[ISN] Secunia Weekly Summary - Issue: 2004-5

From: William Knowles (wk@private)
Date: Thu Jan 29 2004 - 02:30:44 PST

  • Next message: William Knowles: "[ISN] Security Maven Calls for Internet 'Disease Control' Agency"

    ========================================================================
    
                      The Secunia Weekly Advisory Summary                  
                            2004-01-22 - 2004-01-29                        
    
                           This week : 41 advisories                       
    
    ========================================================================
    Table of Contents:
    
    1.....................................................Word From Secunia
    2....................................................This Week In Brief
    3...............................This Weeks Top Ten Most Read Advisories
    4.......................................Vulnerabilities Summary Listing
    5.......................................Vulnerabilities Content Listing
    
    ========================================================================
    1) Word From Secunia:
    
    Secunia Advisory IDs
    
    Every advisory issued by Secunia has an unique identifier: The Secunia
    Advisory ID (SA ID). The SA IDs make it very easy to reference,
    identify, and find Secunia advisories.
    
    A Shortcut to Secunia Advisories
    
    Finding Secunia Advisories using SA IDs is easily done at the Secunia
    website; either by simply entering the SA ID in our search form placed
    on the right side of every Secunia web page, or by entering the SA ID
    directly after the domain when visiting the Secunia website e.g.
    http://secunia.com/SA10736
    
    In the Secunia Weekly Summary SA IDs are displayed in brackets e.g.
    [SA10736]
    
    ========================================================================
    2) This Week in Brief:
    
    Security researcher http-equiv has reported a vulnerability, which can
    be exploited to spoof the "File name" field in Internet Explorer when
    downloading files.
    Secunia has made a simple demonstration of this vulnerability; a link
    to the test can be found in the referenced Secunia Advisory.
    Reference: [SA10736]
    
    http-equiv has also demonstrated how it is possible to make a normal
    looking "folder" in Windows XP contain arbitrary code, which will be
    executed automatically on a users system when opened.
    Reference: [SA10708]
    
    Apple has issued a security update for Mac OS X. The update fixes
    several vulnerabilities some of which are already known and others are
    new.
    Reference: [SA10723]
    
    A vulnerability has been reported in the very popular FTP server
    Serv-U, which can be exploited to execute arbitrary code on vulnerable
    systems.
    Reportedly, the vulnerability is addressed in version 5.0.
    Reference: [SA10706]
    
    TIP:
    Finding Secunia advisories is easily done through the Secunia web site.
    Simply enter the SA ID in the URL:
    http://secunia.com/SA10736
    
    ========================================================================
    3) This Weeks Top Ten Most Read Advisories:
    
    1.  [SA10736] Internet Explorer File Download Extension Spoofing
    2.  [SA10708] Windows XP Malicious Folder Automatic Code Execution
                  Vulnerability
    3.  [SA10395] Internet Explorer URL Spoofing Vulnerability
    4.  [SA10723] Mac OS X Security Update Fixes Multiple Vulnerabilities
    5.  [SA9580]  Microsoft Internet Explorer Multiple Vulnerabilities
    6.  [SA9213]  XBlockOut "-display" Privilege Escalation Vulnerability
    7.  [SA9223]  Cisco Catalyst Switch Non-Standard TCP Flag Combination
                  DoS Vulnerability
    8.  [SA10700] Need for Speed Client Buffer Overflow Vulnerability
    9.  [SA10289] Internet Explorer System Compromise Vulnerabilities
    10. [SA10523] Internet Explorer showHelp() Restriction Bypass
                  Vulnerability
    
    ========================================================================
    4) Vulnerabilities Summary Listing
    
    Windows:
    [SA10700] Need for Speed Client Buffer Overflow Vulnerability
    [SA10736] Internet Explorer File Download Extension Spoofing
    [SA10710] Mbedthis AppWeb HTTP Request Denial of Service
    Vulnerabilities
    [SA10708] Windows XP Malicious Folder Automatic Code Execution
    Vulnerability
    [SA10707] TinyServer Multiple Vulnerabilities
    [SA10704] Q-Shop SQL Injection and Cross Site Scripting
    Vulnerabilities
    [SA10724] ProxyNow! HTTP Request Buffer Overflow Vulnerabilities
    [SA10714] FinJan SurfinGate Proxy Access to Admin Functions
    [SA10741] BRS WebWeaver "ISAPISkeleton.dll" Cross Site Scripting
    Vulnerability
    [SA10739] BlackICE PC Protection Privilege Escalation Vulnerability
    
    UNIX/Linux:
    [SA10738] Gentoo update for gaim
    [SA10735] Gentoo update for mod_python
    [SA10723] Mac OS X Security Update Fixes Multiple Vulnerabilities
    [SA10721] Red Hat update for gaim
    [SA10719] Slackware update for gaim
    [SA10718] Mandrake update for tcpdump
    [SA10717] Mandrake update for gaim
    [SA10716] Mandrake update for mc
    [SA10715] Debian update for gnupg
    [SA10705] Gaim Multiple Buffer Overflow Vulnerabilities
    [SA10696] Cisco Voice Products Director Agent Insecure Default
    Installation
    [SA10703] Mandrake update for jabber
    [SA10701] Cherokee Error Page Cross-Site Scripting Vulnerability
    [SA10722] Fedora update for slocate
    [SA10720] Red Hat update for slocate
    [SA10702] Mandrake update for slocate
    [SA10698] Red Hat update for slocate
    
    Other:
    [SA10711] NetWare Enterprise Web Server Cross Site Scripting
    Vulnerability
    
    Cross Platform:
    [SA10712] Gallery Arbitrary File Inclusion Vulnerability
    [SA10706] Serv-U FTP Server "SITE CHMOD" Command Buffer Overflow
    Vulnerability
    [SA10725] BEA WebLogic May Provide Access to Wrong Identity
    [SA10713] Novell Groupwise Cross Site Scripting Vulnerability
    [SA10709] IBM Net.Data Error Message Cross-Site Scripting
    Vulnerability
    [SA10737] IBM Informix Database Multiple Local Vulnerabilities
    [SA10729] BEA WebLogic Boot Credentials Disclosure Vulnerability
    [SA10728] BEA WebLogic Administrative Password Exposure Vulnerability
    [SA10727] BEA WebLogic Exposure of Password to Operators
    [SA10697] mod_perl File Descriptor Leakage Vulnerability
    [SA10726] BEA WebLogic HTTP TRACE Response Cross-Site Scripting Issue
    [SA10731] BremsServer Cross Site Scripting and Directory Traversal
    
    ========================================================================
    5) Vulnerabilities Content Listing
    
    Windows:--
    
    [SA10700] Need for Speed Client Buffer Overflow Vulnerability
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access
    Released:    2004-01-23
    
    Luigi Auriemma has reported a vulnerability in Need for Speed Hot
    Pursuit 2, which potentially can be exploited by malicious people to
    compromise a user's system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10700/
    
     --
    
    [SA10736] Internet Explorer File Download Extension Spoofing
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Security Bypass
    Released:    2004-01-28
    
    http-equiv has identified a vulnerability in Internet Explorer,
    allowing malicious web sites to spoof the file extension of
    downloadable files.
    
    Full Advisory:
    http://www.secunia.com/advisories/10736/
    
     --
    
    [SA10710] Mbedthis AppWeb HTTP Request Denial of Service
    Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-01-26
    
    Ziv Kamir has reported two vulnerabilities in Mbedthis AppWeb, which
    can be exploited by malicious people to cause a DoS (Denial of
    Service).
    
    Full Advisory:
    http://www.secunia.com/advisories/10710/
    
     --
    
    [SA10708] Windows XP Malicious Folder Automatic Code Execution
    Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Privilege escalation, System access
    Released:    2004-01-26
    
    http-equiv has reported a vulnerability in Windows XP, which can be
    exploited by malicious people to compromise a user's system or gain
    escalated privileges.
    
    Full Advisory:
    http://www.secunia.com/advisories/10708/
    
     --
    
    [SA10707] TinyServer Multiple Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Cross Site Scripting, Exposure of sensitive information,
    DoS
    Released:    2004-01-26
    
    Donato Ferrante has reported multiple vulnerabilities in TinyServer,
    allowing malicious people to view sensitive information or cause a
    Denial of Service.
    
    Full Advisory:
    http://www.secunia.com/advisories/10707/
    
     --
    
    [SA10704] Q-Shop SQL Injection and Cross Site Scripting
    Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Security Bypass, Cross Site Scripting, Manipulation of
    data
    Released:    2004-01-26
    
    Nick Gudov has reported multiple vulnerabilities in Q-Shop, allowing
    malicious people to conduct Cross Site Scripting or SQL injection
    attacks.
    
    Full Advisory:
    http://www.secunia.com/advisories/10704/
    
     --
    
    [SA10724] ProxyNow! HTTP Request Buffer Overflow Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From local network
    Impact:      System access
    Released:    2004-01-27
    
    Peter Winter-Smith has reported two vulnerabilities in ProxyNow!, which
    can be exploited by malicious people to compromise a vulnerable
    system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10724/
    
     --
    
    [SA10714] FinJan SurfinGate Proxy Access to Admin Functions
    
    Critical:    Moderately critical
    Where:       From local network
    Impact:      Security Bypass, System access
    Released:    2004-01-27
    
    David Byrne has reported a vulnerability in Finjan SurfinGate, allowing
    malicious people to access administrative functions.
    
    Full Advisory:
    http://www.secunia.com/advisories/10714/
    
     --
    
    [SA10741] BRS WebWeaver "ISAPISkeleton.dll" Cross Site Scripting
    Vulnerability
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2004-01-29
    
    Oliver Karow has reported a vulnerability in BRS WebWeaver, allowing
    malicious people to conduct Cross Site Scripting attacks.
    
    Full Advisory:
    http://www.secunia.com/advisories/10741/
    
     --
    
    [SA10739] BlackICE PC Protection Privilege Escalation Vulnerability
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-01-28
    
    KF has reported a privilege escalation vulnerability in BlackICE PC
    Protection, allowing malicious users to gain SYSTEM privileges.
    
    Full Advisory:
    http://www.secunia.com/advisories/10739/
    
    
    UNIX/Linux:--
    
    [SA10738] Gentoo update for gaim
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-01-28
    
    Gentoo has issued updated packages for gaim. These fix multiple
    vulnerabilities, which potentially can be exploited by malicious people
    to compromise a user's system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10738/
    
     --
    
    [SA10735] Gentoo update for mod_python
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-01-28
    
    Gentoo has issued an update for mod_python. This fix a vulnerability,
    which can be exploited by malicious people to cause a Denial of
    Service.
    
    Full Advisory:
    http://www.secunia.com/advisories/10735/
    
     --
    
    [SA10723] Mac OS X Security Update Fixes Multiple Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Manipulation of data, Privilege escalation, DoS
    Released:    2004-01-27
    
    Apple has issued a security update for Mac OS X, which fixes some
    older, known vulnerabilities along with some new unspecified issues.
    
    Full Advisory:
    http://www.secunia.com/advisories/10723/
    
     --
    
    [SA10721] Red Hat update for gaim
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-01-27
    
    Red Hat has issued updated packages for gaim. These fix multiple
    vulnerabilities, which potentially can be exploited by malicious people
    to compromise a user's system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10721/
    
     --
    
    [SA10719] Slackware update for gaim
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-01-27
    
    Slackware has issued updated packages for gaim. These fix multiple
    vulnerabilities, which potentially can be exploited by malicious people
    to compromise a user's system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10719/
    
     --
    
    [SA10718] Mandrake update for tcpdump
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2004-01-27
    
    MandrakeSoft has issued updated packages for tcpdump. These fix
    multiple vulnerabilities, which can be exploited by malicious people to
    crash tcpdump and potentially compromise a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10718/
    
     --
    
    [SA10717] Mandrake update for gaim
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-01-27
    
    MandrakeSoft has issued updated packages for gaim. These fix multiple
    vulnerabilities, which potentially can be exploited by malicious people
    to compromise a user's system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10717/
    
     --
    
    [SA10716] Mandrake update for mc
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-01-27
    
    MandrakeSoft has issued updated packages for mc. These fix a
    vulnerability, which potentially can be exploited by malicious people
    to compromise a user's system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10716/
    
     --
    
    [SA10715] Debian update for gnupg
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      ID Spoofing, Exposure of sensitive information
    Released:    2004-01-27
    
    Debian has issued updated packages for gnupg. These fix a
    vulnerability, which exposes the private key when using El-Gamal type
    20 keys.
    
    Full Advisory:
    http://www.secunia.com/advisories/10715/
    
     --
    
    [SA10705] Gaim Multiple Buffer Overflow Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-01-27
    
    Stefan Esser has identified multiple vulnerabilities in Gaim, which can
    be exploited by malicious people to compromise a user's system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10705/
    
     --
    
    [SA10696] Cisco Voice Products Director Agent Insecure Default
    Installation
    
    Critical:    Moderately critical
    Where:       From local network
    Impact:      DoS, System access
    Released:    2004-01-22
    
    Cisco has reported a vulnerability in multiple voice products on the
    IBM platform, which can be exploited by malicious people to cause a DoS
    (Denial of Service) or compromise a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10696/
    
     --
    
    [SA10703] Mandrake update for jabber
    
    Critical:    Less critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-01-26
    
    MandrakeSoft has issued updated packages for jabber. These fix a
    vulnerability, which can be exploited by malicious people to cause a
    Denial of Service.
    
    Full Advisory:
    http://www.secunia.com/advisories/10703/
    
     --
    
    [SA10701] Cherokee Error Page Cross-Site Scripting Vulnerability
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2004-01-26
    
    César Fernández has identified a vulnerability in Cherokee, which can
    be exploited by malicious people to conduct cross-site scripting
    attacks.
    
    Full Advisory:
    http://www.secunia.com/advisories/10701/
    
     --
    
    [SA10722] Fedora update for slocate
    
    Critical:    Not critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-01-27
    
    Red Hat has issued updated packages for slocate. These fix a
    vulnerability, which can be exploited by malicious, local users to gain
    "slocate" group privileges.
    
    Full Advisory:
    http://www.secunia.com/advisories/10722/
    
     --
    
    [SA10720] Red Hat update for slocate
    
    Critical:    Not critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-01-27
    
    Red Hat has issued updated packages for slocate. These fix a
    vulnerability, which can be exploited by malicious, local users to gain
    "slocate" group privileges.
    
    Full Advisory:
    http://www.secunia.com/advisories/10720/
    
     --
    
    [SA10702] Mandrake update for slocate
    
    Critical:    Not critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-01-26
    
    MandrakeSoft has issued updated packages for slocate. These fix a
    vulnerability, which can be exploited by malicious, local users to gain
    "slocate" group privileges.
    
    Full Advisory:
    http://www.secunia.com/advisories/10702/
    
     --
    
    [SA10698] Red Hat update for slocate
    
    Critical:    Not critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-01-23
    
    Red Hat has issued updated packages for slocate. These fix a
    vulnerability, which can be exploited by malicious, local users to gain
    "slocate" group privileges.
    
    Full Advisory:
    http://www.secunia.com/advisories/10698/
    
    
    Other:--
    
    [SA10711] NetWare Enterprise Web Server Cross Site Scripting
    Vulnerability
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting, Exposure of system information
    Released:    2004-01-26
    
    Rafel Ivgi has reported a vulnerability in Novell NetWare Enterprise
    Web Server, allowing malicious people to conduct cross site scripting
    attacks.
    
    Full Advisory:
    http://www.secunia.com/advisories/10711/
    
    
    Cross Platform:--
    
    [SA10712] Gallery Arbitrary File Inclusion Vulnerability
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access
    Released:    2004-01-26
    
    The Gallery Development Team has fixed a vulnerability in Gallery,
    allowing malicious people to compromise a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10712/
    
     --
    
    [SA10706] Serv-U FTP Server "SITE CHMOD" Command Buffer Overflow
    Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-01-26
    
    kkqq has reported a vulnerability in Serv-U FTP Server, which can be
    exploited by malicious users to compromise a vulnerable system.
    
    Full Advisory:
    http://www.secunia.com/advisories/10706/
    
     --
    
    [SA10725] BEA WebLogic May Provide Access to Wrong Identity
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Exposure of sensitive information
    Released:    2004-01-27
    
    BEA has reported a security issue in WebLogic, which may provide users
    access to the wrong profile.
    
    Full Advisory:
    http://www.secunia.com/advisories/10725/
    
     --
    
    [SA10713] Novell Groupwise Cross Site Scripting Vulnerability
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2004-01-27
    
    A vulnerability has been identified in Novell Groupwise WebAccess
    allowing malicious people to conduct Cross Site Scripting attacks.
    
    Full Advisory:
    http://www.secunia.com/advisories/10713/
    
     --
    
    [SA10709] IBM Net.Data Error Message Cross-Site Scripting
    Vulnerability
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2004-01-26
    
    Secunia has identified a vulnerability in IBM Net.Data, which can be
    exploited by malicious people to conduct cross-site scripting attacks.
    
    Full Advisory:
    http://www.secunia.com/advisories/10709/
    
     --
    
    [SA10737] IBM Informix Database Multiple Local Vulnerabilities
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-01-28
    
    IBM has issued updates for Informix. These fix multiple vulnerabilities
    allowing malicious users to escalate their privileges.
    
    Full Advisory:
    http://www.secunia.com/advisories/10737/
    
     --
    
    [SA10729] BEA WebLogic Boot Credentials Disclosure Vulnerability
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Exposure of sensitive information
    Released:    2004-01-27
    
    BEA has reported a vulnerability in WebLogic Server and Express, which
    may expose the boot credentials to a malicious user.
    
    Full Advisory:
    http://www.secunia.com/advisories/10729/
    
     --
    
    [SA10728] BEA WebLogic Administrative Password Exposure Vulnerability
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Exposure of sensitive information, Privilege escalation
    Released:    2004-01-27
    
    BEA has reported a vulnerability in WebLogic, which possibly may expose
    administrative passwords to users.
    
    Full Advisory:
    http://www.secunia.com/advisories/10728/
    
     --
    
    [SA10727] BEA WebLogic Exposure of Password to Operators
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-01-27
    
    BEA has reported a vulnerability in WebLogic, which allows operators to
    gain knowledge of passwords.
    
    Full Advisory:
    http://www.secunia.com/advisories/10727/
    
     --
    
    [SA10697] mod_perl File Descriptor Leakage Vulnerability
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-01-22
    
    Steve Grubb has reported a vulnerability in mod_perl, which potentially
    can be exploited by malicious, local users to hi-jack the HTTPS port.
    
    Full Advisory:
    http://www.secunia.com/advisories/10697/
    
     --
    
    [SA10726] BEA WebLogic HTTP TRACE Response Cross-Site Scripting Issue
    
    Critical:    Not critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2004-01-27
    
    BEA has confirmed a problem in WebLogic Server and Express, which
    potentially can be exploited to conduct cross-site scripting attacks
    against users.
    
    Full Advisory:
    http://www.secunia.com/advisories/10726/
    
     --
    
    [SA10731] BremsServer Cross Site Scripting and Directory Traversal
    
    Critical:    Not critical
    Where:       From local network
    Impact:      Cross Site Scripting, Exposure of sensitive information
    Released:    2004-01-28
    
    Donato Ferrante has reported some issues in Der Herberlin BremsServer.
    Allowing malicious people to conduct Cross Site Scripting and directory
    traversal.
    
    Full Advisory:
    http://www.secunia.com/advisories/10731/
    
    
    
    ========================================================================
    
    Secunia recommends that you verify all advisories you receive,
    by clicking the link.
    Secunia NEVER sends attached files with advisories.
    Secunia does not advise people to install third party patches, only use
    those supplied by the vendor.
    
    Definitions: (Criticality, Where etc.)
    http://www.secunia.com/about_secunia_advisories/
    
    Subscribe:
    http://www.secunia.com/secunia_weekly_summary/
    
    Contact details:
    Web	: http://www.secunia.com/
    E-mail	: support@private
    Tel	: +45 70 20 51 44
    Fax	: +45 70 20 51 45
    
    ========================================================================
    
    
    
    -
    ISN is currently hosted by Attrition.org
    
    To unsubscribe email majordomo@private with 'unsubscribe isn'
    in the BODY of the mail.
    



    This archive was generated by hypermail 2b30 : Thu Jan 29 2004 - 05:26:59 PST