[ISN] Secunia Weekly Summary - Issue: 2003-51

From: InfoSec News (isn@private)
Date: Thu Dec 18 2003 - 03:24:01 PST

  • Next message: InfoSec News: "[ISN] US demands compensation from hacker"

    ========================================================================
    
                      The Secunia Weekly Advisory Summary                  
                            2003-12-11 - 2003-12-18                        
    
                           This week : 45 advisories                       
    
    ========================================================================
    Table of Contents:
    
    1.....................................................Word From Secunia
    2....................................................This Week In Brief
    3...............................This Weeks Top Ten Most Read Advisories
    4.......................................Vulnerabilities Summary Listing
    5.......................................Vulnerabilities Content Listing
    
    ========================================================================
    1) Word From Secunia:
    
    Secunia Advisory IDs
    
    Every advisory issued by Secunia has an unique identifier: The Secunia
    Advisory ID (SA ID). The SA IDs make it very easy to reference,
    identify, and find Secunia advisories.
    
    A Shortcut to Secunia Advisories
    
    Finding Secunia Advisories using SA IDs is easily done at the Secunia
    website; either by simply entering the SA ID in our search form placed
    on the right side of every Secunia web page, or by entering the SA ID
    directly after the domain when visiting the Secunia website e.g.
    http://secunia.com/SA10395
    
    In the Secunia Weekly Summary SA IDs are displayed in brackets e.g.
    [SA10395]
    
    ========================================================================
    2) This Week in Brief:
    
    Our test for the Internet Explorer URL spoofing vulnerability revealed
    a weakness in how Mozilla displays URLs in the status bar. The weakness
    could allow an attacker to fully control content in the status bar.
    For a demonstration of the weakness please view either of the
    referenced Secunia Advisories.
    Reference: [SA10419] & [SA10395]
    
    In addition to the latest vulnerability in the Opera browser which was
    discovered by Jouko Pynnönen. Security research group Operash has
    revealed how it is possible to delete arbitrary files on a user's
    system. In order for the vulnerability to be exploited, a user has to
    visit a malicious web site. This vulnerability was corrected in the
    latest version 7.23 of Opera, which was released when Jouko Pynnönen
    discovered the first vulnerability.
    Reference: [SA10425]
    
    Cisco has released updated versions of their Cisco Firewall Services
    Module and Cisco PIX. The updated versions correct remotely
    exploitable Denial of Service vulnerabilities. Please refer to
    referenced Secunia Advisories for information about non vulnerable
    versions.
    Reference: [SA10433] & [SA10434]
    
    A security researcher named 'Max' has revealed a vulnerability in Mac
    OS X, which potentially can be used to execute arbitrary code locally
    with privileges as root.
    Reference: [SA10440]
    
    ========================================================================
    3) This Weeks Top Ten Most Read Advisories:
    
    1.  [SA10395] Internet Explorer URL Spoofing Vulnerability
    2.  [SA10440] Mac OS X cd9660.util Privilege Escalation Vulnerability
    3.  [SA10289] Internet Explorer System Compromise Vulnerabilities
    4.  [SA10419] Mozilla Status Bar Manipulation Weakness
    5.  [SA10353] rsync File Handling Integer Overflow Vulnerability
    6.  [SA10425] Opera Browser Arbitrary File Deletion Vulnerability
    7.  [SA9711]  Microsoft Internet Explorer Multiple Vulnerabilities
    8.  [SA10342] Yahoo! Messenger "yauto.dll" Buffer Overflow
                  Vulnerability
    9.  [SA10434] Cisco PIX SNMPv3 and VPNC Denial of Service
                  Vulnerabilities
    10. [SA10328] Linux Kernel "do_brk()" Privilege Escalation
                  Vulnerability
    
    ========================================================================
    4) Vulnerabilities Summary Listing
    
    Windows:
    [SA10429] Dark Age of Camelot Weak Encryption Scheme
    [SA10426] Xlight FTP Server Denial of Service and Directory Traversal
    [SA10425] Opera Browser Arbitrary File Deletion Vulnerability
    [SA10439] DameWare Mini Remote Control Buffer Overflow Vulnerability
    [SA10452] WS_FTP Server Denial of Service Vulnerability
    [SA10420] CA Unicenter Remote Control Privilege Escalation and Denial
    of Service
    [SA10438] Doro PDF Writer Privilege Escalation Vulnerability
    [SA10449] Macromedia Flash Player Predictable Data Location Weakness
    
    UNIX/Linux:
    [SA10441] Cyrus IMSP Server Address Book Handling Buffer Overflow
    Vulnerability
    [SA10459] Gentoo update for net-ftp/lftp
    [SA10454] OpenPKG update for lftp
    [SA10447] Invision Power Top Site List SQL Injection Vulnerability
    [SA10446] Invision Power Board SQL Injection Vulnerability
    [SA10444] Red Hat update for lftp
    [SA10437] Mandrake update for lftp
    [SA10436] Sun Linux update for Ethereal
    [SA10435] Sun update for Zebra
    [SA10432] Fedora update for lftp
    [SA10431] SuSE update for lftp
    [SA10428] Slackware update for lftp
    [SA10427] LFTP HTTP Directory Listing Buffer Overflow Vulnerabilities
    [SA10418] Gentoo update for gnupg
    [SA10423] Mandrake update for net-snmp
    [SA10416] Slackware update for CVS
    [SA10415] sipd IP Address Resolving Denial of Service Vulnerability
    [SA10448] Red Hat update for httpd
    [SA10442] CGINews and CGIForum May Expose Passwords to Local Users
    [SA10440] Mac OS X cd9660.util Privilege Escalation Vulnerability
    [SA10430] Sun Solaris Printing Unspecified Privilege Escalation
    Vulnerabilities
    [SA10411] Sun Solaris ed Text Editor Insecure Temporary File Creation
    Vulnerability
    [SA10450] NetBSD update for BIND
    
    Other:
    [SA10434] Cisco PIX SNMPv3 and VPNC Denial of Service Vulnerabilities
    [SA10433] Cisco Firewall Services Module Denial of Service
    Vulnerabilities
    
    Cross Platform:
    [SA10422] W-Agora Multiple Vulnerabilities
    [SA10414] Hermes Unspecified File Inclusion Vulnerability
    [SA10453] Aardvark Topsites PHP Information Disclosure and SQL
    Injection
    [SA10443] osCommerce SQL Injection Vulnerability
    [SA10421] Cyclonic WebMail Allows Sending Emails Anonymously
    [SA10417] Multiple Vendor SOAP Server DTD Parameter Denial of Service
    [SA10413] Mambo Server SQL Injection Vulnerabilities
    [SA10412] VisitorBook LE Multiple Vulnerabilities
    [SA10424] Ethereal SMB and Q.931 Protocol Dissector Vulnerabilities
    [SA10419] Mozilla Status Bar Manipulation Weakness
    
    ========================================================================
    5) Vulnerabilities Content Listing
    
    Windows:--
    
    [SA10429] Dark Age of Camelot Weak Encryption Scheme
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Exposure of sensitive information
    Released:    2003-12-15
    
    A weakness has been reported in Dark Age of Camelot, which may expose
    sensitive user information.
    
    Full Advisory:
    http://www.secunia.com/advisories/10429/
    
     --
    
    [SA10426] Xlight FTP Server Denial of Service and Directory Traversal
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Exposure of system information, Exposure of sensitive
    information, DoS
    Released:    2003-12-15
    
    Two vulnerabilities have been identified in Xlight FTP Server, which
    can be exploited by malicious, authenticated users to read arbitrary
    files on a vulnerable system or cause a DoS (Denial of Service).
    
    Full Advisory:
    http://www.secunia.com/advisories/10426/
    
     --
    
    [SA10425] Opera Browser Arbitrary File Deletion Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2003-12-13
    
    A vulnerability has been reported in Opera, which can be exploited by
    malicious people to delete arbitrary files on a user's system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10425/
    
     --
    
    [SA10439] DameWare Mini Remote Control Buffer Overflow Vulnerability
    
    Critical:    Moderately critical
    Where:       From local network
    Impact:      System access
    Released:    2003-12-16
    
    Wirepair has discovered a vulnerability in DameWare Mini Remote
    Control, which can be exploited by malicious, unauthenticated people to
    compromise a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10439/
    
     --
    
    [SA10452] WS_FTP Server Denial of Service Vulnerability
    
    Critical:    Less critical
    Where:       From remote
    Impact:      DoS
    Released:    2003-12-17
    
    Dr_insane has reported a vulnerability in WS_FTP Server, which can be
    exploited by malicious users to cause a DoS (Denial of Service).
    
    Full Advisory:
    http://www.secunia.com/advisories/10452/
    
     --
    
    [SA10420] CA Unicenter Remote Control Privilege Escalation and Denial
    of Service
    
    Critical:    Less critical
    Where:       From local network
    Impact:      Privilege escalation, DoS
    Released:    2003-12-12
    
    Two vulnerabilities have been identified in CA Unicenter Remote Control
    and ControlIT, which can be exploited by malicious, local users to
    escalate their privileges and by malicious people to cause a Denial of
    Service.
    
    Full Advisory:
    http://www.secunia.com/advisories/10420/
    
     --
    
    [SA10438] Doro PDF Writer Privilege Escalation Vulnerability
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2003-12-16
    
    Ramon Kukla has reported a privilege escalation vulnerability in Doro
    PDF Writer, which can be exploited by malicious, local users to
    escalate their privileges.
    
    Full Advisory:
    http://www.secunia.com/advisories/10438/
    
     --
    
    [SA10449] Macromedia Flash Player Predictable Data Location Weakness
    
    Critical:    Not critical
    Where:       From remote
    Impact:      
    Released:    2003-12-17
    
    Macromedia has issued an updated version of the Flash Player to fix an
    issue, which has been exploited in combination with known browser
    vulnerabilities to access users' systems.
    
    Full Advisory:
    http://www.secunia.com/advisories/10449/
    
    
    UNIX/Linux:--
    
    [SA10441] Cyrus IMSP Server Address Book Handling Buffer Overflow
    Vulnerability
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access
    Released:    2003-12-16
    
    Felix Lindner and Michael Guenther have reported a vulnerability in
    Cyrus IMSP Server, which can be exploited by malicious people to
    compromise a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10441/
    
     --
    
    [SA10459] Gentoo update for net-ftp/lftp
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2003-12-18
    
    Gentoo has issued an updated package for net-ftp/lftp. This fixes two
    vulnerabilities, which potentially can be exploited by malicious people
    to compromise a user's system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10459/
    
     --
    
    [SA10454] OpenPKG update for lftp
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2003-12-17
    
    OpenPKG has issued updated packages for lftp. These fix two
    vulnerabilities, which potentially can be exploited by malicious people
    to compromise a user's system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10454/
    
     --
    
    [SA10447] Invision Power Top Site List SQL Injection Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Manipulation of data
    Released:    2003-12-16
    
    JeiAr has reported a vulnerability in Invision Power Top Site List,
    which potentially can be exploited by malicious people to manipulate
    data through HTTP.
    
    Full Advisory:
    http://www.secunia.com/advisories/10447/
    
     --
    
    [SA10446] Invision Power Board SQL Injection Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Manipulation of data
    Released:    2003-12-16
    
    JeiAr has reported a vulnerability in Invision Power Board, which
    potentially can be exploited by malicious people to manipulate data
    through HTTP.
    
    Full Advisory:
    http://www.secunia.com/advisories/10446/
    
     --
    
    [SA10444] Red Hat update for lftp
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access, DoS
    Released:    2003-12-16
    
    Red Hat has issued updated packages for lftp. These fix two
    vulnerabilities, which potentially can be exploited by malicious people
    to compromise a user's system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10444/
    
     --
    
    [SA10437] Mandrake update for lftp
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2003-12-16
    
    MandrakeSoft has issued updated packages for lftp. These fix two
    vulnerabilities, which potentially can be exploited by malicious people
    to compromise a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10437/
    
     --
    
    [SA10436] Sun Linux update for Ethereal
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2003-12-16
    
    Sun has issued updated packages for Ethereal. These fix multiple
    vulnerabilities, which potentially can be exploited by malicious people
    to compromise a vulnerable system running Ethereal.
    
    Full Advisory:
    http://www.secunia.com/advisories/10436/
    
     --
    
    [SA10435] Sun update for Zebra
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2003-12-16
    
    Sun has issued updated packages for Zebra. These fix two
    vulnerabilities allowing malicious people and local users to cause a
    Denial of Service.
    
    Full Advisory:
    http://www.secunia.com/advisories/10435/
    
     --
    
    [SA10432] Fedora update for lftp
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2003-12-15
    
    Red Hat has issued updated packages for lftp. These fix two
    vulnerabilities, which potentially can be exploited by malicious people
    to compromise a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10432/
    
     --
    
    [SA10431] SuSE update for lftp
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2003-12-15
    
    SuSE has issued updated packages for lftp. These fix two
    vulnerabilities, which potentially can be exploited by malicious people
    to compromise a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10431/
    
     --
    
    [SA10428] Slackware update for lftp
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2003-12-15
    
    Slackware has issued updated packages for lftp. These fix two
    vulnerabilities, which potentially can be exploited by malicious people
    to compromise a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10428/
    
     --
    
    [SA10427] LFTP HTTP Directory Listing Buffer Overflow Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2003-12-15
    
    Two vulnerabilities have been identified in LFTP, which potentially can
    be exploited by malicious people to compromise a user's system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10427/
    
     --
    
    [SA10418] Gentoo update for gnupg
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      ID Spoofing, Exposure of sensitive information, DoS,
    System access
    Released:    2003-12-12
    
    Gentoo has issued updated packages for gnupg. These fix two
    vulnerabilities, which may expose the private key when using El-Gamal
    type 20 keys and allow malicious people to compromise systems using the
    experimental HKP interface.
    
    Full Advisory:
    http://www.secunia.com/advisories/10418/
    
     --
    
    [SA10423] Mandrake update for net-snmp
    
    Critical:    Moderately critical
    Where:       From local network
    Impact:      Security Bypass
    Released:    2003-12-12
    
    MandrakeSoft has issued updated packages for net-snmp. These fix a
    vulnerability, which can be exploited by malicious users to bypass
    certain security restrictions.
    
    Full Advisory:
    http://www.secunia.com/advisories/10423/
    
     --
    
    [SA10416] Slackware update for CVS
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Security Bypass
    Released:    2003-12-12
    
    Slackware has issued updated packages for cvs. These fix a
    vulnerability, which can be exploited by malicious users to create
    arbitrary folders and possibly files in the root of the host's file
    system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10416/
    
     --
    
    [SA10415] sipd IP Address Resolving Denial of Service Vulnerability
    
    Critical:    Less critical
    Where:       From local network
    Impact:      DoS
    Released:    2003-12-12
    
    A vulnerability has been reported in sipd, which can be exploited by
    malicious users to cause a DoS (Denial of Service).
    
    Full Advisory:
    http://www.secunia.com/advisories/10415/
    
     --
    
    [SA10448] Red Hat update for httpd
    
    Critical:    Less critical
    Where:       Local system
    Impact:      DoS, Privilege escalation
    Released:    2003-12-17
    
    Red Hat has issued updated packages for httpd. These fix some
    vulnerabilities, which can be exploited by malicious, local users to
    cause a DoS (Denial of Service) or escalate privileges.
    
    Full Advisory:
    http://www.secunia.com/advisories/10448/
    
     --
    
    [SA10442] CGINews and CGIForum May Expose Passwords to Local Users
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Exposure of sensitive information
    Released:    2003-12-16
    
    JeiAr has reported a weakness in CGINews and CGIForum, which can be
    exploited by malicious, local users to see passwords.
    
    Full Advisory:
    http://www.secunia.com/advisories/10442/
    
     --
    
    [SA10440] Mac OS X cd9660.util Privilege Escalation Vulnerability
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2003-12-16
    
    Max has reported a vulnerability in Mac OS X, which can be exploited by
    malicious, local users to escalate their privileges.
    
    Full Advisory:
    http://www.secunia.com/advisories/10440/
    
     --
    
    [SA10430] Sun Solaris Printing Unspecified Privilege Escalation
    Vulnerabilities
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2003-12-15
    
    Sun has reported some unspecified vulnerabilities in Solaris, which can
    be exploited by malicious, local users to escalate their privileges on
    a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10430/
    
     --
    
    [SA10411] Sun Solaris ed Text Editor Insecure Temporary File Creation
    Vulnerability
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2003-12-11
    
    A vulnerability has been identified in Sun Solaris, which can be
    exploited by malicious, local users to perform certain actions with
    escalated privileges.
    
    Full Advisory:
    http://www.secunia.com/advisories/10411/
    
     --
    
    [SA10450] NetBSD update for BIND
    
    Critical:    Not critical
    Where:       From local network
    Impact:      DoS
    Released:    2003-12-17
    
    NetBSD has issued updated packages for bind. These fix a vulnerability,
    which can be exploited by malicious people to poison the DNS cache with
    negative entries.
    
    Full Advisory:
    http://www.secunia.com/advisories/10450/
    
    
    Other:--
    
    [SA10434] Cisco PIX SNMPv3 and VPNC Denial of Service Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2003-12-15
    
    Cisco has reported two vulnerabilities in the Cisco PIX firewall, which
    can be exploited by malicious people to cause a DoS (Denial of
    Service).
    
    Full Advisory:
    http://www.secunia.com/advisories/10434/
    
     --
    
    [SA10433] Cisco Firewall Services Module Denial of Service
    Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2003-12-15
    
    Cisco has reported two vulnerabilities in the Cisco Firewall Services
    Module (FWSM) for Catalyst 6500 series and 7600 series, which can be
    exploited by malicious people to cause a DoS (Denial of Service).
    
    Full Advisory:
    http://www.secunia.com/advisories/10433/
    
    
    Cross Platform:--
    
    [SA10422] W-Agora Multiple Vulnerabilities
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      Cross Site Scripting, System access
    Released:    2003-12-15
    
    Some vulnerabilities have been reported in W-Agora, which may be
    exploited by malicious people to conduct Cross-Site Scripting attacks
    or include arbitrary files to compromise a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10422/
    
     --
    
    [SA10414] Hermes Unspecified File Inclusion Vulnerability
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access
    Released:    2003-12-12
    
    A vulnerability has been identified in Hermes, which potentially can be
    exploited by malicious people to compromise a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10414/
    
     --
    
    [SA10453] Aardvark Topsites PHP Information Disclosure and SQL
    Injection
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Manipulation of data, Exposure of system information,
    Exposure of sensitive information
    Released:    2003-12-17
    
    JeiAr has reported some vulnerabilities in Aardvark Topsites PHP, which
    can be exploited by malicious people to disclose information and
    possibly manipulate SQL queries.
    
    Full Advisory:
    http://www.secunia.com/advisories/10453/
    
     --
    
    [SA10443] osCommerce SQL Injection Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Manipulation of data
    Released:    2003-12-16
    
    JeiAr has reported a vulnerability in osCommerce, which potentially can
    be exploited by malicious people to manipulate data through HTTP.
    
    Full Advisory:
    http://www.secunia.com/advisories/10443/
    
     --
    
    [SA10421] Cyclonic WebMail Allows Sending Emails Anonymously
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Hijacking, Security Bypass, ID Spoofing, Exposure of
    sensitive information
    Released:    2003-12-12
    
    Multiple vulnerabilities have been reported in Cyclonic WebMail,
    allowing malicious people to send SPAM anonymously and possibly view
    sensitive data.
    
    Full Advisory:
    http://www.secunia.com/advisories/10421/
    
     --
    
    [SA10417] Multiple Vendor SOAP Server DTD Parameter Denial of Service
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2003-12-12
    
    A vulnerability has been identified in various products, which can be
    exploited by malicious people to cause a DoS (Denial of Service).
    
    Full Advisory:
    http://www.secunia.com/advisories/10417/
    
     --
    
    [SA10413] Mambo Server SQL Injection Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Manipulation of data
    Released:    2003-12-11
    
    Two vulnerabilities have been reported in Mambo Server, which can be
    exploited by malicious people to manipulate SQL queries.
    
    Full Advisory:
    http://www.secunia.com/advisories/10413/
    
     --
    
    [SA10412] VisitorBook LE Multiple Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Security Bypass, Cross Site Scripting
    Released:    2003-12-11
    
    Multiple vulnerabilities have been identified in VisitorBook LE,
    allowing malicious people to conduct Cross Site Scripting attacks or
    send SPAM mails anonymously.
    
    Full Advisory:
    http://www.secunia.com/advisories/10412/
    
     --
    
    [SA10424] Ethereal SMB and Q.931 Protocol Dissector Vulnerabilities
    
    Critical:    Less critical
    Where:       From remote
    Impact:      DoS
    Released:    2003-12-13
    
    Two vulnerabilities have been reported in Ethereal, which can be
    exploited by malicious people to crash the application.
    
    Full Advisory:
    http://www.secunia.com/advisories/10424/
    
     --
    
    [SA10419] Mozilla Status Bar Manipulation Weakness
    
    Critical:    Not critical
    Where:       From remote
    Impact:      Security Bypass, ID Spoofing
    Released:    2003-12-12
    
    A weakness has been identified in Mozilla, which can be exploited by
    malicious people to manipulate information displayed in the status
    bar.
    
    Full Advisory:
    http://www.secunia.com/advisories/10419/
    
    
    
    ========================================================================
    
    Secunia recommends that you verify all advisories you receive,
    by clicking the link.
    Secunia NEVER sends attached files with advisories.
    Secunia does not advise people to install third party patches, only use
    those supplied by the vendor.
    
    Definitions: (Criticality, Where etc.)
    http://www.secunia.com/about_secunia_advisories/
    
    Subscribe:
    http://www.secunia.com/secunia_weekly_summary/
    
    Contact details:
    Web	: http://www.secunia.com/
    E-mail	: support@private
    Tel	: +45 70 20 51 44
    Fax	: +45 70 20 51 45
    
    ========================================================================
    
    
    
    -
    ISN is currently hosted by Attrition.org
    
    To unsubscribe email majordomo@private with 'unsubscribe isn'
    in the BODY of the mail.
    



    This archive was generated by hypermail 2b30 : Thu Dec 18 2003 - 06:01:20 PST