 9.x, as used in 4ualcomm %nnovation enter (Qu% ) ,ndroid contributions for M'M devices and other #roducts, allow attac$ers to cause a denial of service (system crash) via a large number of commands in an ioctl call, related to (-) camera+v1>gemini>msm+gemini+sync.c, (.) camera+v2>gemini>msm+gemini+sync.c, (9) camera+v2>5#eg+-/>msm+5#eg+sync.c, (1) gemini>msm+gemini+sync.c, (3) 5#eg+-/>msm+5#eg+sync.c, and (:) mercury/msm+mercury_sync.c. e2#onentcms ** Multi#le 'QL in5ection vulnerabilities in 2014-02-11 7.5 CVE-2013-3294 e2#onent+cms "2#onent M' before ....0 release candidate - allow remote attac$ers to e2ecute arbitrary '4L commands via the (-) src or (.) username #arameter inde2.ph#. e2#onentcms ** Multi#le 'QL in5ection vulnerabilities in 2014-02-11 7.5 CVE-2013-3294 e2#onent+cms "2#onent M' before ....0 release candidate - allow remote attac$ers to e2ecute arbitrary '4L commands via the (-) src or (.) username #arameter inde2.ph#. ibm ** sametime The Meeting 'erver in %8M 'ametime ;.5.2 2014-02-14 7.5 CVE-2013-3983 through ;.5.2.1 and 0.x through 0.0.0.1 does not validate 67Ls in ookie headers before using them in redirects, which has uns#ecified im#act and remote attac$ vectors. ibm ** ,n uns#ecified servlet in %8M Platform 2014-02-14 10.0 CVE-2013-5400 #latform+sym#hony 'ym#hony &eveloper Edition (&") 3.2 and :.1.x through :.1.1 has hardcoded credentials, which allows remote attac$ers to bypass authentication and obtain ?local environment? access via un$nown vectors. ibm ** sametime The Meeting 'erver in %8M 'ametime ;.5.2 2014-02-14 7.5 CVE-2013-6742 through ;.5.2.1 and 0.x through 0.0.0.1 do not have an off autocom#lete attribute for a #assword field, which ma$es it easier for remote attac$ers to obtain access by leveraging an unattended wor$station. light+s#eed_gaming ** The needSam#les method in 2014-02-07 7.5 CVE-2014-0045 mumble ,udioOut#ut'#eech.c## in the client in Mumble -.2.4 and the -.2.3 #re*release sna#shots, Mumble for i@' -.1 through -.2.., and MumbleAit before commit fd10/9.;a0b.1d3B9;.b.:0a3:B1b/c/cBaBe9: d does not chec$ the return value of the opus+decode+float function, which allows remote attac$ers to cause a denial of service (crash) and #ossibly e2ecute arbitrary code via a crafted @#us voice #ac$et, which triggers an error in opus+decode+float, a conversion of a negative integer to an unsigned integer, and a hea#*based buffer over*read and over*write. matri$onopc ** Matri$onOP ' ,&, DNP9 OP 'erver -.2.2.0 2014-02-14 7.1 CVE-2013-2829 scada+dn#9+o#c+server and earlier allows remote attac$ers to cause a denial of service (infinite loop) via a malformed DNP9 #ac$et. microsoft ** windows+; The %Pv6 im#lementation in Microsoft Cindows 2014-02-11 7.8 CVE-2014-0254 ;, Cindows 'erver ./-., and Cindows 7T does not #roperly validate #ac$ets, which allows remote attac$ers to cause a denial of service (system hang) via crafted % MPv6 7outer ,dvertisement #ac$ets, a$a ?T P>%P !ersion : (%Pv6) Denial of 'ervice !ulnerability." microsoft ** Microsoft .NET Dramewor$ -.0 'P9, -.- 'P-, ..0 2014-02-11 9.3 CVE-2014-0257 .net+framewor$ 'P., 9.5, 9.5.1, 1, 1.3, and 1.5.1 does not #roperly determine whether it is safe to e2ecute a method, which allows remote attac$ers to e2ecute arbitrary code via (-) a crafted web site or (.) a crafted .NET Dramewor$ a##lication that e2#oses a OM server endpoint, a$a ?Type Traversal !ulnerability." microsoft ** windows+B The Direct.D im#lementation in Microsoft 2014-02-11 9.3 CVE-2014-0263 Cindows B 'P-, Cindows 'erver .//; 7. 'P-, Cindows ;, Cindows ;.1, Cindows 'erver ./-. =old and 7., and Cindows 7T =old and ;.- allows remote attac$ers to e2ecute arbitrary code via a large .D geometric figure that is encountered with %nternet "2#lorer, a$a ?Microsoft =ra#hics om#onent Memory orru#tion !ulnerability." microsoft ** The EMLHTTP ,ctiveE controls in EML ore 2014-02-11 7.1 CVE-2014-0266 2ml_core+services 'ervices 9.0 in Microsoft Cindows EP 'P. and 'P9, Cindows 'erver .//9 'P., Cindows !ista 'P., Cindows 'erver .//; 'P. and 7. 'P-, Cindows B 'P-, Cindows ;, Cindows ;.1, Cindows 'erver ./-. =old and 7., and Cindows 7T =old and ;.1 allow remote attac$ers to by#ass the 'ame Origin Policy via a web #age that is visited in %nternet "2#lorer, a$a ?M'EML %nformation Disclosure !ulnerability." microsoft ** Microsoft %nternet "2#lorer -- allows remote 2014-02-11 9.3 CVE-2014-0267 internet+e2#lorer attac$ers to e2ecute arbitrary code or cause a denial of service (memory corru#tion) via a crafted web site, a$a ?%nternet "2#lorer Memory orru#tion !ulnerability,? a different vulnerability than !"*./-1*/.;0 and !"*./-1* /.0/. microsoft ** Microsoft %nternet "2#lorer : through -/ allows 2014-02-11 9.3 CVE-2014-0269 internet+e2#lorer remote attac$ers to e2ecute arbitrary code or cause a denial of service (memory corru#tion) via a crafted web site, a$a ?%nternet "2#lorer Memory orru#tion !ulnerability." microsoft ** Microsoft %nternet "2#lorer 0 through -- allows 2014-02-11 9.3 CVE-2014-0270 internet+e2#lorer remote attac$ers to e2ecute arbitrary code or cause a denial of service (memory corru#tion) via a crafted web site, a$a ?%nternet "2#lorer Memory orru#tion !ulnerability,? a different vulnerability than !"*./-1*/.B9, !"*./-1* /.B1, and !"*./-1*/.;;. microsoft ** The !8'cri#t engine in Microsoft %nternet 2014-02-11 9.3 CVE-2014-0271 internet+e2#lorer "2#lorer : through --, and !8'cri#t 3.6 through 3.8, allows remote attac$ers to e2ecute arbitrary code or cause a denial of service (memory corru#tion) via a crafted web site, a$a ?!8'cri#t Memory orru#tion !ulnerability." microsoft ** Microsoft %nternet "2#lorer ; through -/ allows 2014-02-11 9.3 CVE-2014-0272 internet+e2#lorer remote attac$ers to e2ecute arbitrary code or cause a denial of service (memory corru#tion) via a crafted web site, a$a ?%nternet "2#lorer Memory orru#tion !ulnerability." microsoft ** Microsoft %nternet "2#lorer 0 through -- allows 2014-02-11 9.3 CVE-2014-0273 internet+e2#lorer remote attac$ers to e2ecute arbitrary code or cause a denial of service (memory corru#tion) via a crafted web site, a$a ?%nternet "2#lorer Memory orru#tion !ulnerability,? a different vulnerability than !"*./-1*/.B/, !"*./-1* /.B1, and !"*./-1*/.;;. microsoft ** Microsoft %nternet "2#lorer 0 through -- allows 2014-02-11 9.3 CVE-2014-0274 internet+e2#lorer remote attac$ers to e2ecute arbitrary code or cause a denial of service (memory corru#tion) via a crafted web site, a$a ?%nternet "2#lorer Memory orru#tion !ulnerability,? a different vulnerability than !"*./-1*/.B/, !"*./-1* /.B9, and !"*./-1*/.;;. microsoft ** Microsoft %nternet "2#lorer : through -- allows 2014-02-11 9.3 CVE-2014-0275 internet+e2#lorer remote attac$ers to e2ecute arbitrary code or cause a denial of service (memory corru#tion) via a crafted web site, a$a ?%nternet "2#lorer Memory orru#tion !ulnerability,? a different vulnerability than !"*./-1*/.;3 and !"*./-1* /.;:.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    20 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us