Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

VULNERABILITIES \ FIXES - November 9, 2008

Nov 9, 2008 1:12AM PST

Orb Media Server Directory Traversal

9 Nov. 2008

Summary
Orb Networks' Orb media server is vulnerable to directory traversal attacks. Users can leverage specially crafted GET requests to read arbitrary files.

Credit:
The information has been provided by Steven James and r at b13$.

http://www.securiteam.com/windowsntfocus/6T0072KN5W.html

Discussion is locked

- Collapse -
Multiple Vendor NOS Microsystems getPlus Downloader Stack Bu
Nov 9, 2008 1:13AM PST

Multiple Vendor NOS Microsystems getPlus Downloader Stack Buffer Overflow Vulnerability

9 Nov. 2008

Summary
The getPlus Download Manager is "a software management tool. It is used to download, install, and update other software through the browser. The getPlus Download Manager consists of an ActiveX control that is used to prompt users to install other vendor's software. Adobe uses this control for web based installations of Adobe Reader. If a client installed Adobe Reader through the Adobe website, they will have the control on their system". Remote exploitation of a stack based buffer overflow vulnerability in NOS Microsystems Ltd.'s getPlus Download Manager, potentially used by multiple vendors, could allow an attacker to execute arbitrary code with the privileges of the current user.

Credit:
The information has been provided by iDefense Labs Security Advisories.
The original article can be found at: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=754

http://www.securiteam.com/windowsntfocus/6U0082KN5Y.html

- Collapse -
VLC Media Player RealText Processing Stack Overflow Vulnerab
Nov 9, 2008 1:14AM PST

9 Nov. 2008

ummary
The VLC media player contains a stack overflow vulnerability while parsing malformed RealText (rt) subtitle files. The vulnerability can be trivially exploited by a (remote) attacker to execute arbitrary code in the context of VLC media player.

VLC handles subtitles automatically. It just checks the presence of a subtitle file with the same name of the loaded video. If such a subtitle file is found, VLC loads and parses the file.

Credit:
The information has been provided by Tobias Klein.
The original article can be found at: http://www.trapkit.de/advisories/TKADV2008-011.txt

http://www.securiteam.com/unixfocus/6S0062KN5U.html

- Collapse -
Adobe Acrobat And Reader AcroJS Heap Corruption Vulnerabilit
Nov 9, 2008 1:15AM PST

9 Nov. 2008

Summary
Adobe Reader is "a program for viewing Portable Document Format (PDF) documents". Remote exploitation of a heap corruption vulnerability in Adobe Systems Inc.'s Acrobat Professional and Reader could allow an attacker to execute arbitrary code with the privileges of the current user.

Credit:
The information has been provided by iDefense Labs Security Advisories.
The original article can be found at: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=756

http://www.securiteam.com/securitynews/6O0022KN5O.html

- Collapse -
Adobe Reader Embedded Font Handling Out of Bounds Array Inde
Nov 9, 2008 1:17AM PST

Adobe Reader Embedded Font Handling Out of Bounds Array Indexing Vulnerability

9 Nov. 2008

Summary
dobe Acrobat Reader is "a program for viewing Portable Document Format (PDF) documents". Remote exploitation of an out of bounds array access vulnerability in Adobe System Inc.'s Adobe Reader could allow an attacker to execute arbitrary code as the current user.

Credit:
The information has been provided by iDefense Labs Security Advisories.
The original article can be found at: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=755

http://www.securiteam.com/securitynews/6P0032KN5M.html

- Collapse -
2WIRE DSL Router (xslt) Denial of Service Vulnerability
Nov 9, 2008 1:18AM PST
- Collapse -
hMAilServer PHPWebAdmin File Inclusion Vulnerabilities
Nov 9, 2008 3:32AM PST

Critical:
Highly critical
Impact: Exposure of sensitive information
System access
Where: From remote
Solution Status: Unpatched

Software: hMailServer 4.x

Description:
Nine:Situations:Group::strawdog has discovered some vulnerabilities in hMailServer PHPWebAdmin, which can be exploited by malicious people to disclose potentially sensitive information and compromise a vulnerable system.

Solution:
Edit the source code to ensure that input is properly verified.

Provided and/or discovered by:
Nine:Situations:Group::strawdog

Original Advisory:
http://milw0rm.com/exploits/7012