======================================================================== The Secunia Weekly Advisory Summary 2003-12-04 - 2003-12-11 This week : 51 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: The Secunia staff is spending hours every day to assure you the best and most reliable source for vulnerability information. Every single vulnerability report is being validated and verified before a Secunia advisory is written. Secunia validates and verifies vulnerability reports in many different ways e.g. by downloading the software and performing comprehensive tests, by reviewing source code, or by validating the credibility of the source from which the vulnerability report was issued. As a result, Secunia's database is the most correct and complete source for recent vulnerability information available on the Internet. Secunia Online Vulnerability Database: http://www.secunia.com/ ======================================================================== 2) This Week in Brief: A vulnerability in the rsync service has been identified, which reportedly has been used in the compromise of several servers in the past few months. The vulnerability allows malicious people to execute arbitrary code with privileges of the rsync service. Also, almost all Linux distributors have been very fast to issue fixed packages for this vulnerability, and all administrators are advised to check for available updates. Ref.: [SA10353] Another vulnerability in Internet Explorer has been revealed. This time it is possible to completely spoof content in the address bar. This could easily be used to trick users into believing they are on a trusted domain rather than on a malicious web site trying to get users to reveal sensitive information. Users are advised not to follow links from untrusted sources or to verify digital certificates before entering any sensitive information. Ref.: [SA10395] Yahoo! Messenger has been reported vulnerable to Cross-Site Scripting attacks. The vulnerability can be used to execute HTML or script code in context of Yahoo! Messenger. All users of Yahoo! Messenger are advised to install the fixed version. Ref.: [SA10370] TIP: Finding Secunia advisories is easily done through the Secunia web site. Simply enter the SA ID in the URL: http://secunia.com/SA10395 ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA10353] rsync Unspecified Heap Overflow Vulnerability 2. [SA10395] Internet Explorer URL Spoofing Vulnerability 3. [SA10289] Internet Explorer System Compromise Vulnerabilities 4. [SA10252] Apple Safari Cookie Stealing Vulnerability 5. [SA10342] Yahoo! Messenger "yauto.dll" Buffer Overflow Vulnerability 6. [SA10328] Linux Kernel "do_brk()" Privilege Escalation Vulnerability 7. [SA10371] Oracle Multiple Product OpenSSL Vulnerabilities 8. [SA9711] Microsoft Internet Explorer Multiple Vulnerabilities 9. [SA8742] Microsoft Windows Media Player skin download vulnerability 10. [SA10372] Novell eDirectory SSL/TLS ASN.1 Parser Vulnerabilities ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA10379] eZnetwork HTTP Request Buffer Overflow Vulnerability [SA10395] Internet Explorer URL Spoofing Vulnerability [SA10370] Yahoo! Messenger IMVironment Cross-Site Scripting Vulnerability [SA10382] VP-ASP Shopping Cart "shopdisplayproducts.asp" Cross-Site Scripting [SA10375] A-CART "register.asp" Cross-Site Scripting Vulnerability [SA10368] WebSense Cross Site Scripting Vulnerability UNIX/Linux: [SA10378] Immunix update for rsync [SA10364] Mandrake update for rsync [SA10363] Red Hat update for rsync [SA10362] EnGarde update for rsync [SA10361] Conectiva update for rsync [SA10360] Fedora update for rsync [SA10359] OpenPKG update for rsync [SA10357] SuSE update for rsync [SA10356] Debian update for rsync [SA10354] Slackware update for rsync [SA10353] rsync Unspecified Heap Overflow Vulnerability [SA10391] Tarantella Enterprise OpenSSL Vulnerabilities [SA10385] Mathopd Remotely Exploitable Buffer Overflow [SA10374] Ebola AV Daemon Authentication Buffer Overflow Vulnerability [SA10401] Mandrake update for ethereal [SA10400] Red Hat update for gnupg [SA10399] Fedora update for gnupg [SA10386] Abyss Web Server Directory Protection Bypass Vulnerability [SA10377] Conectiva update for kernel [SA10407] Gentoo update for cvs [SA10390] Sun Cobalt update for Apache / mod_ssl [SA10388] CVS Creation of Arbitrary Directories [SA10392] cdwrite Insecure Temporary File Creation Vulnerability [SA10387] Mandrake update for screen [SA10384] Sun Solaris dtprintinfo Privilege Escalation Vulnerability [SA10367] Fedora update for xboard [SA10366] Gentoo update for kernel [SA10365] SuSE update for kernel [SA10402] Fedora update for Quagga [SA10369] Sun Cluster TCP Port Conflict Denial of Service Vulnerability Other: [SA10373] Novell NFS Server Incorrect Hostname Alias Handling Vulnerability [SA10383] Webgate Web Eye Exposure of Users and Passwords Cross Platform: [SA10371] Oracle Multiple Product OpenSSL Vulnerabilities [SA10398] Multiple Vendor SOAP Server XML Parser Denial of Service [SA10397] @mail WebMail System Multiple Vulnerabilities [SA10396] Land Down Under SQL Injection Vulnerability [SA10381] MyServer Unspecified DoS Vulnerabilities [SA10376] Xoops SQL Injection and Banner Manipulation Vulnerabilities [SA10372] Novell eDirectory SSL/TLS ASN.1 Parser Vulnerabilities [SA10394] Ben's Guestbook Comments Field Cross-Site Scripting Vulnerability [SA10393] Snif "path" Cross-Site Scripting Vulnerability [SA10380] Mantis Unspecified Cross-Site Scripting Vulnerabilities ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA10379] eZnetwork HTTP Request Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2003-12-08 A vulnerability has been identified in eZnetwork, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://www.secunia.com/advisories/10379/ -- [SA10395] Internet Explorer URL Spoofing Vulnerability Critical: Moderately critical Where: From remote Impact: ID Spoofing Released: 2003-12-09 A vulnerability has been identified in Internet Explorer, which can be exploited by malicious people to display a fake URL in the address bar. Full Advisory: http://www.secunia.com/advisories/10395/ -- [SA10370] Yahoo! Messenger IMVironment Cross-Site Scripting Vulnerability Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2003-12-08 A vulnerability has been reported in Yahoo! Messenger, which can be exploited by malicious people to conduct Cross-Site Scripting attacks. Full Advisory: http://www.secunia.com/advisories/10370/ -- [SA10382] VP-ASP Shopping Cart "shopdisplayproducts.asp" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2003-12-08 A vulnerability has been reported in VP-ASP Shopping Cart, which can be exploited by malicious people to conduct Cross-Site Scripting attacks. Full Advisory: http://www.secunia.com/advisories/10382/ -- [SA10375] A-CART "register.asp" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting, Exposure of sensitive information Released: 2003-12-05 A vulnerability has been reported in A-CART, which can be exploited by malicious people to conduct Cross-Site Scripting attacks. Full Advisory: http://www.secunia.com/advisories/10375/ -- [SA10368] WebSense Cross Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2003-12-05 A vulnerability has been reported in WebSense, allowing malicious people to conduct Cross Site Scripting attacks. Full Advisory: http://www.secunia.com/advisories/10368/ UNIX/Linux:-- [SA10378] Immunix update for rsync Critical: Extremely critical Where: From remote Impact: System access Released: 2003-12-08 Immunix has issued updated packages for rsync. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://www.secunia.com/advisories/10378/ -- [SA10364] Mandrake update for rsync Critical: Extremely critical Where: From remote Impact: System access Released: 2003-12-05 MandrakeSoft has issued updated packages for rsync. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://www.secunia.com/advisories/10364/ -- [SA10363] Red Hat update for rsync Critical: Extremely critical Where: From remote Impact: System access Released: 2003-12-05 Red Hat has issued updated packages for rsync. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://www.secunia.com/advisories/10363/ -- [SA10362] EnGarde update for rsync Critical: Extremely critical Where: From remote Impact: System access Released: 2003-12-04 EnGarde has issued updated packages for rsync. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://www.secunia.com/advisories/10362/ -- [SA10361] Conectiva update for rsync Critical: Extremely critical Where: From remote Impact: System access Released: 2003-12-04 Conectiva has issued updated packages for rsync. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://www.secunia.com/advisories/10361/ -- [SA10360] Fedora update for rsync Critical: Extremely critical Where: From remote Impact: System access Released: 2003-12-04 Red Hat has issued updated packages for rsync. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://www.secunia.com/advisories/10360/ -- [SA10359] OpenPKG update for rsync Critical: Extremely critical Where: From remote Impact: System access Released: 2003-12-04 OpenPKG has issued updated packages for rsync. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://www.secunia.com/advisories/10359/ -- [SA10357] SuSE update for rsync Critical: Extremely critical Where: From remote Impact: System access Released: 2003-12-04 SuSE has issued updated packages for rsync. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://www.secunia.com/advisories/10357/ -- [SA10356] Debian update for rsync Critical: Extremely critical Where: From remote Impact: System access Released: 2003-12-04 Debian has issued updated packages for rsync. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://www.secunia.com/advisories/10356/ -- [SA10354] Slackware update for rsync Critical: Extremely critical Where: From remote Impact: System access Released: 2003-12-04 Slackware has issued updated packages for rsync. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://www.secunia.com/advisories/10354/ -- [SA10353] rsync Unspecified Heap Overflow Vulnerability Critical: Extremely critical Where: From remote Impact: System access Released: 2003-12-04 A vulnerability has been identified in rsync, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://www.secunia.com/advisories/10353/ -- [SA10391] Tarantella Enterprise OpenSSL Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2003-12-09 Tarantella has acknowledged some OpenSSL vulnerabilities in Tarantella Enterprise 3, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://www.secunia.com/advisories/10391/ -- [SA10385] Mathopd Remotely Exploitable Buffer Overflow Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2003-12-08 A vulnerability has been identified in Mathopd, allowing malicious people to cause a Denial of Service and possibly execute arbitrary code. Full Advisory: http://www.secunia.com/advisories/10385/ -- [SA10374] Ebola AV Daemon Authentication Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2003-12-05 A vulnerability has been reported in Ebola AV Daemon, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://www.secunia.com/advisories/10374/ -- [SA10401] Mandrake update for ethereal Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2003-12-11 MandrakeSoft has issued updated packages for Ethereal. These fix multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system running Ethereal. Full Advisory: http://www.secunia.com/advisories/10401/ -- [SA10400] Red Hat update for gnupg Critical: Moderately critical Where: From remote Impact: ID Spoofing, Exposure of sensitive information Released: 2003-12-11 Red Hat has issued updated packages for gnupg. These fix a vulnerability, which exposes the private key when using El-Gamal type 20 keys. Full Advisory: http://www.secunia.com/advisories/10400/ -- [SA10399] Fedora update for gnupg Critical: Moderately critical Where: From remote Impact: ID Spoofing, Exposure of sensitive information Released: 2003-12-11 Red Hat has issued updated packages for gnupg. These fix a vulnerability, which exposes the private key when using El-Gamal type 20 keys. Full Advisory: http://www.secunia.com/advisories/10399/ -- [SA10386] Abyss Web Server Directory Protection Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2003-12-08 A vulnerability has been identified in Abyss web server, which can be exploited by malicious people to access certain password protected directories. Full Advisory: http://www.secunia.com/advisories/10386/ -- [SA10377] Conectiva update for kernel Critical: Moderately critical Where: From remote Impact: Privilege escalation, DoS Released: 2003-12-08 Conectiva has issued updated packages for the kernel. These fix multiple known vulnerabilities, which can be exploited to cause a DoS (Denial of Service) or to escalate privileges on a vulnerable system. Full Advisory: http://www.secunia.com/advisories/10377/ -- [SA10407] Gentoo update for cvs Critical: Less critical Where: From remote Impact: Security Bypass Released: 2003-12-11 Gentoo has issued updated packages for cvs. These fix a vulnerability, which can be exploited by malicious users to create arbitrary folders and possibly files in the root of the host's file system. Full Advisory: http://www.secunia.com/advisories/10407/ -- [SA10390] Sun Cobalt update for Apache / mod_ssl Critical: Less critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2003-12-09 Sun has issued updated packages for Apache and mod_ssl. These fix some vulnerabilities, which can be exploited by malicious people to manipulate Apache access and error log files and force mod_ssl to use a weaker cipher suite than intended. Full Advisory: http://www.secunia.com/advisories/10390/ -- [SA10388] CVS Creation of Arbitrary Directories Critical: Less critical Where: From remote Impact: Security Bypass Released: 2003-12-09 A vulnerability has been identified in CVS, allowing malicious users to create arbitrary folders and possibly files in the root of the host's file system. Full Advisory: http://www.secunia.com/advisories/10388/ -- [SA10392] cdwrite Insecure Temporary File Creation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2003-12-09 A vulnerability has been reported in cdwrite, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://www.secunia.com/advisories/10392/ -- [SA10387] Mandrake update for screen Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2003-12-09 MandrakeSoft has issued updated packages for screen. These fix a vulnerability, which potentially may allow users to escalate their privileges. Full Advisory: http://www.secunia.com/advisories/10387/ -- [SA10384] Sun Solaris dtprintinfo Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2003-12-08 Sun has reported a vulnerability in Solaris, which can be exploited by malicious, local users to escalate their privileges. Full Advisory: http://www.secunia.com/advisories/10384/ -- [SA10367] Fedora update for xboard Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2003-12-05 Red Hat has issued updated packages for xboard. These fix a vulnerability, which can be exploited by malicious users to escalate their privileges. Full Advisory: http://www.secunia.com/advisories/10367/ -- [SA10366] Gentoo update for kernel Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2003-12-05 Gentoo has issued updated packages for the kernel. These fix a vulnerability, which can be exploited by malicious users to escalate their privileges. Full Advisory: http://www.secunia.com/advisories/10366/ -- [SA10365] SuSE update for kernel Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2003-12-05 SuSE has issued updated packages for the kernel. These fix a vulnerability, which can be exploited by malicious users to escalate their privileges. Full Advisory: http://www.secunia.com/advisories/10365/ -- [SA10402] Fedora update for Quagga Critical: Not critical Where: Local system Impact: DoS Released: 2003-12-11 Red Hat has issued updated packages for Quagga. These fix a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://www.secunia.com/advisories/10402/ -- [SA10369] Sun Cluster TCP Port Conflict Denial of Service Vulnerability Critical: Not critical Where: Local system Impact: DoS Released: 2003-12-05 Sun has reported a vulnerability in Sun Cluster, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://www.secunia.com/advisories/10369/ Other:-- [SA10373] Novell NFS Server Incorrect Hostname Alias Handling Vulnerability Critical: Moderately critical Where: From local network Impact: Security Bypass Released: 2003-12-05 Novell has reported a vulnerability in NetWare 6.5, which potentially can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://www.secunia.com/advisories/10373/ -- [SA10383] Webgate Web Eye Exposure of Users and Passwords Critical: Less critical Where: From local network Impact: Exposure of sensitive information Released: 2003-12-08 A vulnerability has been reported in Web Eye, which can be exploited through HTTP by malicious people to view usernames and passwords. Full Advisory: http://www.secunia.com/advisories/10383/ Cross Platform:-- [SA10371] Oracle Multiple Product OpenSSL Vulnerabilities Critical: Highly critical Where: From remote Impact: Exposure of sensitive information, DoS, System access Released: 2003-12-05 Oracle has confirmed that various products are affected by some OpenSSL vulnerabilities, which can be exploited by malicious people to gain knowledge of sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. Full Advisory: http://www.secunia.com/advisories/10371/ -- [SA10398] Multiple Vendor SOAP Server XML Parser Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2003-12-10 A vulnerability has been identified in various products, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://www.secunia.com/advisories/10398/ -- [SA10397] @mail WebMail System Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Exposure of sensitive information Released: 2003-12-10 Multiple vulnerabilities have been reported in @mail, allowing malicious people to conduct Cross Site Scripting attacks and users to view the emails of other users. Full Advisory: http://www.secunia.com/advisories/10397/ -- [SA10396] Land Down Under SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data Released: 2003-12-10 A vulnerability has been reported in Land Down Under, allowing malicious people to manipulate SQL queries. Full Advisory: http://www.secunia.com/advisories/10396/ -- [SA10381] MyServer Unspecified DoS Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS Released: 2003-12-08 Some unspecified vulnerabilities have been reported in MyServer, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://www.secunia.com/advisories/10381/ -- [SA10376] Xoops SQL Injection and Banner Manipulation Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of system information, Exposure of sensitive information Released: 2003-12-08 Some vulnerabilities have been reported in Xoops, which can be exploited by malicious people to conduct SQL injection attacks and manipulate banner content. Full Advisory: http://www.secunia.com/advisories/10376/ -- [SA10372] Novell eDirectory SSL/TLS ASN.1 Parser Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS Released: 2003-12-05 Novell has reported that eDirectory is affected by the SSL/TLS ASN.1 parser vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://www.secunia.com/advisories/10372/ -- [SA10394] Ben's Guestbook Comments Field Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2003-12-09 A vulnerability has been reported in Ben's Guestbook, which can be exploited by malicious users to conduct Cross-Site Scripting attacks against other users. Full Advisory: http://www.secunia.com/advisories/10394/ -- [SA10393] Snif "path" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2003-12-09 A vulnerability has been reported in Snif, allowing malicious people to conduct Cross Site Scripting attacks. Full Advisory: http://www.secunia.com/advisories/10393/ -- [SA10380] Mantis Unspecified Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2003-12-09 Some unspecified vulnerabilities have been identified in Mantis, which can be exploited by malicious people to conduct Cross-Site Scripting attacks. Full Advisory: http://www.secunia.com/advisories/10380/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://www.secunia.com/about_secunia_advisories/ Subscribe: http://www.secunia.com/secunia_weekly_summary/ Contact details: Web : http://www.secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 ======================================================================== - ISN is currently hosted by Attrition.org To unsubscribe email majordomo@private with 'unsubscribe isn' in the BODY of the mail.
This archive was generated by hypermail 2b30 : Fri Dec 12 2003 - 03:54:33 PST