Вы находитесь на странице: 1из 2

Exploits

XAMPP 1.7.3

I. File disclosure: XAMPP is vulnerable to a remote file disclosure attack.


The vulnerability exists within the web application supplied with XAMPP.
II. Cross Site Scripting: It is interesting to see the same programming error lead to
another security vulnerability. Some PHP scripts in the XAMPP dir rely on
$_SERVER['PHP_SELF'] for retrieving the "action" tag for HTML forms. This can be exploited
to perform Cross Site Scripting attacks.

DNS BIND 9.3.0

BIND 9.3.0 vulnerable to denial of service in validator code


Overview
A vulnerability in the BIND name server could allow a remote attacker to cause a denial of service against
an affected system.
Description
The Berkeley Internet Name Domain (BIND) is a popular Domain Name System (DNS) implementation
from Internet Systems Consortium (ISC). BIND supports the DNS Security Extensions (DNSSEC),
including the NextSECure (NSEC) RDATA Format defined by RFC3845. An incorrect assumption in the
validator function authvalidated()can result in an internal consistancy test failing and named exiting. An
attacker with the ability to craft specific DNS packets could exploit this vulnerability to cause a denial of
service. This vulnerability only affects BIND version 9.3.0.
Impact
A remote attacker may be able to cause the name server daemon to exit prematurely, thereby causing a
denial of service for DNS operations.

SQUID 2.6

A remote attacker could cause a denial of service or execute arbitrary commands.


There exists a denial of service vulnerability in the way Squid handles HTTP headers. The vulnerability is due
to an infinite loop error when processing HTTP headers containing a specific delimiter character. Remote

unauthenticated attackers can exploit this vulnerability by sending specially crafted HTTP request packets
containing malicious HTTP headers. Successful exploitation would consume system resources and may cause
the service to terminate.
Squid 2.6. Has a flaw in the way it manipulated HTTP headers for cached objects stored in system memory.
An attacker could use this flaw to cause a squid child process to exit. This interrupted existing connections
and made proxy services unavailable. Note: the parent squid process started a new child process, so this
attack only resulted in a temporary denial of service.

SAMBA 3.4

Samba 3.4 is prone to a directory-traversal vulnerability because the


application fails to sufficiently sanitize user-supplied input.
Exploits would allow an attacker to access files outside of the Samba user's
root directory to obtain sensitive information and perform other attacks.
To exploit this issue, attackers require authenticated access to a writable
share. Note that this issue may be exploited through a writable share
accessible by guest accounts.
OpenLDAP 2.3
OpenLDAP 2.3 is prone to a remote denial-of-service vulnerability that affects
the 'modify relative distinguished name' (modrdn) command.
Attackers can exploit this issue to deny service to legitimate users by
crashing affected 'slapd' servers.

Вам также может понравиться