[ISN] Secunia Weekly Summary - Issue: 2004-15

From: InfoSec News (isn@private)
Date: Fri Apr 09 2004 - 01:08:26 PDT

  • Next message: InfoSec News: "[ISN] Expert releases Cisco wireless hacking tool"

    ========================================================================
    
                      The Secunia Weekly Advisory Summary                  
                            2004-04-01 - 2004-04-08                        
    
                           This week : 46 advisories                       
    
    ========================================================================
    Table of Contents:
    
    1.....................................................Word From Secunia
    2....................................................This Week In Brief
    3...............................This Weeks Top Ten Most Read Advisories
    4.......................................Vulnerabilities Summary Listing
    5.......................................Vulnerabilities Content Listing
    
    ========================================================================
    1) Word From Secunia:
    
    Secunia has launched a new service called Secunia Virus Information.
    Secunia Virus Information is based on information automatically
    collected from 7 different anti-virus vendors. The data will be parsed
    and indexed, resulting in a cronological list, a searchable index, and
    grouped profiles with information from the 7 vendors.
    
    Example:
    http://secunia.com/virus_information/8592/
    
    Furthermore, when certain criteria are triggered virus alerts will be
    issued. You can sign-up for the alerts here:
    
    Secunia Virus Alerts:
    http://secunia.com/secunia_virus_alerts/
    
    Secunia Virus Information:
    http://secunia.com/virus_information/
    
    ========================================================================
    2) This Week in Brief:
    
    A vulnerability has been reported in Panda ActiveScan, which can be
    exploited by malicious people to compromise a vulnerable system.
    
    Currently no response or patch is available from the vendor. Please
    refer to referenced Secunia Advisory for more information.
    
    Reference:
    http://secunia.com/SA11312
    
    
    Peter Winter-Smith of NGSSoftware has identified a vulnerability in the
    very popular music player Winamp versions 2.91 through 5.02.
    
    The vulnerability may be triggered by visiting a malicious website with
    a vulnerable Winamp client. All users are advised to update to version
    5.03.
    
    Reference:
    http://secunia.com/SA11285
    
    
    Apple has release a security update for Mac OS X, which corrects
    multiple vulnerabilities.
    
    The update is available from the vendor website.
    
    Reference:
    http://secunia.com/SA11303
    
    
    ========================================================================
    3) This Weeks Top Ten Most Read Advisories:
    
    1.  [SA11273] Internet Explorer/Outlook Express Restricted Zone Status
                  Bar Spoofing
    2.  [SA10395] Internet Explorer URL Spoofing Vulnerability
    3.  [SA10523] Internet Explorer showHelp() Restriction Bypass
                  Vulnerability
    4.  [SA11285] Winamp "in_mod.dll" Heap Overflow Vulnerability
    5.  [SA11082] Sun Java System (Sun ONE) SSL Vulnerabilities
    6.  [SA11139] OpenSSL SSL/TLS Handshake Denial of Service
                  Vulnerabilities
    7.  [SA11297] F-Secure Anti-Virus for MIMEsweeper Virus Detection
                  Bypass
    8.  [SA11293] Citrix MetaFrame Password Manager Authentication
                  Information Disclosure
    9.  [SA11301] F-Secure BackWeb Privilege Escalation Vulnerability
    10. [SA10736] Internet Explorer File Download Extension Spoofing
    
    ========================================================================
    4) Vulnerabilities Summary Listing
    
    Windows:
    [SA11312] Panda ActiveScan Control "Internacional" Property Heap
    Overflow Vulnerability
    [SA11298] Perl win32_stat Function Buffer Overflow Vulnerability
    [SA11289] eMule "DecodeBase16()" Buffer Overflow Vulnerability
    [SA11285] Winamp "in_mod.dll" Heap Overflow Vulnerability
    [SA11292] Microsoft SharePoint Portal Server Cross-Site Scripting
    Vulnerabilities
    [SA11286] FTGate Web Mail Cross-Site Scripting and Path Exposure
    [SA11279] MondoSearch Multiple Vulnerabilities
    [SA11294] IBM Director Agent Denial of Service Vulnerability
    [SA11301] F-Secure BackWeb Privilege Escalation Vulnerability
    [SA11293] Citrix MetaFrame Password Manager Authentication Information
    Disclosure
    [SA11313] McAfee McFreeScan Module System Information Disclosure
    [SA11273] Internet Explorer/Outlook Express Restricted Zone Status Bar
    Spoofing
    
    UNIX/Linux:
    [SA11311] Gentoo update for tcpdump
    [SA11308] Gentoo update for KDE
    [SA11303] Mac OS X Security Update Fixes Multiple Vulnerabilities
    [SA11296] OpenPKG update for mc
    [SA11295] Mandrake update for mplayer
    [SA11282] IRIX update for ftpd
    [SA11281] Debian update for oftpd
    [SA11274] HP OpenCall MultiService Controller H.323 Vulnerabilities
    [SA11272] CactuShop Multiple Vulnerabilities
    [SA11304] Monit Web-based Administration Interface Multiple
    Vulnerabilities
    [SA11271] Gentoo update for monit
    [SA11309] Debian update for tcpdump
    [SA11283] IRIX Frame Padding Vulnerability
    [SA11280] Debian update for interchange
    [SA11306] Debian update for heimdal
    [SA11275] Heimdal Cross-Realm Trust Spoofing Vulnerability
    [SA11310] Gentoo update for sysstat
    [SA11307] Debian update for xine-ui
    [SA11305] Gentoo update for Portage
    [SA11300] SuSE Linux YaST Temporary File Creation Vulnerability
    [SA11291] Debian update for fte
    [SA11290] FTE Text Editor Multiple Buffer Overflow Vulnerabilities
    
    Other:
    [SA11278] Sidewinder Potential OpenSSL Vulnerabilities
    [SA11276] VMware ESX Server Privilege Escalation Vulnerabilities
    
    Cross Platform:
    [SA11314] RealPlayer/RealOne R3T File Handling Buffer Overflow
    Vulnerability
    [SA11299] IGI 2: Covert Strike RCON Command Format String
    Vulnerability
    [SA11288] HAHTsite Scenario Server Project Name Buffer Overflow
    Vulnerability
    [SA11287] ADA Image Server Request Buffer Overflow and Directory
    Traversal
    [SA11297] F-Secure Anti-Virus for MIMEsweeper Virus Detection Bypass
    [SA11270] Roger Wilco Multiple Vulnerabilities
    [SA11315] Intel Server Control and Server Management Insecure Firmware
    Setting
    [SA11302] Qmail Non-Delivery Notification DDoS Security Issue
    [SA11277] ADA Image Server Directory Listing Vulnerability
    [SA11284] Dreamweaver Database Connection Script Security Issue
    
    ========================================================================
    5) Vulnerabilities Content Listing
    
    Windows:--
    
    [SA11312] Panda ActiveScan Control "Internacional" Property Heap
    Overflow Vulnerability
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access
    Released:    2004-04-07
    
    Rafel Ivgi has discovered a vulnerability in Panda ActiveScan Control,
    which can be exploited by malicious people to compromise a user's
    system.
    
    Full Advisory:
    http://secunia.com/advisories/11312/
    
     --
    
    [SA11298] Perl win32_stat Function Buffer Overflow Vulnerability
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access
    Released:    2004-04-06
    
    iDEFENSE has discovered a vulnerability in Perl and ActivePerl, which
    potentially can be exploited by malicious people to compromise a
    vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11298/
    
     --
    
    [SA11289] eMule "DecodeBase16()" Buffer Overflow Vulnerability
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access
    Released:    2004-04-05
    
    Kostya Kortchinsky has reported a vulnerability in eMule, which can be
    exploited by malicious people to compromise a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11289/
    
     --
    
    [SA11285] Winamp "in_mod.dll" Heap Overflow Vulnerability
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access
    Released:    2004-04-05
    
    NGSSoftware has discovered a vulnerability in Winamp, which can be
    exploited by malicious people to compromise a user's system.
    
    Full Advisory:
    http://secunia.com/advisories/11285/
    
     --
    
    [SA11292] Microsoft SharePoint Portal Server Cross-Site Scripting
    Vulnerabilities
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting
    Released:    2004-04-06
    
    Ory Segal has reported multiple vulnerabilities in Microsoft SharePoint
    Portal Server 2001, which can be exploited by malicious people to
    conduct cross-site scripting attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11292/
    
     --
    
    [SA11286] FTGate Web Mail Cross-Site Scripting and Path Exposure
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Cross Site Scripting, Exposure of system information
    Released:    2004-04-06
    
    Dr_insane has discovered some vulnerabilities in FTGate Web Mail, where
    the most serious can be exploited by malicious people to conduct
    cross-site scripting attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11286/
    
     --
    
    [SA11279] MondoSearch Multiple Vulnerabilities
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Exposure of sensitive information, DoS
    Released:    2004-04-02
    
    Protego has reported flere vulnerabilities in MondoSearch, which can be
    exploited by malicious people to use the application as a proxy, cause
    a DoS (Denial of Service), or disclose certain administrative
    usernames.
    
    Full Advisory:
    http://secunia.com/advisories/11279/
    
     --
    
    [SA11294] IBM Director Agent Denial of Service Vulnerability
    
    Critical:    Less critical
    Where:       From local network
    Impact:      DoS
    Released:    2004-04-08
    
    Juanma Merino has reported a vulnerability in IBM Director Agent, which
    can be exploited by malicious people to cause a DoS (Denial of
    Service).
    
    Full Advisory:
    http://secunia.com/advisories/11294/
    
     --
    
    [SA11301] F-Secure BackWeb Privilege Escalation Vulnerability
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-04-06
    
    A vulnerability has been discovered in F-Secure BackWeb, which can be
    exploited by malicious, local users to gain SYSTEM privileges on a
    vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11301/
    
     --
    
    [SA11293] Citrix MetaFrame Password Manager Authentication Information
    Disclosure
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Exposure of sensitive information
    Released:    2004-04-05
    
    A security issue has been reported in Citrix MetaFrame Password
    Manager, which may disclose authentication information.
    
    Full Advisory:
    http://secunia.com/advisories/11293/
    
     --
    
    [SA11313] McAfee McFreeScan Module System Information Disclosure
    
    Critical:    Not critical
    Where:       From remote
    Impact:      Exposure of system information
    Released:    2004-04-07
    
    A vulnerability has been discovered in McAfee McFreeScan Module, which
    can be exploited by malicious people to gain knowledge of certain
    information about a user's system.
    
    Full Advisory:
    http://secunia.com/advisories/11313/
    
     --
    
    [SA11273] Internet Explorer/Outlook Express Restricted Zone Status Bar
    Spoofing
    
    Critical:    Not critical
    Where:       From remote
    Impact:      Security Bypass
    Released:    2004-04-01
    
    http-equiv has discovered a weakness in Internet Explorer, which
    potentially can be exploited by malicious people to trick users into
    visiting a malicious website.
    
    Full Advisory:
    http://secunia.com/advisories/11273/
    
    
    UNIX/Linux:--
    
    [SA11311] Gentoo update for tcpdump
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2004-04-07
    
    Gentoo has issued an update for tcpdump. This fixes one vulnerability,
    which can be exploited by malicious people to cause a DoS (Denial of
    Service) and potentially compromise a system running tcpdump.
    
    Full Advisory:
    http://secunia.com/advisories/11311/
    
     --
    
    [SA11308] Gentoo update for KDE
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-04-07
    
    Gentoo has issued an update for kdepim. These fix a vulnerability,
    which potentially can be exploited by malicious people to compromise a
    user's system.
    
    Full Advisory:
    http://secunia.com/advisories/11308/
    
     --
    
    [SA11303] Mac OS X Security Update Fixes Multiple Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2004-04-07
    
    The vendor has acknowledged multiple vulnerabilities in Apple Mac OS X,
    which can be exploited by malicious people to cause a DoS (Denial of
    Service) or compromise a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11303/
    
     --
    
    [SA11296] OpenPKG update for mc
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-04-06
    
    OpenPKG has issued an updated package for mc. This fixes a
    vulnerability, which potentially can be exploited by malicious people
    to compromise a user's system.
    
    Full Advisory:
    http://secunia.com/advisories/11296/
    
     --
    
    [SA11295] Mandrake update for mplayer
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      System access
    Released:    2004-04-06
    
    MandrakeSoft has issued an update for mplayer. This fixes a
    vulnerability, which potentially can be exploited by malicious people
    to compromise a user's system.
    
    Full Advisory:
    http://secunia.com/advisories/11295/
    
     --
    
    [SA11282] IRIX update for ftpd
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-04-05
    
    SGI has issued updates for ftpd. These fixes a vulnerability allowing
    malicious users to cause a Denial of Service.
    
    Full Advisory:
    http://secunia.com/advisories/11282/
    
     --
    
    [SA11281] Debian update for oftpd
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-04-05
    
    Debian has issued updated packages for oftpd. These fix a
    vulnerability, which can be exploited by malicious people to cause a
    DoS (Denial of Service).
    
    Full Advisory:
    http://secunia.com/advisories/11281/
    
     --
    
    [SA11274] HP OpenCall MultiService Controller H.323 Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-04-01
    
    HP has acknowledged some vulnerabilities in the HP OpenCall
    Multiservice Controller (OCMC) H.323 implementation, which can be
    exploited by malicious people to cause a DoS (Denial of Service).
    
    Full Advisory:
    http://secunia.com/advisories/11274/
    
     --
    
    [SA11272] CactuShop Multiple Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Cross Site Scripting, Manipulation of data
    Released:    2004-04-01
    
    Nick Gudov has reported two vulnerabilities in CactuShop, allowing
    malicious people to conduct SQL injection and Cross Site Scripting
    attacks.
    
    Full Advisory:
    http://secunia.com/advisories/11272/
    
     --
    
    [SA11304] Monit Web-based Administration Interface Multiple
    Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From local network
    Impact:      System access
    Released:    2004-04-06
    
    Matthew Murphy has discovered multiple vulnerabilities in Monit, which
    can be exploited by malicious people to compromise a vulnerable
    system.
    
    Full Advisory:
    http://secunia.com/advisories/11304/
    
     --
    
    [SA11271] Gentoo update for monit
    
    Critical:    Moderately critical
    Where:       From local network
    Impact:      System access, DoS
    Released:    2004-04-01
    
    Gentoo has issued an update for monit. This fixes two vulnerabilities,
    which can be exploited by malicious people to cause a DoS (Denial of
    Service) and compromise a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11271/
    
     --
    
    [SA11309] Debian update for tcpdump
    
    Critical:    Less critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-04-07
    
    Debian has issued updated packages for tcpdump. These fix two
    vulnerabilities, which can be exploited by malicious people to cause a
    DoS (Denial of Service).
    
    Full Advisory:
    http://secunia.com/advisories/11309/
    
     --
    
    [SA11283] IRIX Frame Padding Vulnerability
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Exposure of system information, Exposure of sensitive
    information
    Released:    2004-04-05
    
    SGI has acknowledged an older information disclosure vulnerability
    within certain network drivers.
    
    Full Advisory:
    http://secunia.com/advisories/11283/
    
     --
    
    [SA11280] Debian update for interchange
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Exposure of sensitive information, Exposure of system
    information
    Released:    2004-04-05
    
    Debian has issued updated packages for interchange. These fix a
    vulnerability, which can be exploited by malicious people to gain
    knowledge of sensitive information.
    
    Full Advisory:
    http://secunia.com/advisories/11280/
    
     --
    
    [SA11306] Debian update for heimdal
    
    Critical:    Less critical
    Where:       From local network
    Impact:      ID Spoofing
    Released:    2004-04-07
    
    Debian has issued updated packages for heimdal. These fix a
    vulnerability, which can allow certain people to impersonate others.
    
    Full Advisory:
    http://secunia.com/advisories/11306/
    
     --
    
    [SA11275] Heimdal Cross-Realm Trust Spoofing Vulnerability
    
    Critical:    Less critical
    Where:       From local network
    Impact:      ID Spoofing
    Released:    2004-04-02
    
    A vulnerability has been reported in Heimdal, which may allow certain
    people to impersonate others.
    
    Full Advisory:
    http://secunia.com/advisories/11275/
    
     --
    
    [SA11310] Gentoo update for sysstat
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-04-07
    
    Gentoo has issued updated packages for sysstat. These fix a
    vulnerability, allowing malicious local users to escalate their
    privileges.
    
    Full Advisory:
    http://secunia.com/advisories/11310/
    
     --
    
    [SA11307] Debian update for xine-ui
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-04-07
    
    Debian has issued updated packages for xine-ui. These fix a
    vulnerability, which potentially can be exploited by malicious, local
    users to escalate their privileges on a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11307/
    
     --
    
    [SA11305] Gentoo update for Portage
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-04-07
    
    Gentoo has issued an update for Portage. This fixes a vulnerability,
    which can be exploited by malicious, local users to gain escalated
    privileges.
    
    Full Advisory:
    http://secunia.com/advisories/11305/
    
     --
    
    [SA11300] SuSE Linux YaST Temporary File Creation Vulnerability
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-04-08
    
    l0om has reported a vulnerability in SuSE Linux, which can be exploited
    by malicious, local users to perform certain actions on a vulnerable
    system with escalated privileges.
    
    Full Advisory:
    http://secunia.com/advisories/11300/
    
     --
    
    [SA11291] Debian update for fte
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-04-05
    
    Debian has issued updated packages for fte. These fix multiple
    vulnerabilities, which can be exploited by malicious, local users to
    gain "root" privileges on a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11291/
    
     --
    
    [SA11290] FTE Text Editor Multiple Buffer Overflow Vulnerabilities
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-04-05
    
    Steve Kemp has reported multiple vulnerabilities in FTE Text Editor,
    which potentially can be exploited by malicious, local users to gain
    escalated privileges on a vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11290/
    
    
    Other:--
    
    [SA11278] Sidewinder Potential OpenSSL Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      DoS
    Released:    2004-04-02
    
    Secure Computing Corporation has issued a patch for their Sidewinder
    firewall.
    
    Full Advisory:
    http://secunia.com/advisories/11278/
    
     --
    
    [SA11276] VMware ESX Server Privilege Escalation Vulnerabilities
    
    Critical:    Less critical
    Where:       Local system
    Impact:      Privilege escalation
    Released:    2004-04-02
    
    VMware has issued updated packages for the kernel. These fix three
    vulnerabilities, which can be exploited by malicious, local users to
    gain escalated privileges.
    
    Full Advisory:
    http://secunia.com/advisories/11276/
    
    
    Cross Platform:--
    
    [SA11314] RealPlayer/RealOne R3T File Handling Buffer Overflow
    Vulnerability
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access
    Released:    2004-04-07
    
    NGSSoftware has discovered a vulnerability in RealOne Player /
    RealPlayer, which can be exploited by malicious people to compromise a
    user's system.
    
    Full Advisory:
    http://secunia.com/advisories/11314/
    
     --
    
    [SA11299] IGI 2: Covert Strike RCON Command Format String
    Vulnerability
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      DoS, System access
    Released:    2004-04-06
    
    Luigi Auriemma has reported a vulnerability in IGI 2: Covert Strike,
    which potentially can be exploited by malicious people to compromise a
    vulnerable system.
    
    Full Advisory:
    http://secunia.com/advisories/11299/
    
     --
    
    [SA11288] HAHTsite Scenario Server Project Name Buffer Overflow
    Vulnerability
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      System access
    Released:    2004-04-05
    
    Dennis Rand has reported a vulnerability in HAHTsite Scenario Server,
    which can be exploited by malicious people to compromise a vulnerable
    system.
    
    Full Advisory:
    http://secunia.com/advisories/11288/
    
     --
    
    [SA11287] ADA Image Server Request Buffer Overflow and Directory
    Traversal
    
    Critical:    Highly critical
    Where:       From remote
    Impact:      Exposure of system information, Exposure of sensitive
    information, System access
    Released:    2004-04-05
    
    Dr_insane has discovered two vulnerabilities in ADA Image Server, which
    can be exploited by malicious people to compromise a vulnerable system
    or gain knowledge of sensitive information.
    
    Full Advisory:
    http://secunia.com/advisories/11287/
    
     --
    
    [SA11297] F-Secure Anti-Virus for MIMEsweeper Virus Detection Bypass
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Security Bypass
    Released:    2004-04-06
    
    A vulnerability has been reported in F-Secure Anti-Virus for
    MIMEsweeper, potentially allowing malware to bypass the virus
    detection.
    
    Full Advisory:
    http://secunia.com/advisories/11297/
    
     --
    
    [SA11270] Roger Wilco Multiple Vulnerabilities
    
    Critical:    Moderately critical
    Where:       From remote
    Impact:      Exposure of system information, Exposure of sensitive
    information, DoS
    Released:    2004-04-02
    
    Luigi Auriemma has reported some vulnerabilities in Roger Wilco, which
    can be exploited by malicious people to cause a DoS (Denial of Service)
    and bypass certain restrictions.
    
    Full Advisory:
    http://secunia.com/advisories/11270/
    
     --
    
    [SA11315] Intel Server Control and Server Management Insecure Firmware
    Setting
    
    Critical:    Moderately critical
    Where:       From local network
    Impact:      System access
    Released:    2004-04-07
    
    A vulnerability has been reported in certain Intel Server Control and
    Server Management utilities, potentially allowing malicious people
    unauthorised access.
    
    Full Advisory:
    http://secunia.com/advisories/11315/
    
     --
    
    [SA11302] Qmail Non-Delivery Notification DDoS Security Issue
    
    Critical:    Less critical
    Where:       From remote
    Impact:      
    Released:    2004-04-08
    
    Stefan Frei, Ivo Silvestri, and Gunter Ollmann recently published a
    paper describing a way to utilise certain mail servers for DDoS
    (Distributed Denial-of-Service) attacks on other systems.
    
    Full Advisory:
    http://secunia.com/advisories/11302/
    
     --
    
    [SA11277] ADA Image Server Directory Listing Vulnerability
    
    Critical:    Less critical
    Where:       From remote
    Impact:      Exposure of system information, Exposure of sensitive
    information
    Released:    2004-04-02
    
    Donato Ferrante has discovered a vulnerability in ADA Image Server
    (ImgSvr), which can be exploited by malicious people to disclose the
    content of a directory.
    
    Full Advisory:
    http://secunia.com/advisories/11277/
    
     --
    
    [SA11284] Dreamweaver Database Connection Script Security Issue
    
    Critical:    Not critical
    Where:       From remote
    Impact:      Security Bypass
    Released:    2004-04-05
    
    Macromedia has issued an advisory regarding a security issue in
    Dreamweaver, potentially allowing malicious people to manipulate
    databases.
    
    Full Advisory:
    http://secunia.com/advisories/11284/
    
    
    
    ========================================================================
    
    Secunia recommends that you verify all advisories you receive,
    by clicking the link.
    Secunia NEVER sends attached files with advisories.
    Secunia does not advise people to install third party patches, only use
    those supplied by the vendor.
    
    Definitions: (Criticality, Where etc.)
    http://secunia.com/about_secunia_advisories/
    
    Subscribe:
    http://secunia.com/secunia_weekly_summary/
    
    Contact details:
    Web	: http://secunia.com/
    E-mail	: support@private
    Tel	: +45 70 20 51 44
    Fax	: +45 70 20 51 45
    
    ========================================================================
    
    
    
    _________________________________________
    ISN mailing list
    Sponsored by: OSVDB.org
    



    This archive was generated by hypermail 2b30 : Fri Apr 09 2004 - 02:46:17 PDT