[ISN] Secunia Weekly Summary

From: InfoSec News (isnat_private)
Date: Thu Sep 18 2003 - 22:27:31 PDT

  • Next message: InfoSec News: "[ISN] Four questions to ask to stay secure in an anywhere, anytime world"

    ===========================================================================
    
                        The Secunia Weekly Advisory Summary
                              2003-09-11 - 2003-09-18
    
                             This week : 60 advisories
    
    ===========================================================================
    
    On September 10th Microsoft released a patch against three new RPC
    vulnerabilities. Several sources have reported that exploit code is in the
    wild.
    
    Make sure that your systems are patched and secure against a new series of
    possible Blaster like worms.
    
    Secunia has made an on-line test which quickly determines whether your
    system is vulnerable or not:
    http://www.secunia.com/MS03-039/
    
    For more information see SA9692:
    http://www.secunia.com/advisories/9692/
    
    
    Secunia - Stay Secure
    
    ===========================================================================
    
    ============
     2003-09-18
    ============
    
    Red Hat update for sendmail
    SA9768 - Highly critical
    http://www.secunia.com/advisories/9768/
    
     -- 
    
    FreeBSD update for sendmail
    SA9767 - Highly critical
    http://www.secunia.com/advisories/9767/
    
     -- 
    
    Gentoo update for sendmail
    SA9766 - Highly critical
    http://www.secunia.com/advisories/9766/
    
     -- 
    
    Mandrake update for sendmail
    SA9765 - Highly critical
    http://www.secunia.com/advisories/9765/
    
    
    ============
     2003-09-17
    ============
    
    OpenBSD update for sendmail
    SA9764 - Highly critical
    http://www.secunia.com/advisories/9764/
    
     -- 
    
    Slackware update for sendmail
    SA9763 - Highly critical
    http://www.secunia.com/advisories/9763/
    
     -- 
    
    Red Hat update for sendmail
    SA9762 - Highly critical
    http://www.secunia.com/advisories/9762/
    
     -- 
    
    OpenPKG update for OpenSSH
    SA9761 - Highly critical
    http://www.secunia.com/advisories/9761/
    
     -- 
    
    Yahoo! Chat and Messenger Stack and Heap Overflows
    SA9760 - Highly critical
    http://www.secunia.com/advisories/9760/
    
     -- 
    
    SGI Irix update for NFS
    SA9759 - Less critical
    http://www.secunia.com/advisories/9759/
    
     -- 
    
    Sendmail prescan() Vulnerability
    SA9758 - Highly critical
    http://www.secunia.com/advisories/9758/
    
     -- 
    
    XFree Weak Session Cookies
    SA9757 - Less critical
    http://www.secunia.com/advisories/9757/
    
     -- 
    
    Cisco Multiple Products Affected by OpenSSH Vulnerability
    SA9756 - Highly critical
    http://www.secunia.com/advisories/9756/
    
     -- 
    
    Mandrake update for KDE
    SA9755 - Less critical
    http://www.secunia.com/advisories/9755/
    
     -- 
    
    Red Hat update for KDE
    SA9754 - Less critical
    http://www.secunia.com/advisories/9754/
    
     -- 
    
    KDE Privilege Escalation and Weak Session Cookie
    SA9753 - Less critical
    http://www.secunia.com/advisories/9753/
    
     -- 
    
    Slackware update for OpenSSH
    SA9752 - Highly critical
    http://www.secunia.com/advisories/9752/
    
     -- 
    
    Mandrake update for OpenSSH
    SA9751 - Highly critical
    http://www.secunia.com/advisories/9751/
    
     -- 
    
    SuSE update for OpenSSH
    SA9750 - Highly critical
    http://www.secunia.com/advisories/9750/
    
     -- 
    
    Gentoo update for OpenSSH
    SA9749 - Highly critical
    http://www.secunia.com/advisories/9749/
    
     -- 
    
    OpenBSD update for OpenSSH
    SA9746 - Highly critical
    http://www.secunia.com/advisories/9746/
    
     -- 
    
    FreeBSD update for OpenSSH
    SA9745 - Highly critical
    http://www.secunia.com/advisories/9745/
    
    
    ============
     2003-09-16
    ============
    
    Debian update for OpenSSH
    SA9748 - Highly critical
    http://www.secunia.com/advisories/9748/
    
     -- 
    
    Red Hat update for OpenSSH
    SA9747 - Highly critical
    http://www.secunia.com/advisories/9747/
    
     -- 
    
    EnGarde update for OpenSSH
    SA9744 - Highly critical
    http://www.secunia.com/advisories/9744/
    
     -- 
    
    OpenSSH "buffer_append_space()" Buffer Management Vulnerability
    SA9743 - Highly critical
    http://www.secunia.com/advisories/9743/
    
     -- 
    
    Sun Solaris Sadmind Insecure Default Configuration
    SA9742 - Moderately critical
    http://www.secunia.com/advisories/9742/
    
     -- 
    
    Spider Privilege Escalation Vulnerability
    SA9741 - Not critical
    http://www.secunia.com/advisories/9741/
    
     -- 
    
    Nokia Electronic Documentation Multiple Vulnerabilities
    SA9740 - Less critical
    http://www.secunia.com/advisories/9740/
    
     -- 
    
    WideChapter URL Buffer Overflow Vulnerability
    SA9739 - Highly critical
    http://www.secunia.com/advisories/9739/
    
     -- 
    
    Forum Web Server Directory Traversal and Login Bypass
    SA9738 - Moderately critical
    http://www.secunia.com/advisories/9738/
    
     -- 
    
    Gentoo update for Pine
    SA9737 - Highly critical
    http://www.secunia.com/advisories/9737/
    
     -- 
    
    Easy File Sharing Web Server Cross Site Scripting and Directory Traversal
    SA9736 - Moderately critical
    http://www.secunia.com/advisories/9736/
    
     -- 
    
    DBabble Cross Site Scripting Vulnerability
    SA9735 - Less critical
    http://www.secunia.com/advisories/9735/
    
    
    ============
     2003-09-15
    ============
    
    SCO OpenServer Internet Manager Privilege Escalation
    SA9734 - Less critical
    http://www.secunia.com/advisories/9734/
    
     -- 
    
    Gentoo update for Exim
    SA9733 - Moderately critical
    http://www.secunia.com/advisories/9733/
    
     -- 
    
    OpenPKG update for MySQL
    SA9732 - Not critical
    http://www.secunia.com/advisories/9732/
    
     -- 
    
    Bandwebsite Lack of Authentication
    SA9731 - Moderately critical
    http://www.secunia.com/advisories/9731/
    
     -- 
    
    Gentoo update for MySQL
    SA9730 - Not critical
    http://www.secunia.com/advisories/9730/
    
     -- 
    
    Eudora Multiple Vulnerabilities
    SA9729 - Highly critical
    http://www.secunia.com/advisories/9729/
    
     -- 
    
    MyServer math_sum.mscgi Buffer Overflow Vulnerability
    SA9728 - Highly critical
    http://www.secunia.com/advisories/9728/
    
     -- 
    
    Conectiva update for gtkhtml
    SA9727 - Less critical
    http://www.secunia.com/advisories/9727/
    
     -- 
    
    Debian update for MySQL
    SA9726 - Not critical
    http://www.secunia.com/advisories/9726/
    
    
    ============
     2003-09-13
    ============
    
    Conectiva update for Pine
    SA9725 - Highly critical
    http://www.secunia.com/advisories/9725/
    
     -- 
    
    Debian update for XFree86
    SA9724 - Moderately critical
    http://www.secunia.com/advisories/9724/
    
     -- 
    
    OpenBSD Semaphore Limit Integer Overflow
    SA9722 - Not critical
    http://www.secunia.com/advisories/9722/
    
     -- 
    
    FTGatePro Exposure of Sensitive Information
    SA9719 - Less critical
    http://www.secunia.com/advisories/9719/
    
     -- 
    
    Asterisk CallerID SQL Injection Vulnerability
    SA9718 - Moderately critical
    http://www.secunia.com/advisories/9718/
    
     -- 
    
    Microsoft ASP.NET Request Validation Bypass Vulnerability
    SA9716 - Less critical
    http://www.secunia.com/advisories/9716/
    
     -- 
    
    Gordano Exposure of Information and Denial of Service
    SA9714 - Not critical
    http://www.secunia.com/advisories/9714/
    
    
    ============
     2003-09-12
    ============
    
    4D WebSTAR Remotely Exploitable Buffer Overflow
    SA9723 - Highly critical
    http://www.secunia.com/advisories/9723/
    
     -- 
    
    myPHPNuke Arbitrary File Inclusion Vulnerability
    SA9721 - Highly critical
    http://www.secunia.com/advisories/9721/
    
     -- 
    
    Windows 2003 Server Buffer Overflow Protection Mechanism Bypass
    SA9720 - Less critical
    http://www.secunia.com/advisories/9720/
    
     -- 
    
    EnGarde update for Pine
    SA9717 - Highly critical
    http://www.secunia.com/advisories/9717/
    
     -- 
    
    Mandrake update for XFree86
    SA9715 - Less critical
    http://www.secunia.com/advisories/9715/
    
     -- 
    
    OpenVMS update for DCE/COM
    SA9713 - Less critical
    http://www.secunia.com/advisories/9713/
    
     -- 
    
    Invision Power Board BBCode Tags Cross-Site Scripting
    SA9712 - Less critical
    http://www.secunia.com/advisories/9712/
    
    
    ============
     2003-09-11
    ============
    
    Microsoft Internet Explorer Multiple Vulnerabilities
    SA9711 - Highly critical
    http://www.secunia.com/advisories/9711/
    
     -- 
    
    Debian update for sane-backends
    SA9710 - Less critical
    http://www.secunia.com/advisories/9710/
    
     -- 
    
    MySQL Set Password Privilege Escalation Vulnerability
    SA9709 - Not critical
    http://www.secunia.com/advisories/9709/
    
    
    ===========================================================================
    
    Secunia recommends that you verify all advisories you receive, by clicking
    the link.
    Secunia NEVER sends attached files with advisories.
    Secunia does not advise people to install third party patches, only use
    those supplied by the vendor.
    
    Contact details:
    Web	: http://www.secunia.com/
    E-mail	: supportat_private
    Tel	: +44 (0) 20 7016 2693
    Fax	: +44 (0) 20 7637 0419
    
    ===========================================================================
    
    
    
    -
    ISN is currently hosted by Attrition.org
    
    To unsubscribe email majordomoat_private with 'unsubscribe isn'
    in the BODY of the mail.
    



    This archive was generated by hypermail 2b30 : Fri Sep 19 2003 - 01:39:27 PDT