CVE-2012-5144
https://notcve.org/view.php?id=CVE-2012-5144
Google Chrome before 23.0.1271.97, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, do not properly perform AAC decoding, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via vectors related to "an off-by-one overwrite when switching to LTP profile from MAIN." Google Chrome antes 23.0.1271.97 no realiza correctamente la decodificación AAC, que permite a atacantes remotos provocar una denegación de servicio (corrupción de pila de memoria) o posiblemente tener un impacto no especificado a través de vectores desconocidos. • http://googlechromereleases.blogspot.com/2012/12/stable-channel-update.html http://libav.org/releases/libav-0.7.7.changelog http://libav.org/releases/libav-0.8.5.changelog http://lists.opensuse.org/opensuse-updates/2012-12/msg00073.html http://www.ubuntu.com/usn/USN-1705-1 https://code.google.com/p/chromium/issues/detail?id=161639 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16007 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-5141
https://notcve.org/view.php?id=CVE-2012-5141
Google Chrome before 23.0.1271.97 does not properly restrict instantiation of the Chromoting client plug-in, which has unspecified impact and attack vectors. Google Chrome antes de 23.0.1271.97 no restringe correctamente creación de instancias del complemento cliente Chromoting, lo que tiene un impacto y vectores de ataque no especificados. • http://googlechromereleases.blogspot.com/2012/12/stable-channel-update.html http://lists.opensuse.org/opensuse-updates/2012-12/msg00073.html https://code.google.com/p/chromium/issues/detail?id=160456 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15428 •
CVE-2012-5137
https://notcve.org/view.php?id=CVE-2012-5137
Use-after-free vulnerability in Google Chrome before 23.0.1271.95 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the Media Source API. vulnerabilidad de uso después de liberación en Google Chrome antes de v23.0.1271.95 permite a atacantes remotos provocar una denegación de servicio o posiblemente tener un impacto no especificado a través de vectores relacionados con la API Media Source. • http://googlechromereleases.blogspot.com/2012/11/stable-channel-update_29.html http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html http://secunia.com/advisories/51447 http://www.securityfocus.com/bid/56741 https://code.google.com/p/chromium/issues/detail?id=162835 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15819 • CWE-416: Use After Free •
CVE-2012-5138
https://notcve.org/view.php?id=CVE-2012-5138
Google Chrome before 23.0.1271.95 does not properly handle file paths, which has unspecified impact and attack vectors. Google Chrome antes de v23.0.1271.95 no controla correctamente las rutas de archivos, lo que tiene impacto y vectores de ataque no especificados. • http://googlechromereleases.blogspot.com/2012/11/stable-channel-update_29.html http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html http://secunia.com/advisories/51447 http://www.securityfocus.com/bid/56741 https://code.google.com/p/chromium/issues/detail?id=161564 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15638 •
CVE-2012-5568
https://notcve.org/view.php?id=CVE-2012-5568
Apache Tomcat through 7.0.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris. Apache Tomcat hasta v7.0.x permite a atacantes remotos provocar una denegación de servicio (parada del demonio) a través de peticiones HTTP parciales, tal y como quedó demostrado por Slowloris. • http://captainholly.wordpress.com/2009/06/19/slowloris-vs-tomcat http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html http://openwall.com/lists/oss-security/2012/11/26/2 http://tomcat.10.n6.nabble.com/How-does-Tomcat-handle-a-slow-HTTP-DoS-tc2147776.html http://tomcat.10.n6.nabble.com/How-does-Tomcat-handle-a-slow-HTTP-DoS-tc2147779.html •