CVE-2011-0609 – Adobe Flash Player Unspecified Vulnerability
https://notcve.org/view.php?id=CVE-2011-0609
Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader and Acrobat 9.x through 9.4.2 and 10.x through 10.0.1 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content, as demonstrated by a .swf file embedded in an Excel spreadsheet, and as exploited in the wild in March 2011. Vulnerabilidad sin especificar en Adobe Flash Player 10.2.154.13 y versiones anteriores en Windows, Mac OS X, Linux y Solaris, y 10.1.106.16 y anteriores en Android, y Authplay.dll (AuthPlayLib.bundle) de Adobe Reader y Acrobat 9.x hasta 9.4.2 y 10.x hasta 10.0.1 en Windows y Mac OS X. Permite a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio (caída de la aplicación) a través de contenido Flash modificado, como se ha demostrado con un fichero .swf embebido en una hoja de cálculo Excel. Se ha explotado en Internet en Marzo del 2011. Adobe Flash Player contains an unspecified vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS). • https://www.exploit-db.com/exploits/17027 http://blogs.adobe.com/asset/2011/03/background-on-apsa11-01-patch-schedule.html http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates_15.html http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html http://secunia.com/advisories/43751 http://secunia.com/advisories/43757 http://secunia.com/advisories/43772 http://secunia.com/advisories/43856 http://securityreason.com/securityalert/8152 http://www.ado •
CVE-2010-0453 – Solaris/Open Solaris UCODE_GET_VERSION IOCTL - Denial of Service
https://notcve.org/view.php?id=CVE-2010-0453
The ucode_ioctl function in intel/io/ucode_drv.c in Sun Solaris 10 and OpenSolaris snv_69 through snv_133, when running on x86 architectures, allows local users to cause a denial of service (panic) via a request with a 0 size value to the UCODE_GET_VERSION IOCTL, which triggers a NULL pointer dereference in the ucode_get_rev function, related to retrieval of the microcode revision. La función ucode_ioctl en intel/io/ucode_drv.c en Sun Solaris v10 y OpenSolaris desde snv_69 hasta snv_133, cuando es ejecutado sobre arquitecturas x86, permite a usuarios locales producir una denegación de servicio (panic) a través de una petición con un valor de tamaño 0 al IOCTL UCODE_GET_VERSION el cual inicia una desreferencia a un puntero nulo en la función ucode_get_rev, relacionado con el arreglo en la revisión de microcódigo. • https://www.exploit-db.com/exploits/11351 http://osvdb.org/62046 http://secunia.com/advisories/38452 http://sunsolve.sun.com/search/document.do?assetkey=1-21-143913-01-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-275910-1 http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021799.1-1 http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html http://www.securityfocus.com/archive/1/509276/100/0/threaded http://www.securityfocus.com/bid/ • CWE-20: Improper Input Validation •
CVE-2010-0310
https://notcve.org/view.php?id=CVE-2010-0310
Trusted Extensions in Sun Solaris 10 allows local users to gain privileges via vectors related to omission of unspecified libraries from software updates. Trusted Extensions en Sun Solaris 10, permite a usuarios locales obtener privilegios a través de vectores relacionados con la omisión de ciertas bibliotecas desde las actualizaciones de software. • http://secunia.com/advisories/38129 http://securitytracker.com/id?1023448 http://sunsolve.sun.com/search/document.do?assetkey=1-21-143502-01-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-275410-1 http://www.securityfocus.com/bid/37754 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8444 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2009-3851
https://notcve.org/view.php?id=CVE-2009-3851
Trusted Extensions in Sun Solaris 10 interferes with the operation of the xscreensaver-demo command for the XScreenSaver application, which makes it easier for physically proximate attackers to access an unattended workstation for which the intended screen locking did not occur, related to the "restart daemon." Trusted Extensions en Sun Solaris 10 interfiere con la operación del comando xscreensaver-demo para la aplicación XScreenSaver, lo que facilita a atacantes próximos físicamente acceder a una estación desatendida en la que el bloqueo de pantalla no ha sido efectivo. Relacionado con "restart daemon (reinicio del demonio)". • http://sunsolve.sun.com/search/document.do?assetkey=1-21-120094-28-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-270809-1 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6845 •
CVE-2009-3839
https://notcve.org/view.php?id=CVE-2009-3839
Unspecified vulnerability in the Solaris Trusted Extensions Policy configuration in Sun Solaris 10, and OpenSolaris snv_37 through snv_125, might allow remote attackers to execute arbitrary code by leveraging access to the X server. Vulnerabilidad sin especificar en la configuración de Solaris Trusted Extensions Policy en Sun Solaris 10 y Opensolaris snv_37 a la snv_125, podría permitir a atacantes remotos ejecutar código de su elección aprovechando el acceso al sevidor X. • http://secunia.com/advisories/37184 http://sunsolve.sun.com/search/document.do?assetkey=1-66-270969-1 http://www.securityfocus.com/bid/36840 http://www.vupen.com/english/advisories/2009/3070 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6480 •