From bd16d0e01d28aae0b45461083d0ff3edc4579dac Mon Sep 17 00:00:00 2001 From: nectar Date: Fri, 4 Mar 2005 18:14:28 +0000 Subject: Document two phpnuke vulnerabilities, and a Linux RealPlayer vulnerability. Based on entries that were Submitted by: Devon H. O'Dell --- security/vuxml/vuln.xml | 109 ++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 109 insertions(+) (limited to 'security') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 7056a1c5ef98..95a575e950fe 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,115 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + postnuke -- SQL injection vulnerabilities + + + postnuke + 0.760 + + + + +

Two separate SQL injection vulnerabilites have been + identified in the PostNuke PHP content management + system. An attacker can use this vulnerability to + potentially insert executable PHP code into the content + management system (to view all files within the PHP scope, + for instance). Various other SQL injection vulnerabilities + exist, which give attackers the ability to run SQL queries + on any tables within the database.

+ +
+ + CAN-2005-0617 + CAN-2005-0615 + http://marc.theaimsgroup.com/?l=bugtraq&m=110962710805864 + http://marc.theaimsgroup.com/?l=bugtraq&m=110962819232255 + http://news.postnuke.com/Article2669.html + + + 2005-02-28 + 2005-03-04 + +
+ + + postnuke -- cross-site scripting (XSS) vulnerabilities + + + postnuke + 0.760 + + + + +

A cross-site scripting vulnerability is present in the + PostNuke PHP content management system. By passing data + injected through exploitable errors in input validation, an + attacker can insert code which will run on the machine of + anybody viewing the page. It is feasible that this attack + could be used to retrieve session information from cookies, + thereby allowing the attacker to gain administrative access + to the CMS.

+ +
+ + CAN-2005-0616 + http://marc.theaimsgroup.com/?l=bugtraq&m=110962768300373 + http://news.postnuke.com/Article2669.html + + + 2005-02-28 + 2005-03-04 + +
+ + + realplayer -- remote heap overflow + + + linux-realplayer + 10.0.2 + + + + +

Two exploits have been identified in the Linux RealPlayer client. + RealNetworks states:

+
+

RealNetworks, Inc. has addressed recently discovered + security vulnerabilities that offered the potential for + an attacker to run arbitrary or malicious code on a + customer's machine. RealNetworks has received no reports + of machines compromised as a result of the now-remedied + vulnerabilities. RealNetworks takes all security + vulnerabilities very seriously.

+

The specific exploits were:

+
    +
  • Exploit 1: To fashion a malicious WAV + file to cause a buffer overflow which could have allowed + an attacker to execute arbitrary code on a customer's + machine.
  • +
  • Exploit 2: To fashion a malicious + SMIL file to cause a buffer overflow which could have + allowed an attacker to execute arbitrary code on a + customer's machine.
  • +
+
+ +
+ + CAN-2005-0611 + http://marc.theaimsgroup.com/?l=vulnwatch&m=110977858619314 + http://service.real.com/help/faq/security/050224_player/EN/ + + + 2005-03-01 + 2005-03-04 + +
+ ImageMagick -- format string vulnerability -- cgit