[ISN] Secunia Weekly Summary - Issue: 2004-14

From: InfoSec News (isn@private)
Date: Fri Apr 02 2004 - 04:23:54 PST

  • Next message: InfoSec News: "[ISN] Linux Advisory Watch - April 2nd 2004"

    ========================================================================
    
                      The Secunia Weekly Advisory Summary                  
                            2004-03-25 - 2004-04-01                        
    
                           This week : 50 advisories                       
    
    ========================================================================
    Table of Contents:
    
    1.....................................................Word From Secunia
    2....................................................This Week In Brief
    3...............................This Weeks Top Ten Most Read Advisories
    4.......................................Vulnerabilities Summary Listing
    5.......................................Vulnerabilities Content Listing
    
    ========================================================================
    1) Word From Secunia:
    
    The Secunia staff is spending hours every day to assure you the best
    and most reliable source for vulnerability information. Every single 
    vulnerability report is being validated and verified before a Secunia
    advisory is written.
    
    Secunia validates and verifies vulnerability reports in many different
    ways e.g. by downloading the software and performing comprehensive
    tests, by reviewing source code, or by validating the credibility of
    the source from which the vulnerability report was issued.
    
    As a result, Secunia's database is the most correct and complete source
    for recent vulnerability information available on the Internet.
    
    Secunia Online Vulnerability Database:
    http://secunia.com/
    
    ========================================================================
    2) This Week in Brief:
    
    During the past week there has been a lot of talk about a "new"
    vulnerability in Internet Explorer. It has even been referred to as a
    so called "Zero-day" vulnerability. However, this is not the case.
     
    It is a variant of an older vulnerability in the "ShowHelp()" function
    in Internet Explorer, which allows a malicious website to download and
    run ".CHM" files on the local system.
    
    What's new, and what people have been talking about is that instead of
    using the "ShowHelp()" function in Internet Explorer, a new attack
    vector for this problem has been revealed by using either the "ms-its:"
    or "mk:@MSITStore:" URI handlers.
    
    More information about this can be found in referenced Secunia Advisory
    below.
    
    Reference:
    http://secunia.com/SA10523
    
    ========================================================================
    3) This Weeks Top Ten Most Read Advisories:
    
    1.  [SA10395] Internet Explorer URL Spoofing Vulnerability
    2.  [SA11082] Sun Java System (Sun ONE) SSL Vulnerabilities
    3.  [SA11199] Microsoft Visual C++ Constructed ISAPI Extensions Denial
                  of Service
    4.  [SA11228] Check Point Products OpenSSL Vulnerabilities
    6.  [SA11139] OpenSSL SSL/TLS Handshake Denial of Service
                  Vulnerabilities
    7.  [SA11213] HP Web JetAdmin Multiple Vulnerabilities
    8.  [SA11168] Symantec Internet Security ActiveX Component Arbitrary
                  File Execution
    9.  [SA11215] Trend Micro Interscan VirusWall Directory Traversal
                  Vulnerability
    10. [SA10523] Internet Explorer showHelp() Restriction Bypass
                  Vulnerability
    
    ========================================================================
    4) Vulnerabilities Summary Listing
    
    Windows:
    [SA11231] Foxmail UrlToLocal Buffer Overflow Vulnerability
    [SA11236] A-CART SQL Injection and Cross Site Scripting
    Vulnerabilities
    [SA11216] Nexgen FTP Server Directory Traversal Vulnerability
    [SA11222] eSignal STREAMQUOTE Buffer Overflow Vulnerability
    [SA11215] Trend Micro Interscan VirusWall Directory Traversal
    Vulnerability
    
    UNIX/Linux:
    [SA11264] LIN:BOX Web-based Management Interface User Authentication
    Bypass
    [SA11256] MadBMS Unspecified Login Vulnerability
    [SA11235] psInclude Arbitrary Command Execution Vulnerability
    [SA11218] OpenLinux update for mutt
    [SA11263] Gentoo update for mplayer
    [SA11262] Gentoo update for mc
    [SA11261] Gentoo update for OpenLDAP
    [SA11255] quoteengine SQL Injection Vulnerability
    [SA11250] Red Hat update for ethereal
    [SA11248] OpenLinux update for vim
    [SA11246] Mandrake update for Ethereal
    [SA11240] Gentoo update for oftpd
    [SA11239] Red Hat update for mozilla
    [SA11238] Debian update for libpam-pgsql
    [SA11237] libpam-pgsql SQL Injection Vulnerability
    [SA11232] Hibyte HiGuest Script Insertion Vulnerability
    [SA11227] Gentoo update for Courier
    [SA11226] Gentoo update for UUDeview
    [SA11225] Gentoo update for ethereal
    [SA11220] oftpd PORT Command Denial of Service Vulnerability
    [SA11219] OpenLinux update for mc
    [SA11217] Gentoo update for Apache 2
    [SA11214] Sun Solaris CDE dtlogin XDMCP Parsing Vulnerability
    [SA11260] SillySearch "search" Parameter Cross Site Scripting
    Vulnerability
    [SA11258] TCPDUMP ISAKMP Payload Handling Denial of Service
    Vulnerabilities
    [SA11257] Gentoo update for fetchmail
    [SA11249] UnixWare update for Perl
    [SA11244] cPanel Multiple Cross-Site Scripting Vulnerabilities
    [SA11234] Interchange Arbitrary Variable Content Disclosure
    [SA11230] XMB Cross Site Scripting Vulnerabilities
    [SA11233] FreeBSD IPv6 "setsockopt()" Input Validation Vulnerability
    [SA11224] GNOME gnome-session Privilege Escalation Vulnerability
    [SA11253] Clam AntiVirus Realtime Scanning VirusEvent Security Issue
    [SA11247] OpenLinux update for util-linux
    
    Other:
    [SA11254] Symantec Clientless VPN Gateway OpenSSL Vulnerability
    
    Cross Platform:
    [SA11259] MPlayer HTTP Location Header Parsing Heap Overflow
    Vulnerability
    [SA11245] eZ publish Unspecified Template Editing Vulnerability
    [SA11241] PhotoPost Multiple Vulnerabilities
    [SA11229] phpBB "privmsg.php" SQL Injection Vulnerability
    [SA11228] Check Point Products OpenSSL Vulnerabilities
    [SA11221] phpBB Multiple Vulnerabilities
    [SA11243] Cloisterblog Multiple Vulnerabilities
    [SA11242] WebCT Campus Edition Cross Site Scripting Vulnerability
    [SA11223] MySQL "mysqlbug" Insecure Temporary File Creation
    Vulnerability
    [SA11251] Oracle9i Application Server Cross Site Scripting
    Vulnerability
    
    ========================================================================
    5) Vulnerabilities Content Listing
    
    Windows:--
    
    [SA11231] Foxmail UrlToLocal Buffer Overflow Vulnerability
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access
    Released:    2004-03-29
    
    The XFOCUS Security Team has reported a vulnerability in Foxmail, which
    can be exploited by malicious people to compromise a vulnerable
    system.
    
    Full Advisory:
    http://secunia.com/advisories/11231/
    
     --
    
    [SA11236] A-CART SQL Injection and Cross Site Scripting
    Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Cross Site Scripting, Manipulation of data
    Released:    2004-03-30
    
    Manuel Lopez has reported two vulnerabilities in A-CART, which can be
    exploited by malicious people to conduct Cross Site Scripting and SQL
    injection attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11236/
    
     --
    
    [SA11216] Nexgen FTP Server Directory Traversal Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Exposure of sensitive information
    Released:    2004-03-25
    
    Ziv Kamir has reported a vulnerability in Nexgen FTP Server, allowing
    malicious people to gain knowledge of sensitive information.
    
    Full Advisory:
    http://secunia.com/advisories/11216/
    
     --
    
    [SA11222] eSignal STREAMQUOTE Buffer Overflow Vulnerability
    
    Critical:    Moderately critical
    Where:       From local network
    Impact:      System access
    Released:    2004-03-26
    
    Vizzy has reported a vulnerability in eSignal, which can be exploited
    by malicious people to compromise a user's system.
    
    Full Advisory:
    http://secunia.com/advisories/11222/
    
     --
    
    [SA11215] Trend Micro Interscan VirusWall Directory Traversal
    Vulnerability
    
    Critical:    Less critical
    Where:       From local network
    Impact:      Exposure of sensitive information
    Released:    2004-03-25
    
    Tri Huynh has reported a vulnerability in Trendmicro Interscan
    VirusWall, allowing malicious people to gain knowledge of sensitive
    information.
    
    Full Advisory:
    http://secunia.com/advisories/11215/
    
    
    UNIX/Linux:--
    
    [SA11264] LIN:BOX Web-based Management Interface User Authentication
    Bypass
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      Security Bypass
    Released:    2004-03-31
    
    Martin Eiszner has reported a vulnerability in LIN:BOX, which can be
    exploited by malicious people to bypass the user authentication of the
    web-based management interface.
    
    Full Advisory:
    http://secunia.com/advisories/11264/
    
     --
    
    [SA11256] MadBMS Unspecified Login Vulnerability
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      
    Released:    2004-03-31
    
    Andy has discovered an unspecified vulnerability within the login
    functionality of MadBMS.
    
    Full Advisory:
    http://secunia.com/advisories/11256/
    
     --
    
    [SA11235] psInclude Arbitrary Command Execution Vulnerability
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access
    Released:    2004-03-30
    
    Haris Tbr has discovered a vulnerability in psInclude, which can be
    exploited by malicious people to compromise a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11235/
    
     --
    
    [SA11218] OpenLinux update for mutt
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access, DoS
    Released:    2004-03-26
    
    SCO has issued updated packages for mutt. These fix a vulnerability,
    which can be exploited by malicious people to crash the mail client or
    potentially compromise a user's system.
    
    Full Advisory:
    http://secunia.com/advisories/11218/
    
     --
    
    [SA11263] Gentoo update for mplayer
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-03-31
    
    Gentoo has issued an update for mplayer. This fixes a vulnerability,
    which potentially can be exploited by malicious people to compromise a
    user's system.
    
    Full Advisory:
    http://secunia.com/advisories/11263/
    
     --
    
    [SA11262] Gentoo update for mc
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-03-31
    
    Gentoo has issued an update for mc. This fixes a vulnerability, which
    potentially can be exploited by malicious people to compromise a user's
    system.
    
    Full Advisory:
    http://secunia.com/advisories/11262/
    
     --
    
    [SA11261] Gentoo update for OpenLDAP
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-03-31
    
    Gentoo has issued an update for OpenLDAP. This fixes an older
    vulnerability, which can be exploited by malicious people to cause a
    DoS (Denial of Service) on a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11261/
    
     --
    
    [SA11255] quoteengine SQL Injection Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Manipulation of data, Exposure of system information,
    Exposure of sensitive information
    Released:    2004-03-31
    
    A vulnerability has been discovered in quoteengine, which potentially
    can be exploited by malicious people to conduct SQL injection attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11255/
    
     --
    
    [SA11250] Red Hat update for ethereal
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2004-03-31
    
    Red Hat has issued updated packages for ethereal. These fix multiple
    vulnerabilities, which potentially can be exploited by malicious people
    to compromise a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11250/
    
     --
    
    [SA11248] OpenLinux update for vim
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-03-31
    
    SCO has issued updated packages for vim. These fix an older
    vulnerability, which potentially can be exploited by malicious people
    to compromise a user's system.
    
    Full Advisory:
    http://secunia.com/advisories/11248/
    
     --
    
    [SA11246] Mandrake update for Ethereal
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2004-03-31
    
    MandrakeSoft has issued updated packages for ethereal. These fix
    multiple vulnerabilities, which potentially can be exploited by
    malicious people to compromise a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11246/
    
     --
    
    [SA11240] Gentoo update for oftpd
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-03-30
    
    Gentoo has issued an update for oftpd. This fixes a vulnerability,
    which potentially can be exploited by malicious people to cause a
    Denial of Service.
    
    Full Advisory:
    http://secunia.com/advisories/11240/
    
     --
    
    [SA11239] Red Hat update for mozilla
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access, DoS, Cross Site Scripting, Security Bypass
    Released:    2004-03-30
    
    Red Hat has issued updated packages for mozilla, which fixes various
    vulnerabilities.
    
    Full Advisory:
    http://secunia.com/advisories/11239/
    
     --
    
    [SA11238] Debian update for libpam-pgsql
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Manipulation of data
    Released:    2004-03-30
    
    Debian has issued updated packages for libpam-pqsql. These fixes a
    vulnerability, which can be exploited by malicious people to manipulate
    SQL queries.
    
    Full Advisory:
    http://secunia.com/advisories/11238/
    
     --
    
    [SA11237] libpam-pgsql SQL Injection Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Manipulation of data
    Released:    2004-03-30
    
    Primoz Bratanic has reported a vulnerability in libpam-pgsql, allowing
    malicious people to conduct SQL injection attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11237/
    
     --
    
    [SA11232] Hibyte HiGuest Script Insertion Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Security Bypass
    Released:    2004-03-30
    
    ShelzZ has discovered a vulnerability in Hibyte HiGuest, which can be
    exploited by malicious people to conduct script insertion attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11232/
    
     --
    
    [SA11227] Gentoo update for Courier
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2004-03-29
    
    Gentoo has issued an update for Courier. This fixes a vulnerability,
    which potentially can be exploited by malicious people to compromise a
    vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11227/
    
     --
    
    [SA11226] Gentoo update for UUDeview
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-03-29
    
    Gentoo has issued an update for UUDeview. This fixes a vulnerability,
    which potentially can be exploited by malicious people to compromise a
    user's system.
    
    Full Advisory:
    http://secunia.com/advisories/11226/
    
     --
    
    [SA11225] Gentoo update for ethereal
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access, DoS
    Released:    2004-03-29
    
    Gentoo has issued an update for ethereal. This fixes multiple
    vulnerabilities, which potentially can be exploited by malicious people
    to compromise a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11225/
    
     --
    
    [SA11220] oftpd PORT Command Denial of Service Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-03-26
    
    Andreas Rueegg and Philippe Oechslin have discovered a vulnerability in
    oftpd, which can be exploited by malicious people to cause a DoS
    (Denial of Service).
    
    Full Advisory:
    http://secunia.com/advisories/11220/
    
     --
    
    [SA11219] OpenLinux update for mc
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-03-26
    
    SCO has issued updated packages for mc. These fix a vulnerability,
    which potentially can be exploited by malicious people to compromise a
    user's system.
    
    Full Advisory:
    http://secunia.com/advisories/11219/
    
     --
    
    [SA11217] Gentoo update for Apache 2
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2004-03-26
    
    Gentoo has issued updates for Apache 2. These fix three
    vulnerabilities, potentially allowing malicious people to cause a
    Denial of Service or compromise a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11217/
    
     --
    
    [SA11214] Sun Solaris CDE dtlogin XDMCP Parsing Vulnerability
    
    Critical:    Moderately critical
    Where:       From local network
    Impact:      System access
    Released:    2004-03-25
    
    Dave Aitel has reported that the CDE implementation in Sun Solaris is
    affected by a vulnerability in the dtlogin service. This can
    potentially be exploited by malicious people to compromise a vulnerable
    system.
    
    Full Advisory:
    http://secunia.com/advisories/11214/
    
     --
    
    [SA11260] SillySearch "search" Parameter Cross Site Scripting
    Vulnerability
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2004-03-31
    
    SmOk3 has discovered a vulnerability in SillySearch, which can be
    exploited by malicious people to conduct Cross Site Scripting attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11260/
    
     --
    
    [SA11258] TCPDUMP ISAKMP Payload Handling Denial of Service
    Vulnerabilities
    
    Critical:    Less critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-03-31
    
    Rapid7 has discovered two vulnerabilities in TCPDUMP, which can be
    exploited by malicious people to cause a DoS (Denial of Service).
    
    Full Advisory:
    http://secunia.com/advisories/11258/
    
     --
    
    [SA11257] Gentoo update for fetchmail
    
    Critical:    Less critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-03-31
    
    Gentoo has issued an update for fetchmail. This fixes a vulnerability,
    which can be exploited by malicious people to cause a DoS
    (Denial-of-Service).
    
    Full Advisory:
    http://secunia.com/advisories/11257/
    
     --
    
    [SA11249] UnixWare update for Perl
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Security Bypass
    Released:    2004-03-31
    
    SCO has issued an update for Perl. This fixes an old vulnerability in
    the Safe.pm module, which provides safe compartments to evaluate Perl
    code in.
    
    Full Advisory:
    http://secunia.com/advisories/11249/
    
     --
    
    [SA11244] cPanel Multiple Cross-Site Scripting Vulnerabilities
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2004-03-30
    
    Sullo has reported multiple vulnerabilities in cPanel, which can be
    exploited by malicious people to conduct cross-site scripting attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11244/
    
     --
    
    [SA11234] Interchange Arbitrary Variable Content Disclosure
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Exposure of system information, Exposure of sensitive
    information
    Released:    2004-03-30
    
    A vulnerability has been discovered in Interchange, which can be
    exploited by malicious people to gain knowledge of sensitive
    information.
    
    Full Advisory:
    http://secunia.com/advisories/11234/
    
     --
    
    [SA11230] XMB Cross Site Scripting Vulnerabilities
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2004-03-29
    
    Janek Vind has reported multiple vulnerabilities in XMB, allowing
    malicious people to conduct Cross Site Scripting attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11230/
    
     --
    
    [SA11233] FreeBSD IPv6 "setsockopt()" Input Validation Vulnerability
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Exposure of sensitive information, DoS
    Released:    2004-03-30
    
    Katsuhisa ABE and Colin Percival have discovered a vulnerability in
    FreeBSD, which can be exploited by malicious, local users to gain
    knowledge of sensitive information or cause a DoS (Denial-of-Service).
    
    Full Advisory:
    http://secunia.com/advisories/11233/
    
     --
    
    [SA11224] GNOME gnome-session Privilege Escalation Vulnerability
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-03-30
    
    A vulnerability has been reported in GNOME, which can be exploited by
    malicious, local users to gain escalated privileges.
    
    Full Advisory:
    http://secunia.com/advisories/11224/
    
     --
    
    [SA11253] Clam AntiVirus Realtime Scanning VirusEvent Security Issue
    
    Critical:    Not critical
    Where:       From local network
    Impact:      Privilege escalation
    Released:    2004-03-31
    
    l0om has reported a security issue in Clam AntiVirus, which potentially
    can be exploited by malicious, local users to gain escalated
    privileges.
    
    Full Advisory:
    http://secunia.com/advisories/11253/
    
     --
    
    [SA11247] OpenLinux update for util-linux
    
    Critical:    Not critical
    Where:       Local system
    Impact:      Exposure of sensitive information, Exposure of system
    information
    Released:    2004-03-31
    
    SCO has issued updated packages for util-linux. These fix a
    vulnerability, which potentially could disclose information to users.
    
    Full Advisory:
    http://secunia.com/advisories/11247/
    
    
    Other:--
    
    [SA11254] Symantec Clientless VPN Gateway OpenSSL Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-03-31
    
    Symantec has acknowledged a vulnerability in the OpenSSL implementation
    of Symantec Clientless VPN Gateway, which can be exploited by malicious
    people to cause a DoS (Denial-of-Service).
    
    Full Advisory:
    http://secunia.com/advisories/11254/
    
    
    Cross Platform:--
    
    [SA11259] MPlayer HTTP Location Header Parsing Heap Overflow
    Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-03-31
    
    blexim has discovered a vulnerability in MPlayer, which potentially can
    be exploited by malicious people to compromise a user's system.
    
    Full Advisory:
    http://secunia.com/advisories/11259/
    
     --
    
    [SA11245] eZ publish Unspecified Template Editing Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      
    Released:    2004-03-30
    
    An unspecified vulnerability has been reported in eZ publish when
    editing templates.
    
    Full Advisory:
    http://secunia.com/advisories/11245/
    
     --
    
    [SA11241] PhotoPost Multiple Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Security Bypass, Cross Site Scripting, Manipulation of
    data
    Released:    2004-03-30
    
    JeiAr has reported multiple vulnerabilities in PhotoPost, which can be
    exploited by malicious people to conduct Cross Site Scripting, SQL
    injection, and script insertion attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11241/
    
     --
    
    [SA11229] phpBB "privmsg.php" SQL Injection Vulnerability
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Manipulation of data
    Released:    2004-03-29
    
    Janek Vind has reported a vulnerability in phpBB, allowing malicious
    people to conduct SQL injection attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11229/
    
     --
    
    [SA11228] Check Point Products OpenSSL Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-03-29
    
    Check Point has acknowledged that the OpenSSL implementation in certain
    products is affected by vulnerabilities, which can be exploited by
    malicious people to cause a DoS (Denial-of-Service).
    
    Full Advisory:
    http://secunia.com/advisories/11228/
    
     --
    
    [SA11221] phpBB Multiple Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Security Bypass, Manipulation of data
    Released:    2004-03-29
    
    The vendor has released a new version of phpBB. This fixes multiple
    vulnerabilities, allowing malicious people to conduct SQL injection
    attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11221/
    
     --
    
    [SA11243] Cloisterblog Multiple Vulnerabilities
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Exposure of sensitive information, Exposure of system
    information, Cross Site Scripting
    Released:    2004-03-30
    
    Dotho has reported a vulnerability in Cloisterblog, which can be
    exploited by malicious people to conduct Cross Site Scripting and
    directory traversal attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11243/
    
     --
    
    [SA11242] WebCT Campus Edition Cross Site Scripting Vulnerability
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2004-03-30
    
    Simon Boulet has reported a vulnerability in WebCT, which can be
    exploited by malicious people to conduct Cross Site Scripting attack.
    
    Full Advisory:
    http://secunia.com/advisories/11242/
    
     --
    
    [SA11223] MySQL "mysqlbug" Insecure Temporary File Creation
    Vulnerability
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-03-29
    
    Shaun Colley has reported a vulnerability in MySQL, potentially
    allowing malicious users to escalate their privileges.
    
    Full Advisory:
    http://secunia.com/advisories/11223/
    
     --
    
    [SA11251] Oracle9i Application Server Cross Site Scripting
    Vulnerability
    
    Critical:    Not critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2004-03-31
    
    A security issue has been reported in Oracle9i Application Server
    Single Sign-on, potentially allowing malicious people to conduct Cross
    Site Scripting attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11251/
    
    
    
    ========================================================================
    
    Secunia recommends that you verify all advisories you receive,
    by clicking the link.
    Secunia NEVER sends attached files with advisories.
    Secunia does not advise people to install third party patches, only use
    those supplied by the vendor.
    
    Definitions: (Criticality, Where etc.)
    http://secunia.com/about_secunia_advisories/
    
    Subscribe:
    http://secunia.com/secunia_weekly_summary/
    
    Contact details:
    Web	: http://secunia.com/
    E-mail	: support@private
    Tel	: +45 70 20 51 44
    Fax	: +45 70 20 51 45
    
    ========================================================================
    
    
    
    _______________________________________________
    isn mailing list
    isn@private
    http://www.attrition.org/mailman/listinfo/isn
    



    This archive was generated by hypermail 2b30 : Fri Apr 02 2004 - 08:26:27 PST