Have you ever been a victim of cyber-crime? If you have not been yet, then you are lucky! However, if you feel that you have so far escaped the attention of the cyber-criminals, there can be a doubt on this. Many a times, cyber-attacks may not be reflecting with immediate effect. And, there is also a possibility that you may not even realize that you have been a victim until you get to know from someone else.
The US-CERT Cyber Security Bulletin provides a summary of latest vulnerabilities that have been recorded by its research department for the week of February 16, 2015. The National Institute of Standards and Technology (NIST) have found vulnerabilities that can make a system prone to malware attacks and unauthorized access.
Common vulnerabilities and their impact recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week are:
- Multiple integer overflows in the GraphicBuffer::unflatten function in platform/frameworks/native/libs/ui/GraphicBuffer.cpp in Android through 5.0 allow attackers to gain privileges or cause a denial of service (memory corruption) via vectors that trigger a large number of (1) file descriptors or (2) integer values. Find out other vulnerable versions from here: https://1.usa.gov/1B7rVls.
- LG On-Screen Phone (OSP) before 4.3.010 allows remote attackers to bypass authorization via a crafted request. Find out other vulnerable versions from here: https://1.usa.gov/1A2rQtR.
- The ActiveMQ Broker in Samsung Security Manager (SSM) before 1.31 allows remote attackers to delete arbitrary files, and consequently cause a denial of service, via a DELETE request. Find out other vulnerable versions from here: https://1.usa.gov/17t2m2b.
- Multiple cross-site scripting (XSS) vulnerabilities in Adminsystems CMS before 4.0.2 allow remote attackers to inject arbitrary web script or HTML via the (1) page parameter to index.php or (2) id parameter in a users_users action to asys/site/system.php. Find out other vulnerable versions from here: https://1.usa.gov/1vugh2Y.
- The FancyBox for WordPress plugin before 3.0.3 for WordPress does not properly restrict access, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the mfbfw parameter in an update action to wp-admin/admin-post.php, as exploited in the wild in February 2015. Find out other vulnerable versions from here: https://1.usa.gov/1AF0oWA.
- The Google Email application 4.2.2.0200 for Android allows remote attackers to cause a denial of service (persistent application crash) via a “Content-Disposition: ;” header in an e-mail message. Find out other vulnerable versions from here: https://1.usa.gov/1FRVMRx.
- Curam Universal Access in IBM Curam Social Program Management 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4.5 before iFix007, 6.0.5.4 before iFix005, and 6.0.5.5 before iFix003, when SPI inclusion is enabled, allows remote attackers to obtain sensitive user data by visiting an unspecified page. Find out other vulnerable versions from here: https://1.usa.gov/1zBKdXo.
- Cross-site scripting (XSS) vulnerability in the Google Doc Embedder plugin before 2.5.19 for WordPress allows remote attackers to inject arbitrary web script or HTML via the profile parameter in an edit action in the gde-settings page to wp-admin/options-general.php. Find out other vulnerable versions from here: https://1.usa.gov/1vuhNlD.
- The senddocument.php in Zarafa WebApp before 2.0 beta 3 and WebAccess in Zarafa Collaboration Platform (ZCP) 7.x before 7.1.12 beta 1 and 7.2.x before 7.2.0 beta 1 allows remote attackers to cause a denial of service (/tmp disk consumption) by uploading a large number of files. Find out other vulnerable versions from here: https://1.usa.gov/1A2u3Fv.
- CRLF injection vulnerability in Squid before 3.1.10 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted header in a response. Find out other vulnerable versions from here: https://1.usa.gov/1JFQNq2.
There are many such vulnerable software ranked in the division of high, medium, and low severities. To know more about these vulnerable software and the affected versions, please read the US-CERT Cyber Security Bulletin from here: https://1.usa.gov/1DNHH5r.