Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Wireshark Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Wireshark. A remote user can execute arbitrary code on the target system and cause denial of service conditions. A remote user can trigger a divide by zero error in the DCP ETSI dissector and the pcap-ng file parser. A...
Last Update Date: 16 Aug 2012 12:30 Release Date: 16 Aug 2012 4460 Views

RISK: Medium Risk

Medium Risk

Cisco IOS XR Software Route Processor Denial of Service Vulnerability

A vulnerability has been identified in Cisco IOS XR Software, which could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper processing of crafted packets by Cisco 9000 Series Aggregation Services Routers (...
Last Update Date: 16 Aug 2012 12:17 Release Date: 16 Aug 2012 5235 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Kernel-Mode Drivers Use After Free Vulnerability

An elevation of privilege vulnerability exists when the Windows kernel-mode driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or...
Last Update Date: 15 Aug 2012 17:01 Release Date: 15 Aug 2012 4991 Views

RISK: High Risk

High Risk

Microsoft Office CGM File Format Memory Corruption Vulnerability

A remote code execution vulnerability exists in the way that Microsoft Office handles specially crafted Computer Graphics Metafile (CGM) graphics files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change...
Last Update Date: 15 Aug 2012 17:00 Release Date: 15 Aug 2012 5044 Views

RISK: High Risk

High Risk

Microsoft Visio DXF File Format Buffer Overflow Vulnerability

This is a remote code execution vulnerability. An attacker who successfully exploited this vulnerability could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could...
Last Update Date: 15 Aug 2012 17:00 Release Date: 15 Aug 2012 4922 Views

RISK: High Risk

High Risk

Microsoft Exchange Server Multiple Vulnerabilities

Remote code execution vulnerabilities exist in Microsoft Exchange Server through the WebReady Document Viewing feature. These vulnerabilities could allow remote code execution as Local System if a user views a specially crafted file through Outlook Web Access in a browser. An attacker who successfully exploited the vulnerabilities could...
Last Update Date: 15 Aug 2012 16:59 Release Date: 15 Aug 2012 4848 Views

RISK: High Risk

High Risk

Microsoft Windows JavaScript Integer Overflow Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the way that the JScript and VBScript engines calculate the size of an object in memory during a copy operation. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current...
Last Update Date: 15 Aug 2012 16:59 Release Date: 15 Aug 2012 5025 Views

RISK: High Risk

High Risk

Microsoft Windows Networking Components Multiple Vulnerabilities

Remote Administration Protocol Denial of Service Vulnerability A denial of service vulnerability exists in Windows networking components. The vulnerability is due to the service not properly handling specially crafted RAP requests. An attacker who successfully exploited this vulnerability could cause some of the Windows networking component to...
Last Update Date: 15 Aug 2012 16:56 Release Date: 15 Aug 2012 5027 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Multiple Vulnerabilities

Layout Memory Corruption Vulnerability A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Asynchronous...
Last Update Date: 15 Aug 2012 16:56 Release Date: 15 Aug 2012 4386 Views

RISK: High Risk

High Risk

Microsoft Windows Remote Desktop Protocol Vulnerability

A remote code execution vulnerability exists in the way that the Remote Desktop Protocol accesses an object in memory after it has been deleted. An attacker who successfully exploited this vulnerability could run arbitrary code on the target system. An attacker could then install programs; view, ...
Last Update Date: 15 Aug 2012 16:50 Release Date: 15 Aug 2012 4962 Views