Hackers constantly look out for vulnerabilities to gain control of computer systems and IT networks. Brutal cyber threats and high-end data breaches are as usual, on the rise. The US-CERT Cyber Security Bulletin provides a summary of latest vulnerabilities that have been recorded by its research department for the week of December 29, 2014.
The National Institute of Standards and Technology (NIST) have found vulnerabilities that can make a system prone to malware attacks and unauthorized access.
Common vulnerabilities and their impact recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week are:
- AjaXplorer, unrestricted file upload vulnerability in plugins/editor.zoho/agent/save_zoho.php in the Zoho plugin in Pydio (formerly AjaXplorer) before 5.0.4 allows remote attackers to execute arbitrary code by uploading an executable file, and then accessing this file at a location specified by the format parameter of a move operation. It allows unauthorized disclosure of information, unauthorized modification and disruption of service. Find out other vulnerable versions from here: https://1.usa.gov/1BxNxXt
- EaseWeFtp.FtpLibrary ActiveX control in EaseWeFtp.ocx in Easewe FTP OCX 4.5.0.9 does not restrict access to certain methods, which allows remote attackers to execute arbitrary files via a pathname in the first argument to the execute or run method, write to arbitrary files via a pathname in the argument to the CreateLocalFile method, create arbitrary directories via a pathname in the argument to the CreateLocalFolder method, or delete arbitrary files via a pathname in the argument to the DeleteLocalFile method. Find out other vulnerable versions from here: https://1.usa.gov/1Armyv2
- CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string. Find out other vulnerable versions from here: https://1.usa.gov/1wom05g
- Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a Denial-Of-Service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split function. Find out other vulnerable versions from here: https://1.usa.gov/1DwqtaZ
- Double free vulnerability in the ssl_parse_clienthello_use_srtp_ext function in d1_srtp.c in LibreSSL before 2.1.2 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a certain length-verification error during processing of a DTLS handshake. Find out other vulnerable versions from here: https://1.usa.gov/1BJMIsG
- SQL injection vulnerability in social-slider-2/ajax.php in the Social Slider plugin before 7.4.2 for WordPress allows remote attackers to execute arbitrary SQL commands via the rA array parameter. Find out other vulnerable versions from here: https://1.usa.gov/1zSYy1e
- A vulnerability in VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly execute arbitrary code via a crafted byte stream to the (1) AVI, (2) ASF, or (3) Matroska (aka MKV) demuxer. Find out other vulnerable versions from here: https://1.usa.gov/1w0V36w
- Cross-site request forgery (CSRF) vulnerability in pages.php in Wikipad 1.6.0 allows remote attackers to hijack the authentication of administrators for requests that modify pages via the data [text] parameter. Find out other vulnerable versions from here: https://1.usa.gov/1wTHm9B
- Unquoted Windows search path vulnerability in EMC Replication Manager through 5.5.2 and AppSync before 2.1.0 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character. Find out other vulnerable versions from here: https://1.usa.gov/1tIfN3c
There are many such vulnerable software ranked in the division of high, medium, and low severities.
To know more about these vulnerable software and the affected versions, read the US-CERT Cyber Security Bulletin from here: https://1.usa.gov/1BxQ0RD.Hackers constantly look out for vulnerabilities to gain control of computer systems and IT networks. Brutal cyber threats and high-end data breaches are as usual, on the rise. The US-CERT Cyber Security Bulletin provides a summary of latest vulnerabilities that have been recorded by its research department for the week of December 29, 2014.
The National Institute of Standards and Technology (NIST) have found vulnerabilities that can make a system prone to malware attacks and unauthorized access.
Common vulnerabilities and their impact recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week are:
AjaXplorer, unrestricted file upload vulnerability in plugins/editor.zoho/agent/save_zoho.php in the Zoho plugin in Pydio (formerly AjaXplorer) before 5.0.4 allows remote attackers to execute arbitrary code by uploading an executable file, and then accessing this file at a location specified by the format parameter of a move operation. It allows unauthorized disclosure of information, unauthorized modification and disruption of service. Find out other vulnerable versions from here: https://1.usa.gov/1BxNxXt
EaseWeFtp.FtpLibrary ActiveX control in EaseWeFtp.ocx in Easewe FTP OCX 4.5.0.9 does not restrict access to certain methods, which allows remote attackers to execute arbitrary files via a pathname in the first argument to the execute or run method, write to arbitrary files via a pathname in the argument to the CreateLocalFile method, create arbitrary directories via a pathname in the argument to the CreateLocalFolder method, or delete arbitrary files via a pathname in the argument to the DeleteLocalFile method. Find out other vulnerable versions from here: https://1.usa.gov/1Armyv2
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string. Find out other vulnerable versions from here: https://1.usa.gov/1wom05g
Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a Denial-Of-Service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split function. Find out other vulnerable versions from here: https://1.usa.gov/1DwqtaZ
Double free vulnerability in the ssl_parse_clienthello_use_srtp_ext function in d1_srtp.c in LibreSSL before 2.1.2 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a certain length-verification error during processing of a DTLS handshake. Find out other vulnerable versions from here: https://1.usa.gov/1BJMIsG
SQL injection vulnerability in social-slider-2/ajax.php in the Social Slider plugin before 7.4.2 for WordPress allows remote attackers to execute arbitrary SQL commands via the rA array parameter. Find out other vulnerable versions from here: https://1.usa.gov/1zSYy1e
A vulnerability in VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly execute arbitrary code via a crafted byte stream to the (1) AVI, (2) ASF, or (3) Matroska (aka MKV) demuxer. Find out other vulnerable versions from here: https://1.usa.gov/1w0V36w
Cross-site request forgery (CSRF) vulnerability in pages.php in Wikipad 1.6.0 allows remote attackers to hijack the authentication of administrators for requests that modify pages via the data [text] parameter. Find out other vulnerable versions from here: https://1.usa.gov/1wTHm9B
Unquoted Windows search path vulnerability in EMC Replication Manager through 5.5.2 and AppSync before 2.1.0 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character. Find out other vulnerable versions from here: https://1.usa.gov/1tIfN3c
There are many such vulnerable software ranked in the division of high, medium, and low severities.
To know more about these vulnerable software and the affected versions read the US-CERT Cyber Security Bulletin from here: https://1.usa.gov/1BxQ0RD.