[ISN] Secunia Weekly Summary - Issue: 2003-50

From: InfoSec News (isn@private)
Date: Fri Dec 12 2003 - 01:28:24 PST

  • Next message: InfoSec News: "[ISN] Deputies wanted to fight cybercrime"

    ========================================================================
    
                      The Secunia Weekly Advisory Summary                  
                            2003-12-04 - 2003-12-11                        
    
                           This week : 51 advisories                       
    
    ========================================================================
    Table of Contents:
    
    1.....................................................Word From Secunia
    2....................................................This Week In Brief
    3...............................This Weeks Top Ten Most Read Advisories
    4.......................................Vulnerabilities Summary Listing
    5.......................................Vulnerabilities Content Listing
    
    ========================================================================
    1) Word From Secunia:
    
    The Secunia staff is spending hours every day to assure you the best
    and most reliable source for vulnerability information. Every single 
    vulnerability report is being validated and verified before a Secunia
    advisory is written.
    
    Secunia validates and verifies vulnerability reports in many different
    ways e.g. by downloading the software and performing comprehensive
    tests, by reviewing source code, or by validating the credibility of
    the source from which the vulnerability report was issued.
    
    As a result, Secunia's database is the most correct and complete source
    for recent vulnerability information available on the Internet.
    
    Secunia Online Vulnerability Database:
    http://www.secunia.com/
    
    ========================================================================
    2) This Week in Brief:
    
    A vulnerability in the rsync service has been identified, which
    reportedly has been used in the compromise of several servers in the
    past few months. The vulnerability allows malicious people to execute
    arbitrary code with privileges of the rsync service.
    Also, almost all Linux distributors have been very fast to issue fixed
    packages for this vulnerability, and all administrators are advised to
    check for available updates.
    Ref.: [SA10353]
    
    Another vulnerability in Internet Explorer has been revealed. This time
    it is possible to completely spoof content in the address bar. This
    could easily be used to trick users into believing they are on a
    trusted domain rather than on a malicious web site trying to get users
    to reveal sensitive information.
    Users are advised not to follow links from untrusted sources or to
    verify digital certificates before entering any sensitive information.
    Ref.: [SA10395]
    
    Yahoo! Messenger has been reported vulnerable to Cross-Site Scripting
    attacks. The vulnerability can be used to execute HTML or script code
    in context of Yahoo! Messenger.
    All users of Yahoo! Messenger are advised to install the fixed version.
    Ref.: [SA10370]
    
    TIP:
    Finding Secunia advisories is easily done through the Secunia web site.
    Simply enter the SA ID in the URL:
    http://secunia.com/SA10395
    
    ========================================================================
    3) This Weeks Top Ten Most Read Advisories:
    
    1.  [SA10353] rsync Unspecified Heap Overflow Vulnerability
    2.  [SA10395] Internet Explorer URL Spoofing Vulnerability
    3.  [SA10289] Internet Explorer System Compromise Vulnerabilities
    4.  [SA10252] Apple Safari Cookie Stealing Vulnerability
    5.  [SA10342] Yahoo! Messenger "yauto.dll" Buffer Overflow
                  Vulnerability
    6.  [SA10328] Linux Kernel "do_brk()" Privilege Escalation
                  Vulnerability
    7.  [SA10371] Oracle Multiple Product OpenSSL Vulnerabilities
    8.  [SA9711]  Microsoft Internet Explorer Multiple Vulnerabilities
    9.  [SA8742]  Microsoft Windows Media Player skin download
                  vulnerability
    10. [SA10372] Novell eDirectory SSL/TLS ASN.1 Parser Vulnerabilities
    
    ========================================================================
    4) Vulnerabilities Summary Listing
    
    Windows:
    [SA10379] eZnetwork HTTP Request Buffer Overflow Vulnerability
    [SA10395] Internet Explorer URL Spoofing Vulnerability
    [SA10370] Yahoo! Messenger IMVironment Cross-Site Scripting
    Vulnerability
    [SA10382] VP-ASP Shopping Cart "shopdisplayproducts.asp" Cross-Site
    Scripting
    [SA10375] A-CART "register.asp" Cross-Site Scripting Vulnerability
    [SA10368] WebSense Cross Site Scripting Vulnerability
    
    UNIX/Linux:
    [SA10378] Immunix update for rsync
    [SA10364] Mandrake update for rsync
    [SA10363] Red Hat update for rsync
    [SA10362] EnGarde update for rsync
    [SA10361] Conectiva update for rsync
    [SA10360] Fedora update for rsync
    [SA10359] OpenPKG update for rsync
    [SA10357] SuSE update for rsync
    [SA10356] Debian update for rsync
    [SA10354] Slackware update for rsync
    [SA10353] rsync Unspecified Heap Overflow Vulnerability
    [SA10391] Tarantella Enterprise OpenSSL Vulnerabilities
    [SA10385] Mathopd Remotely Exploitable Buffer Overflow
    [SA10374] Ebola AV Daemon Authentication Buffer Overflow Vulnerability
    [SA10401] Mandrake update for ethereal
    [SA10400] Red Hat update for gnupg
    [SA10399] Fedora update for gnupg
    [SA10386] Abyss Web Server Directory Protection Bypass Vulnerability
    [SA10377] Conectiva update for kernel
    [SA10407] Gentoo update for cvs
    [SA10390] Sun Cobalt update for Apache / mod_ssl
    [SA10388] CVS Creation of Arbitrary Directories
    [SA10392] cdwrite Insecure Temporary File Creation Vulnerability
    [SA10387] Mandrake update for screen
    [SA10384] Sun Solaris dtprintinfo Privilege Escalation Vulnerability
    [SA10367] Fedora update for xboard
    [SA10366] Gentoo update for kernel
    [SA10365] SuSE update for kernel
    [SA10402] Fedora update for Quagga
    [SA10369] Sun Cluster TCP Port Conflict Denial of Service
    Vulnerability
    
    Other:
    [SA10373] Novell NFS Server Incorrect Hostname Alias Handling
    Vulnerability
    [SA10383] Webgate Web Eye Exposure of Users and Passwords
    
    Cross Platform:
    [SA10371] Oracle Multiple Product OpenSSL Vulnerabilities
    [SA10398] Multiple Vendor SOAP Server XML Parser Denial of Service
    [SA10397] @mail WebMail System Multiple Vulnerabilities
    [SA10396] Land Down Under SQL Injection Vulnerability
    [SA10381] MyServer Unspecified DoS Vulnerabilities
    [SA10376] Xoops SQL Injection and Banner Manipulation Vulnerabilities
    [SA10372] Novell eDirectory SSL/TLS ASN.1 Parser Vulnerabilities
    [SA10394] Ben's Guestbook Comments Field Cross-Site Scripting
    Vulnerability
    [SA10393] Snif "path" Cross-Site Scripting Vulnerability
    [SA10380] Mantis Unspecified Cross-Site Scripting Vulnerabilities
    
    ========================================================================
    5) Vulnerabilities Content Listing
    
    Windows:--
    
    [SA10379] eZnetwork HTTP Request Buffer Overflow Vulnerability
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access
    Released:    2003-12-08
    
    A vulnerability has been identified in eZnetwork, which can be
    exploited by malicious people to compromise a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10379/
    
     --
    
    [SA10395] Internet Explorer URL Spoofing Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      ID Spoofing
    Released:    2003-12-09
    
    A vulnerability has been identified in Internet Explorer, which can be
    exploited by malicious people to display a fake URL in the address
    bar.
    
    Full Advisory:
    http://www.secunia.com/advisories/10395/
    
     --
    
    [SA10370] Yahoo! Messenger IMVironment Cross-Site Scripting
    Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2003-12-08
    
    A vulnerability has been reported in Yahoo! Messenger, which can be
    exploited by malicious people to conduct Cross-Site Scripting attacks.
    
    Full Advisory:
    http://www.secunia.com/advisories/10370/
    
     --
    
    [SA10382] VP-ASP Shopping Cart "shopdisplayproducts.asp" Cross-Site
    Scripting
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2003-12-08
    
    A vulnerability has been reported in VP-ASP Shopping Cart, which can be
    exploited by malicious people to conduct Cross-Site Scripting attacks.
    
    Full Advisory:
    http://www.secunia.com/advisories/10382/
    
     --
    
    [SA10375] A-CART "register.asp" Cross-Site Scripting Vulnerability
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting, Exposure of sensitive information
    Released:    2003-12-05
    
    A vulnerability has been reported in A-CART, which can be exploited by
    malicious people to conduct Cross-Site Scripting attacks.
    
    Full Advisory:
    http://www.secunia.com/advisories/10375/
    
     --
    
    [SA10368] WebSense Cross Site Scripting Vulnerability
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2003-12-05
    
    A vulnerability has been reported in WebSense, allowing malicious
    people to conduct Cross Site Scripting attacks.
    
    Full Advisory:
    http://www.secunia.com/advisories/10368/
    
    
    UNIX/Linux:--
    
    [SA10378] Immunix update for rsync
    
    Critical:    Extremely critical
    Where:       From remote
    Impact:      System access
    Released:    2003-12-08
    
    Immunix has issued updated packages for rsync. These fix a
    vulnerability, which can be exploited by malicious people to compromise
    a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10378/
    
     --
    
    [SA10364] Mandrake update for rsync
    
    Critical:    Extremely critical
    Where:       From remote
    Impact:      System access
    Released:    2003-12-05
    
    MandrakeSoft has issued updated packages for rsync. These fix a
    vulnerability, which can be exploited by malicious people to compromise
    a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10364/
    
     --
    
    [SA10363] Red Hat update for rsync
    
    Critical:    Extremely critical
    Where:       From remote
    Impact:      System access
    Released:    2003-12-05
    
    Red Hat has issued updated packages for rsync. These fix a
    vulnerability, which can be exploited by malicious people to compromise
    a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10363/
    
     --
    
    [SA10362] EnGarde update for rsync
    
    Critical:    Extremely critical
    Where:       From remote
    Impact:      System access
    Released:    2003-12-04
    
    EnGarde has issued updated packages for rsync. These fix a
    vulnerability, which can be exploited by malicious people to compromise
    a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10362/
    
     --
    
    [SA10361] Conectiva update for rsync
    
    Critical:    Extremely critical
    Where:       From remote
    Impact:      System access
    Released:    2003-12-04
    
    Conectiva has issued updated packages for rsync. These fix a
    vulnerability, which can be exploited by malicious people to compromise
    a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10361/
    
     --
    
    [SA10360] Fedora update for rsync
    
    Critical:    Extremely critical
    Where:       From remote
    Impact:      System access
    Released:    2003-12-04
    
    Red Hat has issued updated packages for rsync. These fix a
    vulnerability, which can be exploited by malicious people to compromise
    a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10360/
    
     --
    
    [SA10359] OpenPKG update for rsync
    
    Critical:    Extremely critical
    Where:       From remote
    Impact:      System access
    Released:    2003-12-04
    
    OpenPKG has issued updated packages for rsync. These fix a
    vulnerability, which can be exploited by malicious people to compromise
    a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10359/
    
     --
    
    [SA10357] SuSE update for rsync
    
    Critical:    Extremely critical
    Where:       From remote
    Impact:      System access
    Released:    2003-12-04
    
    SuSE has issued updated packages for rsync. These fix a vulnerability,
    which can be exploited by malicious people to compromise a vulnerable
    system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10357/
    
     --
    
    [SA10356] Debian update for rsync
    
    Critical:    Extremely critical
    Where:       From remote
    Impact:      System access
    Released:    2003-12-04
    
    Debian has issued updated packages for rsync. These fix a
    vulnerability, which can be exploited by malicious people to compromise
    a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10356/
    
     --
    
    [SA10354] Slackware update for rsync
    
    Critical:    Extremely critical
    Where:       From remote
    Impact:      System access
    Released:    2003-12-04
    
    Slackware has issued updated packages for rsync. These fix a
    vulnerability, which can be exploited by malicious people to compromise
    a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10354/
    
     --
    
    [SA10353] rsync Unspecified Heap Overflow Vulnerability
    
    Critical:    Extremely critical
    Where:       From remote
    Impact:      System access
    Released:    2003-12-04
    
    A vulnerability has been identified in rsync, which can be exploited by
    malicious people to compromise a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10353/
    
     --
    
    [SA10391] Tarantella Enterprise OpenSSL Vulnerabilities
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access
    Released:    2003-12-09
    
    Tarantella has acknowledged some OpenSSL vulnerabilities in Tarantella
    Enterprise 3, which can be exploited by malicious people to cause a DoS
    (Denial of Service) and potentially compromise a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10391/
    
     --
    
    [SA10385] Mathopd Remotely Exploitable Buffer Overflow
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2003-12-08
    
    A vulnerability has been identified in Mathopd, allowing malicious
    people to cause a Denial of Service and possibly execute arbitrary
    code.
    
    Full Advisory:
    http://www.secunia.com/advisories/10385/
    
     --
    
    [SA10374] Ebola AV Daemon Authentication Buffer Overflow Vulnerability
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access
    Released:    2003-12-05
    
    A vulnerability has been reported in Ebola AV Daemon, which can be
    exploited by malicious people to compromise a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10374/
    
     --
    
    [SA10401] Mandrake update for ethereal
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2003-12-11
    
    MandrakeSoft has issued updated packages for Ethereal. These fix
    multiple vulnerabilities, which potentially can be exploited by
    malicious people to compromise a vulnerable system running Ethereal.
    
    Full Advisory:
    http://www.secunia.com/advisories/10401/
    
     --
    
    [SA10400] Red Hat update for gnupg
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      ID Spoofing, Exposure of sensitive information
    Released:    2003-12-11
    
    Red Hat has issued updated packages for gnupg. These fix a
    vulnerability, which exposes the private key when using El-Gamal type
    20 keys.
    
    Full Advisory:
    http://www.secunia.com/advisories/10400/
    
     --
    
    [SA10399] Fedora update for gnupg
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      ID Spoofing, Exposure of sensitive information
    Released:    2003-12-11
    
    Red Hat has issued updated packages for gnupg. These fix a
    vulnerability, which exposes the private key when using El-Gamal type
    20 keys.
    
    Full Advisory:
    http://www.secunia.com/advisories/10399/
    
     --
    
    [SA10386] Abyss Web Server Directory Protection Bypass Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Security Bypass
    Released:    2003-12-08
    
    A vulnerability has been identified in Abyss web server, which can be
    exploited by malicious people to access certain password protected
    directories.
    
    Full Advisory:
    http://www.secunia.com/advisories/10386/
    
     --
    
    [SA10377] Conectiva update for kernel
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Privilege escalation, DoS
    Released:    2003-12-08
    
    Conectiva has issued updated packages for the kernel. These fix
    multiple known vulnerabilities, which can be exploited to cause a DoS
    (Denial of Service) or to escalate privileges on a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10377/
    
     --
    
    [SA10407] Gentoo update for cvs
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Security Bypass
    Released:    2003-12-11
    
    Gentoo has issued updated packages for cvs. These fix a vulnerability,
    which can be exploited by malicious users to create arbitrary folders
    and possibly files in the root of the host's file system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10407/
    
     --
    
    [SA10390] Sun Cobalt update for Apache / mod_ssl
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Manipulation of data, Exposure of sensitive information
    Released:    2003-12-09
    
    Sun has issued updated packages for Apache and mod_ssl. These fix some
    vulnerabilities, which can be exploited by malicious people to
    manipulate Apache access and error log files and force mod_ssl to use a
    weaker cipher suite than intended.
    
    Full Advisory:
    http://www.secunia.com/advisories/10390/
    
     --
    
    [SA10388] CVS Creation of Arbitrary Directories
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Security Bypass
    Released:    2003-12-09
    
    A vulnerability has been identified in CVS, allowing malicious users to
    create arbitrary folders and possibly files in the root of the host's
    file system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10388/
    
     --
    
    [SA10392] cdwrite Insecure Temporary File Creation Vulnerability
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2003-12-09
    
    A vulnerability has been reported in cdwrite, which can be exploited by
    malicious, local users to perform certain actions with escalated
    privileges.
    
    Full Advisory:
    http://www.secunia.com/advisories/10392/
    
     --
    
    [SA10387] Mandrake update for screen
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2003-12-09
    
    MandrakeSoft has issued updated packages for screen. These fix a
    vulnerability, which potentially may allow users to escalate their
    privileges.
    
    Full Advisory:
    http://www.secunia.com/advisories/10387/
    
     --
    
    [SA10384] Sun Solaris dtprintinfo Privilege Escalation Vulnerability
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2003-12-08
    
    Sun has reported a vulnerability in Solaris, which can be exploited by
    malicious, local users to escalate their privileges.
    
    Full Advisory:
    http://www.secunia.com/advisories/10384/
    
     --
    
    [SA10367] Fedora update for xboard
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2003-12-05
    
    Red Hat has issued updated packages for xboard. These fix a
    vulnerability, which can be exploited by malicious users to escalate
    their privileges.
    
    Full Advisory:
    http://www.secunia.com/advisories/10367/
    
     --
    
    [SA10366] Gentoo update for kernel
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2003-12-05
    
    Gentoo has issued updated packages for the kernel. These fix a
    vulnerability, which can be exploited by malicious users to escalate
    their privileges.
    
    Full Advisory:
    http://www.secunia.com/advisories/10366/
    
     --
    
    [SA10365] SuSE update for kernel
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2003-12-05
    
    SuSE has issued updated packages for the kernel. These fix a
    vulnerability, which can be exploited by malicious users to escalate
    their privileges.
    
    Full Advisory:
    http://www.secunia.com/advisories/10365/
    
     --
    
    [SA10402] Fedora update for Quagga
    
    Critical:    Not critical
    Where:       Local system
    Impact:      DoS
    Released:    2003-12-11
    
    Red Hat has issued updated packages for Quagga. These fix a
    vulnerability, which can be exploited by malicious, local users to
    cause a DoS (Denial of Service).
    
    Full Advisory:
    http://www.secunia.com/advisories/10402/
    
     --
    
    [SA10369] Sun Cluster TCP Port Conflict Denial of Service
    Vulnerability
    
    Critical:    Not critical
    Where:       Local system
    Impact:      DoS
    Released:    2003-12-05
    
    Sun has reported a vulnerability in Sun Cluster, which can be exploited
    by malicious, local users to cause a DoS (Denial of Service).
    
    Full Advisory:
    http://www.secunia.com/advisories/10369/
    
    
    Other:--
    
    [SA10373] Novell NFS Server Incorrect Hostname Alias Handling
    Vulnerability
    
    Critical:    Moderately critical
    Where:       From local network
    Impact:      Security Bypass
    Released:    2003-12-05
    
    Novell has reported a vulnerability in NetWare 6.5, which potentially
    can be exploited by malicious people to bypass certain security
    restrictions.
    
    Full Advisory:
    http://www.secunia.com/advisories/10373/
    
     --
    
    [SA10383] Webgate Web Eye Exposure of Users and Passwords
    
    Critical:    Less critical
    Where:       From local network
    Impact:      Exposure of sensitive information
    Released:    2003-12-08
    
    A vulnerability has been reported in Web Eye, which can be exploited
    through HTTP by malicious people to view usernames and passwords.
    
    Full Advisory:
    http://www.secunia.com/advisories/10383/
    
    
    Cross Platform:--
    
    [SA10371] Oracle Multiple Product OpenSSL Vulnerabilities
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      Exposure of sensitive information, DoS, System access
    Released:    2003-12-05
    
    Oracle has confirmed that various products are affected by some OpenSSL
    vulnerabilities, which can be exploited by malicious people to gain
    knowledge of sensitive information, cause a DoS (Denial of Service), or
    potentially compromise a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10371/
    
     --
    
    [SA10398] Multiple Vendor SOAP Server XML Parser Denial of Service
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2003-12-10
    
    A vulnerability has been identified in various products, which can be
    exploited by malicious people to cause a DoS (Denial of Service).
    
    Full Advisory:
    http://www.secunia.com/advisories/10398/
    
     --
    
    [SA10397] @mail WebMail System Multiple Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Security Bypass, Cross Site Scripting, Exposure of
    sensitive information
    Released:    2003-12-10
    
    Multiple vulnerabilities have been reported in @mail, allowing
    malicious people to conduct Cross Site Scripting attacks and users to
    view the emails of other users.
    
    Full Advisory:
    http://www.secunia.com/advisories/10397/
    
     --
    
    [SA10396] Land Down Under SQL Injection Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Security Bypass, Manipulation of data
    Released:    2003-12-10
    
    A vulnerability has been reported in Land Down Under, allowing
    malicious people to manipulate SQL queries.
    
    Full Advisory:
    http://www.secunia.com/advisories/10396/
    
     --
    
    [SA10381] MyServer Unspecified DoS Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2003-12-08
    
    Some unspecified vulnerabilities have been reported in MyServer, which
    can be exploited by malicious people to cause a DoS (Denial of
    Service).
    
    Full Advisory:
    http://www.secunia.com/advisories/10381/
    
     --
    
    [SA10376] Xoops SQL Injection and Banner Manipulation Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Manipulation of data, Exposure of system information,
    Exposure of sensitive information
    Released:    2003-12-08
    
    Some vulnerabilities have been reported in Xoops, which can be
    exploited by malicious people to conduct SQL injection attacks and
    manipulate banner content.
    
    Full Advisory:
    http://www.secunia.com/advisories/10376/
    
     --
    
    [SA10372] Novell eDirectory SSL/TLS ASN.1 Parser Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2003-12-05
    
    Novell has reported that eDirectory is affected by the SSL/TLS ASN.1
    parser vulnerabilities, which can be exploited by malicious people to
    cause a DoS (Denial of Service).
    
    Full Advisory:
    http://www.secunia.com/advisories/10372/
    
     --
    
    [SA10394] Ben's Guestbook Comments Field Cross-Site Scripting
    Vulnerability
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2003-12-09
    
    A vulnerability has been reported in Ben's Guestbook, which can be
    exploited by malicious users to conduct Cross-Site Scripting attacks
    against other users.
    
    Full Advisory:
    http://www.secunia.com/advisories/10394/
    
     --
    
    [SA10393] Snif "path" Cross-Site Scripting Vulnerability
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2003-12-09
    
    A vulnerability has been reported in Snif, allowing malicious people to
    conduct Cross Site Scripting attacks.
    
    Full Advisory:
    http://www.secunia.com/advisories/10393/
    
     --
    
    [SA10380] Mantis Unspecified Cross-Site Scripting Vulnerabilities
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2003-12-09
    
    Some unspecified vulnerabilities have been identified in Mantis, which
    can be exploited by malicious people to conduct Cross-Site Scripting
    attacks.
    
    Full Advisory:
    http://www.secunia.com/advisories/10380/
    
    
    
    ========================================================================
    
    Secunia recommends that you verify all advisories you receive,
    by clicking the link.
    Secunia NEVER sends attached files with advisories.
    Secunia does not advise people to install third party patches, only use
    those supplied by the vendor.
    
    Definitions: (Criticality, Where etc.)
    http://www.secunia.com/about_secunia_advisories/
    
    Subscribe:
    http://www.secunia.com/secunia_weekly_summary/
    
    Contact details:
    Web	: http://www.secunia.com/
    E-mail	: support@private
    Tel	: +45 70 20 51 44
    Fax	: +45 70 20 51 45
    
    ========================================================================
    
    
    
    -
    ISN is currently hosted by Attrition.org
    
    To unsubscribe email majordomo@private with 'unsubscribe isn'
    in the BODY of the mail.
    



    This archive was generated by hypermail 2b30 : Fri Dec 12 2003 - 03:54:33 PST