Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Windows Telnet Credential Reflection Vulnerability( 12 August 2009 )

A remote code execution vulnerability exists in the Microsoft Telnet service. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights...
Last Update Date: 28 Jan 2011 Release Date: 12 Aug 2009 4612 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Workstation Service Memory Corruption Vulnerability( 12 August 2009 )

An elevation of privilege vulnerability exists in the Windows Workstation Service due to a possible "Double Free" condition occurring in the service. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated privileges. An attacker could then install programs; view, change...
Last Update Date: 28 Jan 2011 Release Date: 12 Aug 2009 4528 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Active Template Library (ATL) Multiple Vulnerabilities( 12 August 2009 )

1. Microsoft Video ActiveX Control VulnerabilityA remote code execution vulnerability exists in the Microsoft Active Template Library (ATL) due to the function CComVariant::ReadFromStream used in the ATL header. This function does not properly restrict untrusted data read from a stream. This issue leads...
Last Update Date: 28 Jan 2011 Release Date: 12 Aug 2009 4776 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Media File Processing Vulnerabilities( 12 August 2009 )

1. Malformed AVI Header VulnerabilityA remote code execution vulnerability exists in the way Microsoft Windows handles specially crafted AVI format files. This vulnerability could allow code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, ...
Last Update Date: 28 Jan 2011 Release Date: 12 Aug 2009 4562 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Web Components Multiple Vulnerabilities( 12 August 2009 )

1. Office Web Components Memory Allocation VulnerabilityA remote code execution vulnerability exists in the Office Web Components ActiveX Control. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution...
Last Update Date: 28 Jan 2011 Release Date: 12 Aug 2009 4569 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Remote Desktop Connection Heap Overflow Vulnerabilities( 12 August 2009 )

1. Remote Desktop Connection Heap Overflow VulnerabilityA remote code execution vulnerability exists in the way that Microsoft Remote Desktop Connection (formerly known as Terminal Services Client) processes specific parameters returned by the RDP server. An attacker who successfully exploited this vulnerability could take complete control of...
Last Update Date: 28 Jan 2011 Release Date: 12 Aug 2009 4723 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Remote Unauthenticated Denial of Service in ASP.NET Vulnerability( 12 August 2009 )

A Denial of Service vulnerability exists in the way ASP.NET manages request scheduling. An attacker could exploit this vulnerability by creating specially crafted anonymous HTTP requests that would cause the affected Web server to become non-responsive until the associated application pool is restarted.
Last Update Date: 28 Jan 2011 Release Date: 12 Aug 2009 4745 Views

RISK: Medium Risk

Medium Risk

Apple Mac OS X Code Execution and Security Bypass Vulnerabilities

Multiple vulnerabilities have been identified in Apple Mac OS X, which could be exploited by remote or local attackers to disclose sensitive information, bypass security restrictions, cause a denial of service or compromise an affected system. These issues are caused by out-of-bounds...
Last Update Date: 28 Jan 2011 Release Date: 7 Aug 2009 4811 Views

RISK: Medium Risk

Medium Risk

Sun Java Multiple Code Execution and Security Bypass Vulnerabilities

Multiple vulnerabilities have been identified in Sun Java, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service, or compromise an affected system.1. An error in the SOCKS proxy implementation, which may allow an...
Last Update Date: 28 Jan 2011 Release Date: 6 Aug 2009 4720 Views

RISK: Medium Risk

Medium Risk

Mozilla Firefox Code Execution and Security Bypass Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, which could be exploited by attackers to manipulate certain data, disclose sensitive information or compromise a vulnerable system.1. Due to an error when handling a SOCKS5 proxy reply containing an overly long DNS name, which could...
Last Update Date: 28 Jan 2011 Release Date: 5 Aug 2009 4732 Views