[ISN] Secunia Weekly Summary

From: InfoSec News (isnat_private)
Date: Fri Sep 12 2003 - 00:11:28 PDT

  • Next message: InfoSec News: "[ISN] The wrong way to upgrade your RPMs"

    ===========================================================================
    
                        The Secunia Weekly Advisory Summary
                              2003-09-04 - 2003-09-11
    
                             This week : 38 advisories
    
    ===========================================================================
    
    Are you protected against the next attack wave ?
    
    The Object Data vulnerability (SA9580 / MS03-032) is still wide open, at
    current there is NO working patch.
    
    Protect your network:
    http://www.secunia.com/advisories/9580/
    
    Yesterday Microsoft released a patch against new RPC vulnerabilities
    (SA9692 / MS03-039), possibly allowing a new Blaster worm to cause havoc.
    
    Patch up now:
    http://www.secunia.com/advisories/9692/
    
    Secunia - Stay Secure
    
    ===========================================================================
    
    ============
     2003-09-11
    ============
    
    SuSE update for Pine
    SA9708 - Highly critical
    http://www.secunia.com/advisories/9708/
    
     -- 
    
    Red Hat update for Pine
    SA9707 - Highly critical
    http://www.secunia.com/advisories/9707/
    
     -- 
    
    Slackware update for Pine
    SA9706 - Highly critical
    http://www.secunia.com/advisories/9706/
    
     -- 
    
    Pine Message Parsing Buffer Overflow Vulnerabilities
    SA9705 - Highly critical
    http://www.secunia.com/advisories/9705/
    
    
    ============
     2003-09-10
    ============
    
    RealOne Player Privilege Escalation Vulnerability
    SA9704 - Less critical
    http://www.secunia.com/advisories/9704/
    
     -- 
    
    phpBB URL BBCode Tag Cross-Site Scripting Vulnerability
    SA9703 - Less critical
    http://www.secunia.com/advisories/9703/
    
     -- 
    
    Escapade Error Page Cross-Site Scripting and Path Disclosure
    SA9702 - Less critical
    http://www.secunia.com/advisories/9702/
    
     -- 
    
    WebX Directory Traversal Vulnerability
    SA9701 - Moderately critical
    http://www.secunia.com/advisories/9701/
    
     -- 
    
    Roger Wilco Client Data Buffer Overflow Vulnerability
    SA9693 - Highly critical
    http://www.secunia.com/advisories/9693/
    
     -- 
    
    Microsoft Windows RPCSS Service DCOM Interface Vulnerabilities
    SA9692 - Highly critical
    http://www.secunia.com/advisories/9692/
    
    
    ============
     2003-09-09
    ============
    
    Apache::Gallery Privilege Escalation Vulnerability
    SA9700 - Less critical
    http://www.secunia.com/advisories/9700/
    
     -- 
    
    Red Hat GtkHTML HTML Message Denial of Service Vulnerability
    SA9699 - Less critical
    http://www.secunia.com/advisories/9699/
    
     -- 
    
    Conectiva update for stunnel
    SA9698 - Moderately critical
    http://www.secunia.com/advisories/9698/
    
     -- 
    
    Net-SNMP Unauthenticated MIB Object Access Vulnerability
    SA9697 - Moderately critical
    http://www.secunia.com/advisories/9697/
    
     -- 
    
    SCO OpenServer update for BIND
    SA9696 - Highly critical
    http://www.secunia.com/advisories/9696/
    
     -- 
    
    OSSIM Multiple SQL Injection Vulnerabilities
    SA9695 - Moderately critical
    http://www.secunia.com/advisories/9695/
    
     -- 
    
    WinAMP MIDI File Buffer Overflow Vulnerability
    SA9694 - Moderately critical
    http://www.secunia.com/advisories/9694/
    
     -- 
    
    Stunnel Local Server Hijacking Vulnerability
    SA9691 - Less critical
    http://www.secunia.com/advisories/9691/
    
     -- 
    
    Conectiva update for exim
    SA9690 - Moderately critical
    http://www.secunia.com/advisories/9690/
    
     -- 
    
    Conectiva update for pam_smb
    SA9689 - Moderately critical
    http://www.secunia.com/advisories/9689/
    
     -- 
    
    Debian Mah-Jong Two Unspecified Vulnerabilities
    SA9687 - Highly critical
    http://www.secunia.com/advisories/9687/
    
     -- 
    
    KokeshCMS Unauthenticated Content Editing Vulnerability
    SA9685 - Highly critical
    http://www.secunia.com/advisories/9685/
    
    
    ============
     2003-09-08
    ============
    
    ICQ Web Front Cross Site Scripting
    SA9688 - Less critical
    http://www.secunia.com/advisories/9688/
    
     -- 
    
    FTP Desktop Banner Buffer Overflow Vulnerability
    SA9686 - Moderately critical
    http://www.secunia.com/advisories/9686/
    
     -- 
    
    cmdftp File Listing Heap Overflow Vulnerability
    SA9684 - Moderately critical
    http://www.secunia.com/advisories/9684/
    
     -- 
    
    RealSecure Server Sensor HTTPS Request Denial of Service
    SA9683 - Moderately critical
    http://www.secunia.com/advisories/9683/
    
     -- 
    
    HP Tru64 update for dtterm
    SA9679 - Not critical
    http://www.secunia.com/advisories/9679/
    
    
    ============
     2003-09-05
    ============
    
    Digital Scribe Cross-Site Scripting Vulnerabilities
    SA9682 - Less critical
    http://www.secunia.com/advisories/9682/
    
     -- 
    
    Python Publishing Accessories Cross-Site Scripting Vulnerability
    SA9681 - Less critical
    http://www.secunia.com/advisories/9681/
    
     -- 
    
    leafnode remote Denial of Service
    SA9678 - Not critical
    http://www.secunia.com/advisories/9678/
    
     -- 
    
    HP Internet Express update for Sendmail
    SA9677 - Moderately critical
    http://www.secunia.com/advisories/9677/
    
     -- 
    
    Debian update for WU-FTPD
    SA9676 - Highly critical
    http://www.secunia.com/advisories/9676/
    
     -- 
    
    Debian update for exim and exim-tls
    SA9675 - Moderately critical
    http://www.secunia.com/advisories/9675/
    
     -- 
    
    Asterisk SIP Request Buffer Overflow Vulnerability
    SA9674 - Highly critical
    http://www.secunia.com/advisories/9674/
    
    
    ============
     2003-09-04
    ============
    
    Go2Call Denial of Service Vulnerability
    SA9673 - Not critical
    http://www.secunia.com/advisories/9673/
    
     -- 
    
    WebCalendar Cross Site Scripting Vulnerability
    SA9672 - Less critical
    http://www.secunia.com/advisories/9672/
    
     -- 
    
    WS_FTP Server FTP Command Buffer Overflow Vulnerability
    SA9671 - Highly critical
    http://www.secunia.com/advisories/9671/
    
     -- 
    
    Red Hat update for httpd
    SA9670 - Less critical
    http://www.secunia.com/advisories/9670/
    
    
    ===========================================================================
    
    Secunia recommends that you verify all advisories you receive, by clicking
    the link.
    Secunia NEVER sends attached files with advisories.
    Secunia does not advise people to install third party patches, only use
    those supplied by the vendor.
    
    Contact details:
    Web	: http://www.secunia.com/
    E-mail	: supportat_private
    Tel	: +44 (0) 20 7016 2693
    Fax	: +44 (0) 20 7637 0419
    
    ===========================================================================
    
    
    
    -
    ISN is currently hosted by Attrition.org
    
    To unsubscribe email majordomoat_private with 'unsubscribe isn'
    in the BODY of the mail.
    



    This archive was generated by hypermail 2b30 : Fri Sep 12 2003 - 02:50:40 PDT