======================================================================== The Secunia Weekly Advisory Summary 2004-04-01 - 2004-04-08 This week : 46 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: Secunia has launched a new service called Secunia Virus Information. Secunia Virus Information is based on information automatically collected from 7 different anti-virus vendors. The data will be parsed and indexed, resulting in a cronological list, a searchable index, and grouped profiles with information from the 7 vendors. Example: http://secunia.com/virus_information/8592/ Furthermore, when certain criteria are triggered virus alerts will be issued. You can sign-up for the alerts here: Secunia Virus Alerts: http://secunia.com/secunia_virus_alerts/ Secunia Virus Information: http://secunia.com/virus_information/ ======================================================================== 2) This Week in Brief: A vulnerability has been reported in Panda ActiveScan, which can be exploited by malicious people to compromise a vulnerable system. Currently no response or patch is available from the vendor. Please refer to referenced Secunia Advisory for more information. Reference: http://secunia.com/SA11312 Peter Winter-Smith of NGSSoftware has identified a vulnerability in the very popular music player Winamp versions 2.91 through 5.02. The vulnerability may be triggered by visiting a malicious website with a vulnerable Winamp client. All users are advised to update to version 5.03. Reference: http://secunia.com/SA11285 Apple has release a security update for Mac OS X, which corrects multiple vulnerabilities. The update is available from the vendor website. Reference: http://secunia.com/SA11303 ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA11273] Internet Explorer/Outlook Express Restricted Zone Status Bar Spoofing 2. [SA10395] Internet Explorer URL Spoofing Vulnerability 3. [SA10523] Internet Explorer showHelp() Restriction Bypass Vulnerability 4. [SA11285] Winamp "in_mod.dll" Heap Overflow Vulnerability 5. [SA11082] Sun Java System (Sun ONE) SSL Vulnerabilities 6. [SA11139] OpenSSL SSL/TLS Handshake Denial of Service Vulnerabilities 7. [SA11297] F-Secure Anti-Virus for MIMEsweeper Virus Detection Bypass 8. [SA11293] Citrix MetaFrame Password Manager Authentication Information Disclosure 9. [SA11301] F-Secure BackWeb Privilege Escalation Vulnerability 10. [SA10736] Internet Explorer File Download Extension Spoofing ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA11312] Panda ActiveScan Control "Internacional" Property Heap Overflow Vulnerability [SA11298] Perl win32_stat Function Buffer Overflow Vulnerability [SA11289] eMule "DecodeBase16()" Buffer Overflow Vulnerability [SA11285] Winamp "in_mod.dll" Heap Overflow Vulnerability [SA11292] Microsoft SharePoint Portal Server Cross-Site Scripting Vulnerabilities [SA11286] FTGate Web Mail Cross-Site Scripting and Path Exposure [SA11279] MondoSearch Multiple Vulnerabilities [SA11294] IBM Director Agent Denial of Service Vulnerability [SA11301] F-Secure BackWeb Privilege Escalation Vulnerability [SA11293] Citrix MetaFrame Password Manager Authentication Information Disclosure [SA11313] McAfee McFreeScan Module System Information Disclosure [SA11273] Internet Explorer/Outlook Express Restricted Zone Status Bar Spoofing UNIX/Linux: [SA11311] Gentoo update for tcpdump [SA11308] Gentoo update for KDE [SA11303] Mac OS X Security Update Fixes Multiple Vulnerabilities [SA11296] OpenPKG update for mc [SA11295] Mandrake update for mplayer [SA11282] IRIX update for ftpd [SA11281] Debian update for oftpd [SA11274] HP OpenCall MultiService Controller H.323 Vulnerabilities [SA11272] CactuShop Multiple Vulnerabilities [SA11304] Monit Web-based Administration Interface Multiple Vulnerabilities [SA11271] Gentoo update for monit [SA11309] Debian update for tcpdump [SA11283] IRIX Frame Padding Vulnerability [SA11280] Debian update for interchange [SA11306] Debian update for heimdal [SA11275] Heimdal Cross-Realm Trust Spoofing Vulnerability [SA11310] Gentoo update for sysstat [SA11307] Debian update for xine-ui [SA11305] Gentoo update for Portage [SA11300] SuSE Linux YaST Temporary File Creation Vulnerability [SA11291] Debian update for fte [SA11290] FTE Text Editor Multiple Buffer Overflow Vulnerabilities Other: [SA11278] Sidewinder Potential OpenSSL Vulnerabilities [SA11276] VMware ESX Server Privilege Escalation Vulnerabilities Cross Platform: [SA11314] RealPlayer/RealOne R3T File Handling Buffer Overflow Vulnerability [SA11299] IGI 2: Covert Strike RCON Command Format String Vulnerability [SA11288] HAHTsite Scenario Server Project Name Buffer Overflow Vulnerability [SA11287] ADA Image Server Request Buffer Overflow and Directory Traversal [SA11297] F-Secure Anti-Virus for MIMEsweeper Virus Detection Bypass [SA11270] Roger Wilco Multiple Vulnerabilities [SA11315] Intel Server Control and Server Management Insecure Firmware Setting [SA11302] Qmail Non-Delivery Notification DDoS Security Issue [SA11277] ADA Image Server Directory Listing Vulnerability [SA11284] Dreamweaver Database Connection Script Security Issue ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA11312] Panda ActiveScan Control "Internacional" Property Heap Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2004-04-07 Rafel Ivgi has discovered a vulnerability in Panda ActiveScan Control, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/11312/ -- [SA11298] Perl win32_stat Function Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2004-04-06 iDEFENSE has discovered a vulnerability in Perl and ActivePerl, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/11298/ -- [SA11289] eMule "DecodeBase16()" Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2004-04-05 Kostya Kortchinsky has reported a vulnerability in eMule, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/11289/ -- [SA11285] Winamp "in_mod.dll" Heap Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2004-04-05 NGSSoftware has discovered a vulnerability in Winamp, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/11285/ -- [SA11292] Microsoft SharePoint Portal Server Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2004-04-06 Ory Segal has reported multiple vulnerabilities in Microsoft SharePoint Portal Server 2001, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/11292/ -- [SA11286] FTGate Web Mail Cross-Site Scripting and Path Exposure Critical: Less critical Where: From remote Impact: Cross Site Scripting, Exposure of system information Released: 2004-04-06 Dr_insane has discovered some vulnerabilities in FTGate Web Mail, where the most serious can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/11286/ -- [SA11279] MondoSearch Multiple Vulnerabilities Critical: Less critical Where: From remote Impact: Exposure of sensitive information, DoS Released: 2004-04-02 Protego has reported flere vulnerabilities in MondoSearch, which can be exploited by malicious people to use the application as a proxy, cause a DoS (Denial of Service), or disclose certain administrative usernames. Full Advisory: http://secunia.com/advisories/11279/ -- [SA11294] IBM Director Agent Denial of Service Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2004-04-08 Juanma Merino has reported a vulnerability in IBM Director Agent, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/11294/ -- [SA11301] F-Secure BackWeb Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-04-06 A vulnerability has been discovered in F-Secure BackWeb, which can be exploited by malicious, local users to gain SYSTEM privileges on a vulnerable system. Full Advisory: http://secunia.com/advisories/11301/ -- [SA11293] Citrix MetaFrame Password Manager Authentication Information Disclosure Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2004-04-05 A security issue has been reported in Citrix MetaFrame Password Manager, which may disclose authentication information. Full Advisory: http://secunia.com/advisories/11293/ -- [SA11313] McAfee McFreeScan Module System Information Disclosure Critical: Not critical Where: From remote Impact: Exposure of system information Released: 2004-04-07 A vulnerability has been discovered in McAfee McFreeScan Module, which can be exploited by malicious people to gain knowledge of certain information about a user's system. Full Advisory: http://secunia.com/advisories/11313/ -- [SA11273] Internet Explorer/Outlook Express Restricted Zone Status Bar Spoofing Critical: Not critical Where: From remote Impact: Security Bypass Released: 2004-04-01 http-equiv has discovered a weakness in Internet Explorer, which potentially can be exploited by malicious people to trick users into visiting a malicious website. Full Advisory: http://secunia.com/advisories/11273/ UNIX/Linux:-- [SA11311] Gentoo update for tcpdump Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2004-04-07 Gentoo has issued an update for tcpdump. This fixes one vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a system running tcpdump. Full Advisory: http://secunia.com/advisories/11311/ -- [SA11308] Gentoo update for KDE Critical: Moderately critical Where: From remote Impact: System access Released: 2004-04-07 Gentoo has issued an update for kdepim. These fix a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/11308/ -- [SA11303] Mac OS X Security Update Fixes Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2004-04-07 The vendor has acknowledged multiple vulnerabilities in Apple Mac OS X, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/11303/ -- [SA11296] OpenPKG update for mc Critical: Moderately critical Where: From remote Impact: System access Released: 2004-04-06 OpenPKG has issued an updated package for mc. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/11296/ -- [SA11295] Mandrake update for mplayer Critical: Moderately critical Where: From remote Impact: System access Released: 2004-04-06 MandrakeSoft has issued an update for mplayer. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/11295/ -- [SA11282] IRIX update for ftpd Critical: Moderately critical Where: From remote Impact: DoS Released: 2004-04-05 SGI has issued updates for ftpd. These fixes a vulnerability allowing malicious users to cause a Denial of Service. Full Advisory: http://secunia.com/advisories/11282/ -- [SA11281] Debian update for oftpd Critical: Moderately critical Where: From remote Impact: DoS Released: 2004-04-05 Debian has issued updated packages for oftpd. These fix a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/11281/ -- [SA11274] HP OpenCall MultiService Controller H.323 Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS Released: 2004-04-01 HP has acknowledged some vulnerabilities in the HP OpenCall Multiservice Controller (OCMC) H.323 implementation, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/11274/ -- [SA11272] CactuShop Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2004-04-01 Nick Gudov has reported two vulnerabilities in CactuShop, allowing malicious people to conduct SQL injection and Cross Site Scripting attacks. Full Advisory: http://secunia.com/advisories/11272/ -- [SA11304] Monit Web-based Administration Interface Multiple Vulnerabilities Critical: Moderately critical Where: From local network Impact: System access Released: 2004-04-06 Matthew Murphy has discovered multiple vulnerabilities in Monit, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/11304/ -- [SA11271] Gentoo update for monit Critical: Moderately critical Where: From local network Impact: System access, DoS Released: 2004-04-01 Gentoo has issued an update for monit. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/11271/ -- [SA11309] Debian update for tcpdump Critical: Less critical Where: From remote Impact: DoS Released: 2004-04-07 Debian has issued updated packages for tcpdump. These fix two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/11309/ -- [SA11283] IRIX Frame Padding Vulnerability Critical: Less critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2004-04-05 SGI has acknowledged an older information disclosure vulnerability within certain network drivers. Full Advisory: http://secunia.com/advisories/11283/ -- [SA11280] Debian update for interchange Critical: Less critical Where: From remote Impact: Exposure of sensitive information, Exposure of system information Released: 2004-04-05 Debian has issued updated packages for interchange. These fix a vulnerability, which can be exploited by malicious people to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/11280/ -- [SA11306] Debian update for heimdal Critical: Less critical Where: From local network Impact: ID Spoofing Released: 2004-04-07 Debian has issued updated packages for heimdal. These fix a vulnerability, which can allow certain people to impersonate others. Full Advisory: http://secunia.com/advisories/11306/ -- [SA11275] Heimdal Cross-Realm Trust Spoofing Vulnerability Critical: Less critical Where: From local network Impact: ID Spoofing Released: 2004-04-02 A vulnerability has been reported in Heimdal, which may allow certain people to impersonate others. Full Advisory: http://secunia.com/advisories/11275/ -- [SA11310] Gentoo update for sysstat Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-04-07 Gentoo has issued updated packages for sysstat. These fix a vulnerability, allowing malicious local users to escalate their privileges. Full Advisory: http://secunia.com/advisories/11310/ -- [SA11307] Debian update for xine-ui Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-04-07 Debian has issued updated packages for xine-ui. These fix a vulnerability, which potentially can be exploited by malicious, local users to escalate their privileges on a vulnerable system. Full Advisory: http://secunia.com/advisories/11307/ -- [SA11305] Gentoo update for Portage Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-04-07 Gentoo has issued an update for Portage. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/11305/ -- [SA11300] SuSE Linux YaST Temporary File Creation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-04-08 l0om has reported a vulnerability in SuSE Linux, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/11300/ -- [SA11291] Debian update for fte Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-04-05 Debian has issued updated packages for fte. These fix multiple vulnerabilities, which can be exploited by malicious, local users to gain "root" privileges on a vulnerable system. Full Advisory: http://secunia.com/advisories/11291/ -- [SA11290] FTE Text Editor Multiple Buffer Overflow Vulnerabilities Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-04-05 Steve Kemp has reported multiple vulnerabilities in FTE Text Editor, which potentially can be exploited by malicious, local users to gain escalated privileges on a vulnerable system. Full Advisory: http://secunia.com/advisories/11290/ Other:-- [SA11278] Sidewinder Potential OpenSSL Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS Released: 2004-04-02 Secure Computing Corporation has issued a patch for their Sidewinder firewall. Full Advisory: http://secunia.com/advisories/11278/ -- [SA11276] VMware ESX Server Privilege Escalation Vulnerabilities Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-04-02 VMware has issued updated packages for the kernel. These fix three vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/11276/ Cross Platform:-- [SA11314] RealPlayer/RealOne R3T File Handling Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2004-04-07 NGSSoftware has discovered a vulnerability in RealOne Player / RealPlayer, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/11314/ -- [SA11299] IGI 2: Covert Strike RCON Command Format String Vulnerability Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2004-04-06 Luigi Auriemma has reported a vulnerability in IGI 2: Covert Strike, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/11299/ -- [SA11288] HAHTsite Scenario Server Project Name Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2004-04-05 Dennis Rand has reported a vulnerability in HAHTsite Scenario Server, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/11288/ -- [SA11287] ADA Image Server Request Buffer Overflow and Directory Traversal Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2004-04-05 Dr_insane has discovered two vulnerabilities in ADA Image Server, which can be exploited by malicious people to compromise a vulnerable system or gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/11287/ -- [SA11297] F-Secure Anti-Virus for MIMEsweeper Virus Detection Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2004-04-06 A vulnerability has been reported in F-Secure Anti-Virus for MIMEsweeper, potentially allowing malware to bypass the virus detection. Full Advisory: http://secunia.com/advisories/11297/ -- [SA11270] Roger Wilco Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, DoS Released: 2004-04-02 Luigi Auriemma has reported some vulnerabilities in Roger Wilco, which can be exploited by malicious people to cause a DoS (Denial of Service) and bypass certain restrictions. Full Advisory: http://secunia.com/advisories/11270/ -- [SA11315] Intel Server Control and Server Management Insecure Firmware Setting Critical: Moderately critical Where: From local network Impact: System access Released: 2004-04-07 A vulnerability has been reported in certain Intel Server Control and Server Management utilities, potentially allowing malicious people unauthorised access. Full Advisory: http://secunia.com/advisories/11315/ -- [SA11302] Qmail Non-Delivery Notification DDoS Security Issue Critical: Less critical Where: From remote Impact: Released: 2004-04-08 Stefan Frei, Ivo Silvestri, and Gunter Ollmann recently published a paper describing a way to utilise certain mail servers for DDoS (Distributed Denial-of-Service) attacks on other systems. Full Advisory: http://secunia.com/advisories/11302/ -- [SA11277] ADA Image Server Directory Listing Vulnerability Critical: Less critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2004-04-02 Donato Ferrante has discovered a vulnerability in ADA Image Server (ImgSvr), which can be exploited by malicious people to disclose the content of a directory. Full Advisory: http://secunia.com/advisories/11277/ -- [SA11284] Dreamweaver Database Connection Script Security Issue Critical: Not critical Where: From remote Impact: Security Bypass Released: 2004-04-05 Macromedia has issued an advisory regarding a security issue in Dreamweaver, potentially allowing malicious people to manipulate databases. Full Advisory: http://secunia.com/advisories/11284/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 ======================================================================== _________________________________________ ISN mailing list Sponsored by: OSVDB.org
This archive was generated by hypermail 2b30 : Fri Apr 09 2004 - 02:46:17 PDT