[ISN] Secunia Weekly Summary - Issue: 2004-11

From: InfoSec News (isn@private)
Date: Thu Mar 11 2004 - 23:00:53 PST

  • Next message: InfoSec News: "[ISN] Leaked Code Still Could Bear Malicious Fruit"

    ========================================================================
    
                      The Secunia Weekly Advisory Summary                  
                            2004-03-04 - 2004-03-11                        
    
                           This week : 47 advisories                       
    
    ========================================================================
    Table of Contents:
    
    1.....................................................Word From Secunia
    2....................................................This Week In Brief
    3...............................This Weeks Top Ten Most Read Advisories
    4.......................................Vulnerabilities Summary Listing
    5.......................................Vulnerabilities Content Listing
    
    ========================================================================
    1) Word From Secunia:
    
    The Secunia staff is spending hours every day to assure you the best
    and most reliable source for vulnerability information. Every single 
    vulnerability report is being validated and verified before a Secunia
    advisory is written.
    
    Secunia validates and verifies vulnerability reports in many different
    ways e.g. by downloading the software and performing comprehensive
    tests, by reviewing source code, or by validating the credibility of
    the source from which the vulnerability report was issued.
    
    As a result, Secunia's database is the most correct and complete source
    for recent vulnerability information available on the Internet.
    
    Secunia Online Vulnerability Database:
    http://secunia.com/
    
    ========================================================================
    2) This Week in Brief:
    
    Martin O'Neal of Corsaire has discovered a vulnerability, which affects
    almost all Internet browsers. The vulnerability lies in the way
    browsers validate restricted cookie paths, and could be exploited to
    gain access to cookie information within restricted paths.
    Reportedly, most vendors have silently patched this problem. Please
    refer to the Secunia advisory for further details.
    
    Reference:
    http://secunia.com/SA9680
    
    
    Microsoft has issued three security bulletins, which fix
    vulnerabilities
    in Outlook 2002, Windows 2000 Server, and MSN Messenger. Links to
    updated versions and patches can be found in the Secunia advisories
    below.
    
    References:
    http://secunia.com/SA11078
    http://secunia.com/SA11077
    http://secunia.com/SA11076
    
    ========================================================================
    3) This Weeks Top Ten Most Read Advisories:
    
    1.  [SA10395] Internet Explorer URL Spoofing Vulnerability
    2.  [SA11039] ProFTPD ASCII File Translation Off-By-One Vulnerability
    3.  [SA11037] Adobe Acrobat Reader XML Forms Data Format Buffer
                  Overflow
    4.  [SA10706] Serv-U FTP Server "SITE CHMOD" Command Buffer Overflow
                  Vulnerability
    5.  [SA11078] Microsoft MSN Messenger Arbitrary File Retrieval
                  Vulnerability
    6.  [SA10736] Internet Explorer File Download Extension Spoofing
    7.  [SA10995] WinZip MIME Archive Parsing Buffer Overflow Vulnerability
    8.  [SA11076] Microsoft Outlook 2002 mailto URI Cross Site Scripting
                  Vulnerability
    9.  [SA10988] ISS Multiple Products SMB Packet Handling Buffer Overflow
                  Vulnerability
    10. [SA11077] Microsoft Windows 2000 Server Media Services Denial of
                  Service
    
    ========================================================================
    4) Vulnerabilities Summary Listing
    
    Windows:
    [SA11076] Microsoft Outlook 2002 mailto URI Cross Site Scripting
    Vulnerability
    [SA11048] SLMail Pro Multiple Buffer Overflow Vulnerabilities
    [SA11078] Microsoft MSN Messenger Arbitrary File Retrieval
    Vulnerability
    [SA11077] Microsoft Windows 2000 Server Media Services Denial of
    Service
    [SA11044] Spider Sales SQL Injection and Weak Encryption
    [SA11075] Chat Anywhere User Management Bypass Vulnerability
    [SA11042] SmarterMail Multiple Vulnerabilities
    [SA11086] DB2 Remote Command Server Privilege Escalation Vulnerability
    [SA11046] Norton AntiVirus 2002 Virus Detection Bypass Issue
    [SA11040] DAWKCo POP3 Server with WebMAIL Extension Session
    Reactivation
    
    UNIX/Linux:
    [SA11058] Sun Cobalt update for rsync
    [SA11082] Sun Java System (Sun ONE) SSL Vulnerabilities
    [SA11079] OpenPKG update for mutt
    [SA11063] Debian update for wu-ftpd
    [SA11062] Red Hat update for WU-FTPD
    [SA11047] HP Tru64 UNIX Unspecified IPsec/IKE Vulnerabilities
    [SA11039] ProFTPD ASCII File Translation Off-By-One Vulnerability
    [SA11089] F-Secure Anti-Virus for Linux Virus Detection Vulnerability
    [SA11084] Debian update for Python
    [SA11081] Mandrake update for python
    [SA11080] Python DNS Response Buffer Overflow Vulnerability
    [SA11074] OpenBSD Out-of-Sequence TCP Packet Denial of Service
    Vulnerability
    [SA11051] Gentoo update for libxml2
    [SA11050] OpenPKG update for libxml2
    [SA11043] Debian update for libxml/libxml2
    [SA11100] Fedora update for coreutils
    [SA11099] Debian update for kdelibs
    [SA11098] Mandrake update for kdelibs
    [SA11095] Red Hat update for kdelibs
    [SA11088] Apache mod_access Rule Bypass Issue
    [SA11055] WU-FTPD Directory Access Restriction Bypass Vulnerability
    [SA11049] Fedora update for mailman
    [SA11038] OpenLinux update for CUPS
    [SA11083] Sun Solaris UUCP Buffer Overflow Vulnerabilities
    [SA11061] GNU Automake Insecure Temporary Directory Creation
    Vulnerability
    [SA11060] OpenPKG update for libtool
    [SA11059] Sun Cobalt update for kernel
    [SA11052] Gentoo update for kernel
    [SA11097] Mandrake update for gdk-pixbuf
    [SA11094] Red Hat update for gdk-pixbuf
    [SA11056] Safari JavaScript Array Creation Denial of Service
    
    Other:
    [SA11045] Cisco Content Services Switch 11000 Series Denial of Service
    
    Cross Platform:
    [SA11057] PWebServer Directory Traversal Vulnerability
    [SA11041] GWeb Directory Traversal Vulnerability
    [SA11092] Apache mod_ssl HTTP Request Denial of Service Vulnerability
    [SA11054] VirtuaNews Cross Site Scripting Vulnerabilities
    [SA11053] Invision Power Board Cross-Site Scripting Vulnerabilities
    
    ========================================================================
    5) Vulnerabilities Content Listing
    
    Windows:--
    
    [SA11076] Microsoft Outlook 2002 mailto URI Cross Site Scripting
    Vulnerability
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      Cross Site Scripting, System access
    Released:    2004-03-09
    
    Jouko Pynnönen has discovered a vulnerability in Outlook 2002, allowing
    malicious people to conduct Cross Site Scripting attacks and execute
    arbitrary code in the Local Security Zone.
    
    Full Advisory:
    http://secunia.com/advisories/11076/
    
     --
    
    [SA11048] SLMail Pro Multiple Buffer Overflow Vulnerabilities
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access
    Released:    2004-03-05
    
    NGSSoftware has discovered multiple vulnerabilities in SLMail Pro,
    which can be exploited by malicious people to compromise a vulnerable
    system.
    
    Full Advisory:
    http://secunia.com/advisories/11048/
    
     --
    
    [SA11078] Microsoft MSN Messenger Arbitrary File Retrieval
    Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Exposure of sensitive information
    Released:    2004-03-09
    
    qFox and Mephisto have discovered a vulnerability in Microsoft MSN
    Messenger, allowing malicious people to retrieve files from a
    vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11078/
    
     --
    
    [SA11077] Microsoft Windows 2000 Server Media Services Denial of
    Service
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-03-09
    
    Qualys has discovered a vulnerability in Microsoft Media Services,
    allowing malicious people to cause a Denial of Service against the
    Media Services.
    
    Full Advisory:
    http://secunia.com/advisories/11077/
    
     --
    
    [SA11044] Spider Sales SQL Injection and Weak Encryption
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Security Bypass, Manipulation of data, Exposure of system
    information, Exposure of sensitive information
    Released:    2004-03-05
    
    Nick Gudov has reported two vulnerabilities in Spider Sales, allowing
    malicious people to conduct SQL injection attacks and to decrypt
    sensitive information.
    
    Full Advisory:
    http://secunia.com/advisories/11044/
    
     --
    
    [SA11075] Chat Anywhere User Management Bypass Vulnerability
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Security Bypass
    Released:    2004-03-09
    
    Luigi Auriemma has reported a vulnerability in Chat Anywhere, which can
    be exploited by malicious users to circumvent certain administrative
    user management features.
    
    Full Advisory:
    http://secunia.com/advisories/11075/
    
     --
    
    [SA11042] SmarterMail Multiple Vulnerabilities
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting, Exposure of sensitive information,
    DoS
    Released:    2004-03-05
    
    Dr_insane has reported some vulnerabilities in SmartMail, allowing
    malicious people to cause a Denial of Service, view the contents of
    arbitrary files, and potentially conduct Cross Site Scripting attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11042/
    
     --
    
    [SA11086] DB2 Remote Command Server Privilege Escalation Vulnerability
    
    Critical:    Less critical
    Where:       From local network
    Impact:      Privilege escalation
    Released:    2004-03-10
    
    NGSSoftware has discovered a vulnerability in DB2, which can be
    exploited by malicious users to gain escalated privileges.
    
    Full Advisory:
    http://secunia.com/advisories/11086/
    
     --
    
    [SA11046] Norton AntiVirus 2002 Virus Detection Bypass Issue
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Security Bypass
    Released:    2004-03-10
    
    Bipin Gautam has reported a security issue in Norton AntiVirus 2002,
    which may result in malware being executed undetected.
    
    Full Advisory:
    http://secunia.com/advisories/11046/
    
     --
    
    [SA11040] DAWKCo POP3 Server with WebMAIL Extension Session
    Reactivation
    
    Critical:    Not critical
    Where:       Local system
    Impact:      Security Bypass
    Released:    2004-03-04
    
    Ian Koch has reported a security issue in DAWKCo POP3 Server Hosting
    Version with WebMAIL Extension, allowing malicious users to gain access
    to a session.
    
    Full Advisory:
    http://secunia.com/advisories/11040/
    
    
    UNIX/Linux:--
    
    [SA11058] Sun Cobalt update for rsync
    
    Critical:    Extremely critical
    Where:       From remote
    Impact:      System access
    Released:    2004-03-09
    
    Sun has issued an updated package for rsync. This fixes a
    vulnerability, which can be exploited by malicious people to compromise
    a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11058/
    
     --
    
    [SA11082] Sun Java System (Sun ONE) SSL Vulnerabilities
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2004-03-10
    
    Sun has issued updated packages for Sun Java System Web Server and
    Application Server (formerly Sun ONE). These fix various
    vulnerabilities, which can be exploited by malicious people to cause a
    Denial of Service and potentially compromise a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11082/
    
     --
    
    [SA11079] OpenPKG update for mutt
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2004-03-10
    
    OpenPKG has issued updated packages for mutt. These fix a
    vulnerability, which can be exploited by malicious people to crash the
    mail client or potentially compromise a user's system.
    
    Full Advisory:
    http://secunia.com/advisories/11079/
    
     --
    
    [SA11063] Debian update for wu-ftpd
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      Security Bypass, DoS, System access
    Released:    2004-03-09
    
    Debian has issued updated packages for wu-ftpd. These fix two
    vulnerabilities, which potentially can be exploited by malicious users
    to bypass certain restrictions or compromise a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11063/
    
     --
    
    [SA11062] Red Hat update for WU-FTPD
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      Security Bypass, DoS, System access
    Released:    2004-03-09
    
    Red Hat has issued updated packages for wu-ftpd. These fix two
    vulnerabilities, which potentially can be exploited by malicious users
    to bypass certain restrictions or compromise a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11062/
    
     --
    
    [SA11047] HP Tru64 UNIX Unspecified IPsec/IKE Vulnerabilities
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access
    Released:    2004-03-05
    
    HP has fixed some vulnerabilities in Tru64, which potentially can be
    exploited by malicious people to compromise a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11047/
    
     --
    
    [SA11039] ProFTPD ASCII File Translation Off-By-One Vulnerability
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access
    Released:    2004-03-04
    
    Phantasmal Phantasmagoria has reported a vulnerability in ProFTPD,
    which potentially can be exploited by malicious users to compromise a
    vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11039/
    
     --
    
    [SA11089] F-Secure Anti-Virus for Linux Virus Detection Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Security Bypass
    Released:    2004-03-10
    
    A vulnerability has been reported in F-Secure Anti-Virus for Linux,
    potentially allowing malware to bypass the virus detection.
    
    Full Advisory:
    http://secunia.com/advisories/11089/
    
     --
    
    [SA11084] Debian update for Python
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-03-10
    
    Debian has issued updated packages for Python. These fix a
    vulnerability, which potentially can be exploited by malicious people
    to compromise a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11084/
    
     --
    
    [SA11081] Mandrake update for python
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-03-10
    
    MandrakeSoft has issued updated packages for Python. These fix a
    vulnerability, which potentially can be exploited by malicious people
    to compromise a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11081/
    
     --
    
    [SA11080] Python DNS Response Buffer Overflow Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-03-10
    
    Sebastian Schmidt has discovered a vulnerability in Python, potentially
    allowing malicious people to execute arbitrary code on a vulnerable
    system.
    
    Full Advisory:
    http://secunia.com/advisories/11080/
    
     --
    
    [SA11074] OpenBSD Out-of-Sequence TCP Packet Denial of Service
    Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-03-09
    
    OpenBSD has issued a patch, which fixes a vulnerability allowing
    malicious people to cause a DoS (Denial of Service).
    
    Full Advisory:
    http://secunia.com/advisories/11074/
    
     --
    
    [SA11051] Gentoo update for libxml2
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-03-08
    
    Gentoo has issued updated packages for libxml2. These fix some
    vulnerabilities, which potentially can be exploited by malicious people
    to compromise a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11051/
    
     --
    
    [SA11050] OpenPKG update for libxml2
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-03-08
    
    OpenPKG has issued updated packages for libxml2. These fix some
    vulnerabilities, which potentially can be exploited by malicious people
    to compromise a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11050/
    
     --
    
    [SA11043] Debian update for libxml/libxml2
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-03-04
    
    Debian has issued updated packages for libxml and libxml2. These fix
    some vulnerabilities, which potentially can be exploited by malicious
    people to compromise a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11043/
    
     --
    
    [SA11100] Fedora update for coreutils
    
    Critical:    Less critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-03-11
    
    Fedora has issued updated packages for coreutils. These fix two
    vulnerabilities in the "ls" program, which can be exploited by
    malicious users to cause a DoS (Denial of Service).
    
    Full Advisory:
    http://secunia.com/advisories/11100/
    
     --
    
    [SA11099] Debian update for kdelibs
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Security Bypass
    Released:    2004-03-11
    
    Debian has issued updated packages for kdelibs. These fix a
    vulnerability, which potentially can be exploited to bypass certain
    cookie path restrictions.
    
    Full Advisory:
    http://secunia.com/advisories/11099/
    
     --
    
    [SA11098] Mandrake update for kdelibs
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Security Bypass
    Released:    2004-03-10
    
    MandrakeSoft has issued updated packages for kdelibs. These fix a
    vulnerability, which potentially can be exploited to bypass certain
    cookie path restrictions.
    
    Full Advisory:
    http://secunia.com/advisories/11098/
    
     --
    
    [SA11095] Red Hat update for kdelibs
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Security Bypass
    Released:    2004-03-10
    
    Red Hat has issued updated packages for kdelibs. These fix a
    vulnerability, which potentially can be exploited to bypass certain
    cookie path restrictions.
    
    Full Advisory:
    http://secunia.com/advisories/11095/
    
     --
    
    [SA11088] Apache mod_access Rule Bypass Issue
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Security Bypass
    Released:    2004-03-10
    
    A security issue has been reported in Apache on big-endian 64bit
    systems, which can be exploited by malicious people to bypass certain
    restrictions.
    
    Full Advisory:
    http://secunia.com/advisories/11088/
    
     --
    
    [SA11055] WU-FTPD Directory Access Restriction Bypass Vulnerability
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Security Bypass
    Released:    2004-03-09
    
    Glenn Stewart has discovered a vulnerability in wu-ftpd, which can be
    exploited by malicious, authenticated users to circumvent certain
    restrictions.
    
    Full Advisory:
    http://secunia.com/advisories/11055/
    
     --
    
    [SA11049] Fedora update for mailman
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2004-03-08
    
    Red Hat has issued updated packages for mailman. These fix a
    vulnerability, which can be exploited by malicious people to conduct
    cross-site scripting attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11049/
    
     --
    
    [SA11038] OpenLinux update for CUPS
    
    Critical:    Less critical
    Where:       From local network
    Impact:      DoS
    Released:    2004-03-04
    
    SCO has issued updated packages for cups. These fix a vulnerability,
    which can be exploited by malicious people to cause a DoS (Denial of
    Service).
    
    Full Advisory:
    http://secunia.com/advisories/11038/
    
     --
    
    [SA11083] Sun Solaris UUCP Buffer Overflow Vulnerabilities
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-03-10
    
    Sun has reported multiple vulnerabilities in Solaris, potentially
    allowing malicious, local users to gain escalated privileges on a
    vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11083/
    
     --
    
    [SA11061] GNU Automake Insecure Temporary Directory Creation
    Vulnerability
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-03-09
    
    Stefan Nordhausen has discovered a vulnerability in GNU Automake, which
    can be exploited by malicious, local users to perform certain actions
    on a vulnerable system with escalated privileges.
    
    Full Advisory:
    http://secunia.com/advisories/11061/
    
     --
    
    [SA11060] OpenPKG update for libtool
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-03-09
    
    OpenPKG has issued updated packages for libtool. These fix a
    vulnerability, allowing malicious users to escalate their privileges on
    a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11060/
    
     --
    
    [SA11059] Sun Cobalt update for kernel
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-03-09
    
    Sun has issued an updated package for the kernel. This fixes various
    vulnerabilities, which can be exploited by malicious, local users to
    gain escalated privileges.
    
    Full Advisory:
    http://secunia.com/advisories/11059/
    
     --
    
    [SA11052] Gentoo update for kernel
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-03-08
    
    Gentoo has issued an updated package for the kernel. This fixes a
    vulnerability, which can be exploited by malicious, local users to gain
    escalated privileges.
    
    Full Advisory:
    http://secunia.com/advisories/11052/
    
     --
    
    [SA11097] Mandrake update for gdk-pixbuf
    
    Critical:    Not critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-03-10
    
    MandrakeSoft has issued updated packages for gdk-pixbuf. These fix a
    vulnerability, which can be exploited by malicious people to crash
    certain applications like Evolution on a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11097/
    
     --
    
    [SA11094] Red Hat update for gdk-pixbuf
    
    Critical:    Not critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-03-10
    
    Red Hat has issued updated packages for gdk-pixbuf. These fix a
    vulnerability, which can be exploited by malicious people to crash
    certain applications like Evolution on a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11094/
    
     --
    
    [SA11056] Safari JavaScript Array Creation Denial of Service
    
    Critical:    Not critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-03-08
    
    kang has reported a vulnerability in Safari, which can be exploited by
    malicious people to cause a Denial of Service.
    
    Full Advisory:
    http://secunia.com/advisories/11056/
    
    
    Other:--
    
    [SA11045] Cisco Content Services Switch 11000 Series Denial of Service
    
    Critical:    Not critical
    Where:       From local network
    Impact:      DoS
    Released:    2004-03-05
    
    Cisco has reported a vulnerability in Cisco Content Services Switch
    11000 Series, allowing malicious people to cause a Denial of Service.
    
    Full Advisory:
    http://secunia.com/advisories/11045/
    
    
    Cross Platform:--
    
    [SA11057] PWebServer Directory Traversal Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Exposure of system information, Exposure of sensitive
    information
    Released:    2004-03-08
    
    Donato Ferrante has discovered a vulnerability in PWebServer, which can
    be exploited by malicious people to read arbitrary files on a
    vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11057/
    
     --
    
    [SA11041] GWeb Directory Traversal Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Exposure of sensitive information
    Released:    2004-03-04
    
    Donato Ferrante has reported a vulnerability in GWeb, allowing
    malicious people to read arbitrary files on a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11041/
    
     --
    
    [SA11092] Apache mod_ssl HTTP Request Denial of Service Vulnerability
    
    Critical:    Less critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-03-10
    
    Mick Wall has discovered a vulnerability in Apache 2, which can be
    exploited by malicious people to cause a DoS (Denial of Service).
    
    Full Advisory:
    http://secunia.com/advisories/11092/
    
     --
    
    [SA11054] VirtuaNews Cross Site Scripting Vulnerabilities
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2004-03-08
    
    Rafal Ivgi has reported some vulnerabilities in VirtuaNews, allowing
    malicious people to conduct Cross Site Scripting attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11054/
    
     --
    
    [SA11053] Invision Power Board Cross-Site Scripting Vulnerabilities
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2004-03-08
    
    Rafel Ivgi has discovered multiple vulnerabilities in Invision Power
    Board, allowing malicious people to conduct cross-site scripting
    attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11053/
    
    
    
    ========================================================================
    
    Secunia recommends that you verify all advisories you receive,
    by clicking the link.
    Secunia NEVER sends attached files with advisories.
    Secunia does not advise people to install third party patches, only use
    those supplied by the vendor.
    
    Definitions: (Criticality, Where etc.)
    http://secunia.com/about_secunia_advisories/
    
    Subscribe:
    http://secunia.com/secunia_weekly_summary/
    
    Contact details:
    Web	: http://secunia.com/
    E-mail	: support@private
    Tel	: +45 70 20 51 44
    Fax	: +45 70 20 51 45
    
    ========================================================================
    
    
    
    -
    ISN is currently hosted by Attrition.org
    
    To unsubscribe email majordomo@private with 'unsubscribe isn'
    in the BODY of the mail.
    



    This archive was generated by hypermail 2b30 : Fri Mar 12 2004 - 01:48:37 PST