[ISN] Secunia Weekly Summary - Issue: 2004-9

From: InfoSec News (isn@private)
Date: Fri Feb 27 2004 - 00:04:24 PST


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2004-02-19 - 2004-02-26                        

                       This week : 57 advisories                       

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

The Secunia staff is spending hours every day to assure you the best
and most reliable source for vulnerability information. Every single 
vulnerability report is being validated and verified before a Secunia
advisory is written.

Secunia validates and verifies vulnerability reports in many different
ways e.g. by downloading the software and performing comprehensive
tests, by reviewing source code, or by validating the credibility of
the source from which the vulnerability report was issued.

As a result, Secunia's database is the most correct and complete source
for recent vulnerability information available on the Internet.

Secunia Online Vulnerability Database:
http://secunia.com/

========================================================================
2) This Week in Brief:

Two weaknesses have been discovered in both ICQ and AOL Instant
Messenger, which can be used to place files with arbitrary content on a
users system in predictable locations.
Both weaknesses have been used in combination with vulnerabilities in 
Internet Explorer to gain system access on users' systems.
Currently, no patches are available for any of the products.
Reference: [SA10970] & [SA10930]

Apple has released a security update for Mac OS X, which fixes multiple
vulnerabilities. Some of these vulnerabilities are new, while others
are already known.
See referenced Secunia advisory for links to the security update.
Reference: [SA10959]

TIP:
Finding Secunia advisories is easily done through the Secunia web site.
Simply enter the SA ID in the URL:
http://secunia.com/SA10970

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA10395] Internet Explorer URL Spoofing Vulnerability
2.  [SA10921] ZoneAlarm SMTP Processing Buffer Overflow Vulnerability
3.  [SA10959] Mac OS X Security Update Fixes Multiple Vulnerabilities
4.  [SA10912] Linux kernel ncpfs Privilege Escalation Vulnerability
5.  [SA10736] Internet Explorer File Download Extension Spoofing
6.  [SA10759] Microsoft Windows ASN.1 Library Integer Overflow
              Vulnerabilities
7.  [SA10897] Linux Kernel "mremap()" Missing Return Value Checking
              Privilege Escalation
8.  [SA10760] Opera Browser File Download Extension Spoofing
9.  [SA10930] AOL Instant Messenger Predictable File Location Weakness
10. [SA10968] Microsoft Windows Enhanced/Windows Metafile Handling
              Vulnerability

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA10921] ZoneAlarm SMTP Processing Buffer Overflow Vulnerability
[SA10973] Trillian Protocol Handling Buffer Overflow Vulnerabilities
[SA10968] Microsoft Windows Enhanced/Windows Metafile Handling
Vulnerability
[SA10960] Avirt Voice/Soho Long Input Buffer Overflow Vulnerabilities
[SA10948] PSOProxy Long Input Buffer Overflow Vulnerability
[SA10947] Proxy-Pro Professional GateKeeper Buffer Overflow
Vulnerability
[SA10927] Cesar FTP "RETR" Command Handling Denial of Service
Vulnerability
[SA10972] TYPSoft FTP Server Denial of Service
[SA10929] Small ftpd Denial of Service Vulnerability
[SA10949] Dell TrueMobile WLAN Card Utility Privilege Escalation
Vulnerability
[SA10970] ICQ Predictable File Location Weakness
[SA10930] AOL Instant Messenger Predictable File Location Weakness

UNIX/Linux:
[SA10966] Confirm Arbitrary Command Execution Vulnerability
[SA10961] Debian update for metamail
[SA10982] Red Hat update for libxml2
[SA10977] Fedora update for libxml2
[SA10974] jabber-gg-transport Multiple Denial of Service
Vulnerabilities
[SA10959] Mac OS X Security Update Fixes Multiple Vulnerabilities
[SA10951] Debian update for hsftp
[SA10950] Hsftp Filename Format String Vulnerability
[SA10946] Debian update for pwlib
[SA10940] OpenLinux update for mpg123
[SA10928] NetBSD IPv6 Traffic Handling Denial of Service Vulnerability
[SA10926] NetBSD update for OpenSSL
[SA10942] OpenLinux update for fetchmail
[SA10925] OpenLinux update for Perl
[SA10924] NetBSD update for racoon
[SA10944] Conectiva update for XFree86
[SA10939] OpenLinux update for saned
[SA10979] Mandrake update for mtools
[SA10971] Mandrake update for kernel
[SA10964] Trustix update for kernel
[SA10952] Debian update for synaesthesia
[SA10945] Synaesthesia Privilege Escalation Vulnerability
[SA10943] Conectiva update for kernel
[SA10932] Red Hat update for kernel
[SA10931] Debian update for XFree86
[SA10922] AIX X Server Privilege Escalation Vulnerability
[SA10941] OpenLinux update for BIND
[SA10957] SuSE update for XFree86
[SA10954] Debian update for lbreakout2
[SA10953] LBreakout 2 Privilege Escalation Vulnerability

Other:
[SA10962] Apache Directory Traversal Vulnerability
[SA10934] TANDBERG Products H.323 Protocol Implementation
Vulnerabilities
[SA10933] Cisco ONS 15000 Multiple Vulnerabilities
[SA10976] nCipher HSM Exposure of Secrets
[SA10923] Linksys WAP55AG Exposure of SNMP Community Strings

Cross Platform:
[SA10967] Opt-X Arbitrary File Inclusion Vulnerability
[SA10963] XMB Cross Site Scripting and SQL Injection Vulnerabilities
[SA10958] Libxml2 URI Parsing Buffer Overflow Vulnerabilities
[SA10956] Quicktime/Darwin Streaming Server DESCRIBE Request Denial of
Service
[SA10955] phpNewsManager "functions.php" Directory Traversal
Vulnerability
[SA10936] Oracle9i Database and Application Server SOAP DTD Denial of
Service
[SA10969] Platform LSF "eauth" Component Vulnerabilities
[SA10938] Oracle9i Lite Unspecified Vulnerability
[SA10935] LiveJournal Cross Site Scripting Vulnerability
[SA10937] Oracle9i Database User Session Hijacking Vulnerability

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA10921] ZoneAlarm SMTP Processing Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Privilege escalation, System access
Released:    2004-02-19

eEye has discovered a vulnerability in ZoneAlarm and Integrity client,
allowing users to escalate their privileges and potentially also
allowing malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/10921/

 --

[SA10973] Trillian Protocol Handling Buffer Overflow Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-02-25

Stefan Esser has discovered two vulnerabilities in Trillian, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/10973/

 --

[SA10968] Microsoft Windows Enhanced/Windows Metafile Handling
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Privilege escalation, DoS, System access
Released:    2004-02-25

A vulnerability has been reported in Windows XP, which potentially can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/10968/

 --

[SA10960] Avirt Voice/Soho Long Input Buffer Overflow Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-02-24

Donato Ferrante has reported some vulnerabilities in Avirt Voice and
Avirt Soho, which potentially can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/10960/

 --

[SA10948] PSOProxy Long Input Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-02-23

Donato Ferrante has discovered a vulnerability in PSOProxy, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/10948/

 --

[SA10947] Proxy-Pro Professional GateKeeper Buffer Overflow
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-02-23

Iván Rodriguez Almuiña has discovered a vulnerability in Proxy-Pro
Professional GateKeeper, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/10947/

 --

[SA10927] Cesar FTP "RETR" Command Handling Denial of Service
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-02-19

intuit has discovered a vulnerability in Cesar FTP, allowing malicious
users to cause a Denial of Service.

Full Advisory:
http://secunia.com/advisories/10927/

 --

[SA10972] TYPSoft FTP Server Denial of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2004-02-25

intuit has identified a vulnerability in TYPSoft FTP Server, allowing
malicious people to cause a Denial of Service.

Full Advisory:
http://secunia.com/advisories/10972/

 --

[SA10929] Small ftpd Denial of Service Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2004-02-19

intuit has identified a vulnerability in Small ftpd, allowing malicious
users to cause a partial Denial of Service.

Full Advisory:
http://secunia.com/advisories/10929/

 --

[SA10949] Dell TrueMobile WLAN Card Utility Privilege Escalation
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-02-23

Ian Vitek has reported a vulnerability in Dell TrueMobile WLAN Card
Utility, allowing malicious, local users to escalate their privileges.

Full Advisory:
http://secunia.com/advisories/10949/

 --

[SA10970] ICQ Predictable File Location Weakness

Critical:    Not critical
Where:       From remote
Impact:      
Released:    2004-02-25

A weakness has been identified in ICQ, which potentially can be
exploited in combination with known browser vulnerabilities and
functionality to compromise users' systems.

Full Advisory:
http://secunia.com/advisories/10970/

 --

[SA10930] AOL Instant Messenger Predictable File Location Weakness

Critical:    Not critical
Where:       From remote
Impact:      
Released:    2004-02-20

Michael Evanchik has reported a weakness in AOL Instant Messenger,
which potentially can be exploited in combination with known browser
vulnerabilities and functionality to compromise users' systems.

Full Advisory:
http://secunia.com/advisories/10930/


UNIX/Linux:--

[SA10966] Confirm Arbitrary Command Execution Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-02-24

Mariusz Woloszyn has discovered a vulnerability in Confirm, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/10966/

 --

[SA10961] Debian update for metamail

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-02-24

Debian has issued updated packages for metamail. These fix some
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/10961/

 --

[SA10982] Red Hat update for libxml2

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-02-26

Red Hat has issued updated packages for libxml2. These fix some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/10982/

 --

[SA10977] Fedora update for libxml2

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-02-26

Red Hat has issued updated packages for libxml2. These fix some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/10977/

 --

[SA10974] jabber-gg-transport Multiple Denial of Service
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-02-25

Some vulnerabilities have been reported in jabber-gg-transport, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/10974/

 --

[SA10959] Mac OS X Security Update Fixes Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, DoS, System access
Released:    2004-02-24

Multiple vulnerabilities have been discovered in Apple Mac OS X, where
some of the specified issues can be exploited to gain knowledge of
sensitive information, cause a DoS (Denial of Service), and potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/10959/

 --

[SA10951] Debian update for hsftp

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-02-23

Debian has issued updated packages for hsftp. These fix a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/10951/

 --

[SA10950] Hsftp Filename Format String Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-02-23

Ulf Harnhammar has discovered a vulnerability in Hsftp, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/10950/

 --

[SA10946] Debian update for pwlib

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-02-23

Debian has issued updated packages for pwlib. These fix some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/10946/

 --

[SA10940] OpenLinux update for mpg123

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-02-20

SCO has issued updated packages for mpg123. These fix some older
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/10940/

 --

[SA10928] NetBSD IPv6 Traffic Handling Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-02-19

NetBSD has fixed a vulnerability in the IPv6 traffic handling, which
can be exploited by malicious people to cause a DoS (Denial of Service)
on a vulnerable system.

Full Advisory:
http://secunia.com/advisories/10928/

 --

[SA10926] NetBSD update for OpenSSL

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-02-19

NetBSD has fixed a vulnerability in OpenSSL, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/10926/

 --

[SA10942] OpenLinux update for fetchmail

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2004-02-20

SCO has issued updated packages for fetchmail. These fix a
vulnerability, which can be exploited by malicious people to cause a
Denial of Service.

Full Advisory:
http://secunia.com/advisories/10942/

 --

[SA10925] OpenLinux update for Perl

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-02-23

SCO has issued updated packages for Perl. These fix an old
vulnerability in the Safe.pm module, which provides safe compartments
to evaluate Perl code in.

Full Advisory:
http://secunia.com/advisories/10925/

 --

[SA10924] NetBSD update for racoon

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data, DoS
Released:    2004-02-19

NetBSD has fixed a vulnerability in racoon IKE daemon, which can be
exploited by malicious people to cause a DoS (Denial of Service) on
users' connections.

Full Advisory:
http://secunia.com/advisories/10924/

 --

[SA10944] Conectiva update for XFree86

Critical:    Less critical
Where:       From local network
Impact:      System access, Privilege escalation
Released:    2004-02-23

Conectiva has issued updated packages for XFree86. This fixes some
vulnerabilities, which potentially can be exploited by malicious users
to escalate their privileges on a vulnerable system or compromise it.

Full Advisory:
http://secunia.com/advisories/10944/

 --

[SA10939] OpenLinux update for saned

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2004-02-20

SCO has issued updated packages for sane. These fix several
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/10939/

 --

[SA10979] Mandrake update for mtools

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-02-26

MandrakeSoft has issued updated packages for mtools. These fix a
vulnerability, which can be exploited by malicious, local users to
escalate their privileges.

Full Advisory:
http://secunia.com/advisories/10979/

 --

[SA10971] Mandrake update for kernel

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass, Privilege escalation, DoS
Released:    2004-02-25

MandrakeSoft has issued updated packages for the kernel. These fix
various vulnerabilities, which can be exploited by malicious, local
users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/10971/

 --

[SA10964] Trustix update for kernel

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-02-25

Trustix has issued updated packages for the kernel. These fix a
vulnerability, which can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/10964/

 --

[SA10952] Debian update for synaesthesia

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-02-23

Debian has issued updated packages for synaesthesia. These fix a
vulnerability allowing malicious, local users to escalate their
privileges on a vulnerable system.

Full Advisory:
http://secunia.com/advisories/10952/

 --

[SA10945] Synaesthesia Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-02-23

Ulf Harnhammar has identified a vulnerability in Synaesthesia, allowing
malicious users to escalate their privileges.

Full Advisory:
http://secunia.com/advisories/10945/

 --

[SA10943] Conectiva update for kernel

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass, Privilege escalation, DoS
Released:    2004-02-23

Conectiva has issued updated packages for the kernel. These fix various
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/10943/

 --

[SA10932] Red Hat update for kernel

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-02-20

Red Hat has issued an updated package for the kernel. This fixes a
vulnerability, which can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/10932/

 --

[SA10931] Debian update for XFree86

Critical:    Less critical
Where:       Local system
Impact:      DoS, Privilege escalation
Released:    2004-02-20

Debian has issued updated packages for XFree86. These fix some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/10931/

 --

[SA10922] AIX X Server Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-02-19

IBM has acknowledged a vulnerability in AIX, which can be exploited by
malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/10922/

 --

[SA10941] OpenLinux update for BIND

Critical:    Not critical
Where:       From local network
Impact:      DoS
Released:    2004-02-20

SCO has issued updated packages for bind. These fix a vulnerability,
which can be exploited by malicious people to poison the DNS cache with
negative entries.

Full Advisory:
http://secunia.com/advisories/10941/

 --

[SA10957] SuSE update for XFree86

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2004-02-24

SuSE has issued patches, which fix some vulnerabilities in XFree86.
These can be exploited by malicious, local users to crash the X server
on a vulnerable system.

Full Advisory:
http://secunia.com/advisories/10957/

 --

[SA10954] Debian update for lbreakout2

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-02-23

Debian has issued updated packages for lbreakout2. These fix a
vulnerability allowing malicious, local users to escalate their
privileges on a vulnerable system.

Full Advisory:
http://secunia.com/advisories/10954/

 --

[SA10953] LBreakout 2 Privilege Escalation Vulnerability

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-02-23

Ulf Harnhammar has identified a vulnerability in LBreakout 2, allowing
malicious, local users to escalate their privileges on a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/10953/


Other:--

[SA10962] Apache Directory Traversal Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2004-02-24

Jeremy Bae has reported a vulnerability in Apache running on cygwin,
allowing malicious people to view arbitrary files on a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/10962/

 --

[SA10934] TANDBERG Products H.323 Protocol Implementation
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-02-20

TANDBERG has acknowledged that some products are affected by the
recently reported vulnerabilities in various vendors' H.323 protocol
implementations.

Full Advisory:
http://secunia.com/advisories/10934/

 --

[SA10933] Cisco ONS 15000 Multiple Vulnerabilities

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass, Exposure of system information, DoS
Released:    2004-02-20

Multiple vulnerabilities have been reported in various products running
Cisco ONS, which can be exploited by malicious people to gain knowledge
of system information, cause a DoS (Denial of Service), or gain
unauthorised access.

Full Advisory:
http://secunia.com/advisories/10933/

 --

[SA10976] nCipher HSM Exposure of Secrets

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2004-02-25

nCipher has reported a vulnerability in various HSM products, allowing
malicious users to gain access to secrets stored in run-time memory.

Full Advisory:
http://secunia.com/advisories/10976/

 --

[SA10923] Linksys WAP55AG Exposure of SNMP Community Strings

Critical:    Not critical
Where:       From local network
Impact:      Exposure of sensitive information
Released:    2004-02-19

NN Poster has reported a weakness in Linksys WAP55AG, allowing
malicious users to see SNMP community strings.

Full Advisory:
http://secunia.com/advisories/10923/


Cross Platform:--

[SA10967] Opt-X Arbitrary File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-02-24

G00db0y has reported a vulnerability in Opt-X, which can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/10967/

 --

[SA10963] XMB Cross Site Scripting and SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of sensitive information
Released:    2004-02-24

Janek Vind has reported multiple vulnerabilities in XMB, allowing
malicious people to conduct Cross Site Scripting and SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/10963/

 --

[SA10958] Libxml2 URI Parsing Buffer Overflow Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-02-24

Yuuichi Teranishi has discovered some vulnerabilities in libxml2, which
potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/10958/

 --

[SA10956] Quicktime/Darwin Streaming Server DESCRIBE Request Denial of
Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-02-24

iDEFENSE has reported a vulnerability in QuickTime/Darwin Streaming
Server, which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/10956/

 --

[SA10955] phpNewsManager "functions.php" Directory Traversal
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2004-02-23

G00db0y has reported a vulnerability in phpNewsManager, which can be
exploited by malicious people to gain knowledge of sensitive
information.

Full Advisory:
http://secunia.com/advisories/10955/

 --

[SA10936] Oracle9i Database and Application Server SOAP DTD Denial of
Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-02-20

Amit Klein has identified a vulnerability in Oracle9i Database and
Application Server, allowing malicious people to cause a Denial of
Service.

Full Advisory:
http://secunia.com/advisories/10936/

 --

[SA10969] Platform LSF "eauth" Component Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      Security Bypass, ID Spoofing, Privilege escalation, System
access
Released:    2004-02-24

Tomasz Grabowski has reported some vulnerabilities in Platform LSF,
which can be exploited by malicious people to impersonate other users,
gain escalated privileges, and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/10969/

 --

[SA10938] Oracle9i Lite Unspecified Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      Security Bypass
Released:    2004-02-23

Oracle has issued updates for Oracle9i Lite. These fix an unspecified
vulnerability, allowing authenticated users to gain access to a
connected Oracle database server.

Full Advisory:
http://secunia.com/advisories/10938/

 --

[SA10935] LiveJournal Cross Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-02-23

Joshua Miller has reported a vulnerability in LiveJournal allowing
malicious people to conduct Cross Site Scripting attacks.

Full Advisory:
http://secunia.com/advisories/10935/

 --

[SA10937] Oracle9i Database User Session Hijacking Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      Hijacking, DoS
Released:    2004-02-23

Oracle has issued updates for Oracle 9i Database, these fix a
vulnerability allowing malicious users to hijack other sessions or
cause a Denial of Service.

Full Advisory:
http://secunia.com/advisories/10937/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45

========================================================================



-
ISN is currently hosted by Attrition.org

To unsubscribe email majordomo@private with 'unsubscribe isn'
in the BODY of the mail.



This archive was generated by hypermail 2b30 : Fri Feb 27 2004 - 04:33:44 PST