======================================================================== The Secunia Weekly Advisory Summary 2004-04-29 - 2004-05-06 This week : 56 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: Secunia has launched a new service called Secunia Virus Information. Secunia Virus Information is based on information automatically collected from seven different anti-virus vendors. The data will be parsed and indexed, resulting in a chronological list, a searchable index, and grouped profiles with information from the seven vendors. Furthermore, when certain criteria are triggered virus alerts will be issued. You can sign-up for the alerts here: Sign-up for Secunia Virus Alerts: http://secunia.com/secunia_virus_alerts/ Secunia Virus Information: http://secunia.com/virus_information/ ======================================================================== 2) This Week in Brief: ADVISORIES: Check Point has reported a vulnerability in various VPN-1 Products, which can be exploited to compromise a vulnerable system. Check Point has a hotfix available for this vulnerability. Please refer to referenced Secunia Advisory. Reference: http://secunia.com/SA11546 -- eEye Digital Security has found a vulnerability in Apple Quicktime, which can be exploited to compromise a vulnerable user's system. eEye Digital Security writes in their advisory: "It is difficult to express just how textbook this vulnerability scenario really is". Moreover stating that "exploitation of the vulnerability is self-evident". However, Apple claims that this vulnerability only can be exploited to crash a vulnerable player. Please also view the Secunia Advisory regarding the security update for Mac OS X described below. Reference: http://secunia.com/SA11071 -- Apple has issued a security update, which fixes several vulnerabilities in Mac OS X. Special note from the Secunia Advisory: -QUOTE- NOTE: The severity has been set to "Highly critical" because the unspecified issues are likely to be more severe than claimed by the vendor. This conclusion is based on the fact that Apple merely describes vulnerability "3" as an attempt to "improve the handling of long passwords". However, according to @stake, the vulnerability can in fact be exploited to compromise a vulnerable system. -END QUOTE- All users of the Mac OS X are advised to download the updates available from Apple. Reference: http://secunia.com/SA11539 VIRUS ALERTS: During the last week, Secunia issued two MEDIUM RISK virus alerts and one HIGH RISK virus alert for three new Sasser worms. Please refer to the grouped virus profiles below for more information: SASSER.C - MEDIUM RISK Virus Alert - 2004-05-03 12:58 GMT+1 http://secunia.com/virus_information/9155/sasser.c/ SASSER.B - HIGH RISK Virus Alert - 2004-05-03 08:51 GMT+1 http://secunia.com/virus_information/9147/sasser.b/ Sasser.a - MEDIUM RISK Virus Alert - 2004-05-01 13:28 GMT+1 http://secunia.com/virus_information/9142/sasser.a/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA11482] Windows Explorer / Internet Explorer Long Share Name Buffer Overflow 2. [SA11539] Mac OS X Security Update Fixes Multiple Vulnerabilities 3. [SA11064] Microsoft Windows 14 Vulnerabilities 4. [SA10395] Internet Explorer URL Spoofing Vulnerability 5. [SA11071] Apple QuickTime "QuickTime.qts" Heap Overflow Vulnerability 6. [SA11510] LHA Multiple Vulnerabilities 7. [SA11546] Check Point VPN-1 Products ISAKMP Buffer Overflow Vulnerability 8. [SA10736] Internet Explorer File Download Extension Spoofing 9. [SA11505] libpng Potential Denial of Service Vulnerability 10. [SA11492] Siemens S55 SMS Send Prompt Bypass Weakness ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA11547] Titan FTP Server Aborted LIST Denial of Service Vulnerability [SA11542] Aweb Exposure of Sensitive Information [SA11525] Web Wiz Forum SQL Injection and Security Bypass UNIX/Linux: [SA11539] Mac OS X Security Update Fixes Multiple Vulnerabilities [SA11528] Pound "logmsg()" Format String Vulnerability [SA11553] PHP-Nuke Multiple Vulnerabilities [SA11548] OpenBSD update for cvs [SA11544] Slackware update for LHA [SA11538] Slackware update for xine-lib [SA11527] ProFTPD CIDR Addressing ACL Security Issue [SA11521] Red Hat update for OpenOffice [SA11512] Red Hat update for xchat [SA11510] LHA Multiple Vulnerabilities [SA11500] MPlayer and xine-lib RTSP Handling Vulnerabilities [SA11498] Debian update for eterm [SA11552] FreeBSD update for kadmind [SA11550] Heimdal kadmind Heap Overflow Vulnerability [SA11545] Fedora update for mc [SA11543] UnixWare / Open Unix update for Apache [SA11540] Slackware update for libpng [SA11537] Slackware update for rsync [SA11531] SquirrelMail Folder Name Cross-Site Scripting Vulnerability [SA11523] Debian update for rsync [SA11520] Red Hat update for libpng [SA11517] Debian update for libpng [SA11515] Trustix update for rsync [SA11514] rsync Allows Writing Files Outside the Intended Directory [SA11509] OpenPKG update for png [SA11507] Mandrake update for libpng [SA11505] libpng Potential Denial of Service Vulnerability [SA11551] FreeBSD update for heimdal [SA11541] SuSE update for kernel [SA11530] Debian update for flim [SA11529] FLIM Insecure Temporary File Creation Vulnerability [SA11526] ipmenu Insecure Temporary File Creation Vulnerability [SA11522] Red Hat update for mc [SA11519] Red Hat update for utempter [SA11508] Debian update for mc [SA11506] Mandrake update for mc [SA11503] Gentoo update for samba [SA11502] Midnight Commander Multiple Unspecified Vulnerabilities [SA11501] Slackware update for kernel [SA11518] PaX Denial of Service Vulnerability Other: [SA11499] Zonet ZSR1104WE Wireless Router NAT Implementation Weakness [SA11516] Network Appliances Data ONTAP and NetCache Denial of Service Vulnerability [SA11504] 3Com NBX 100 Communications System Denial of Service Cross Platform: [SA11546] Check Point VPN-1 Products ISAKMP Buffer Overflow Vulnerability [SA11524] Coppermine Photo Gallery Multiple Vulnerabilities [SA11554] PHPX Multiple Vulnerabilities [SA11497] Sesame Unauthorised User Repository Access Vulnerability [SA11536] HP Web Jetadmin Multiple Vulnerabilities [SA11535] Moodle "help.php" Cross-Site Scripting Vulnerability [SA11533] ReciPants Unspecified Input Validation Vulnerabilities [SA11556] Verity Ultraseek Reserved DOS Device Name Path Disclosure ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA11547] Titan FTP Server Aborted LIST Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2004-05-05 STORM has reported a vulnerability in Titan FTP Server, which can be exploited by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/11547/ -- [SA11542] Aweb Exposure of Sensitive Information Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2004-05-05 Oliver Karow has reported some vulnerabilities in Aweb, allowing malicious people to see sensitive information and arbitrary files. Full Advisory: http://secunia.com/advisories/11542/ -- [SA11525] Web Wiz Forum SQL Injection and Security Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data Released: 2004-05-03 Alexander has reported some vulnerabilities in Web Wiz Forum, allowing malicious people to conduct SQL injection attacks and perform certain administrative functions. Full Advisory: http://secunia.com/advisories/11525/ UNIX/Linux:-- [SA11539] Mac OS X Security Update Fixes Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Hijacking, Security Bypass, Manipulation of data, Privilege escalation, DoS, System access Released: 2004-05-04 Apple has issued a security update for Mac OS X, which fixes some older, known vulnerabilities along with some new unspecified issues. Full Advisory: http://secunia.com/advisories/11539/ -- [SA11528] Pound "logmsg()" Format String Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2004-05-03 Akira Higuchi has discovered a vulnerability in Pound, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/11528/ -- [SA11553] PHP-Nuke Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2004-05-06 Janek Vind has reported some vulnerabilities in PHP-Nuke, allowing malicious people to conduct Cross Site Scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/11553/ -- [SA11548] OpenBSD update for cvs Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information, System access Released: 2004-05-05 OpenBSD has issued patches for cvs. These fix two vulnerabilities, which can be exploited by malicious servers to compromise clients and by malicious users to retrieve arbitrary files from a vulnerable server. Full Advisory: http://secunia.com/advisories/11548/ -- [SA11544] Slackware update for LHA Critical: Moderately critical Where: From remote Impact: System access Released: 2004-05-05 Slackware has issued updates packages for LHA. These fix some vulnerabilities, potentially allowing malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/11544/ -- [SA11538] Slackware update for xine-lib Critical: Moderately critical Where: From remote Impact: System access Released: 2004-05-04 Slackware has issued updates for xine-lib. These fix a vulnerability, which potentially can be exploited by malicious people to gain system access. Full Advisory: http://secunia.com/advisories/11538/ -- [SA11527] ProFTPD CIDR Addressing ACL Security Issue Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2004-05-03 Jindrich Makovicka has reported a security issue in ProFTPD, potentially allowing malicious people to bypass ACLs. Full Advisory: http://secunia.com/advisories/11527/ -- [SA11521] Red Hat update for OpenOffice Critical: Moderately critical Where: From remote Impact: System access Released: 2004-05-03 Red Hat has issued updated packages for OpenOffice. These fix a vulnerability allowing malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/11521/ -- [SA11512] Red Hat update for xchat Critical: Moderately critical Where: From remote Impact: System access Released: 2004-04-30 Red Hat has issued updated packages for xchat. These fix a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/11512/ -- [SA11510] LHA Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: System access Released: 2004-04-30 Ulf Harnhammar has reported some vulnerabilities in LHA, potentially allowing malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/11510/ -- [SA11500] MPlayer and xine-lib RTSP Handling Vulnerabilities Critical: Moderately critical Where: From remote Impact: System access Released: 2004-04-30 Some vulnerabilities have been reported in MPlayer and xine-lib, potentially allowing malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/11500/ -- [SA11498] Debian update for eterm Critical: Moderately critical Where: From remote Impact: System access Released: 2004-04-29 Debian has issued updated packages for eterm. These fix a vulnerability, which potentially can be exploited by malicious people to manipulate actions taken by the system administrator and other users on a system. Full Advisory: http://secunia.com/advisories/11498/ -- [SA11552] FreeBSD update for kadmind Critical: Moderately critical Where: From local network Impact: System access, DoS Released: 2004-05-06 FreeBSD has addressed a vulnerability in kadmind, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/11552/ -- [SA11550] Heimdal kadmind Heap Overflow Vulnerability Critical: Moderately critical Where: From local network Impact: System access, DoS Released: 2004-05-06 Evgeny Demidov has discovered a vulnerability in Heimdal, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/11550/ -- [SA11545] Fedora update for mc Critical: Less critical Where: Impact: Released: 2004-05-05 Fedora has issued updates for mc. These fix some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/11545/ -- [SA11543] UnixWare / Open Unix update for Apache Critical: Less critical Where: From remote Impact: Exposure of sensitive information, Privilege escalation Released: 2004-05-05 SCO has issued updated packages, which fix some older vulnerabilities in Apache. Full Advisory: http://secunia.com/advisories/11543/ -- [SA11540] Slackware update for libpng Critical: Less critical Where: From remote Impact: DoS Released: 2004-05-04 Slackware has issued updates for libpng. These fix a vulnerability, potentially allowing malicious people to cause a Denial of Service against certain applications. Full Advisory: http://secunia.com/advisories/11540/ -- [SA11537] Slackware update for rsync Critical: Less critical Where: From remote Impact: Manipulation of data, Security Bypass Released: 2004-05-04 Slackware has issued updated packages for rsync. These fix a vulnerability, potentially allowing malicious people to write files outside the intended directory. Full Advisory: http://secunia.com/advisories/11537/ -- [SA11531] SquirrelMail Folder Name Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2004-05-03 Alvin Alex has reported a vulnerability in SquirrelMail, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/11531/ -- [SA11523] Debian update for rsync Critical: Less critical Where: From remote Impact: Manipulation of data, Security Bypass Released: 2004-05-03 Debian has issued updated packages for rsync. These fix a vulnerability, potentially allowing malicious people to write files outside the intended directory. Full Advisory: http://secunia.com/advisories/11523/ -- [SA11520] Red Hat update for libpng Critical: Less critical Where: From remote Impact: DoS Released: 2004-05-03 Red Hat has issued updates for libpng. These fix a vulnerability, potentially allowing malicious people to cause a Denial of Service against certain applications. Full Advisory: http://secunia.com/advisories/11520/ -- [SA11517] Debian update for libpng Critical: Less critical Where: From remote Impact: DoS Released: 2004-04-30 Debian has issued updates for libpng. These fix a vulnerability, potentially allowing malicious people to cause a Denial of Service against certain applications. Full Advisory: http://secunia.com/advisories/11517/ -- [SA11515] Trustix update for rsync Critical: Less critical Where: From remote Impact: Security Bypass, Manipulation of data Released: 2004-04-30 Trustix has issued updated packages for rsync. These fix a vulnerability, potentially allowing malicious people to write files outside the intended directory. Full Advisory: http://secunia.com/advisories/11515/ -- [SA11514] rsync Allows Writing Files Outside the Intended Directory Critical: Less critical Where: From remote Impact: Security Bypass, Manipulation of data Released: 2004-04-30 A vulnerability has been reported in rsync, allowing malicious people to write files outside the intended directory. Full Advisory: http://secunia.com/advisories/11514/ -- [SA11509] OpenPKG update for png Critical: Less critical Where: From remote Impact: DoS Released: 2004-04-30 OpenPKG has issued updates for png (libpng). These fix a vulnerability, potentially allowing malicious people to cause a Denial of Service against certain applications. Full Advisory: http://secunia.com/advisories/11509/ -- [SA11507] Mandrake update for libpng Critical: Less critical Where: From remote Impact: DoS Released: 2004-04-30 MandrakeSoft has issued updates for libpng. These fix a vulnerability, potentially allowing malicious people to cause a Denial of Service against certain applications. Full Advisory: http://secunia.com/advisories/11507/ -- [SA11505] libpng Potential Denial of Service Vulnerability Critical: Less critical Where: From remote Impact: DoS Released: 2004-04-30 Steve Grubb has reported a vulnerability in libpng, potentially allowing malicious people to cause a Denial of Service against applications and services using libpng. Full Advisory: http://secunia.com/advisories/11505/ -- [SA11551] FreeBSD update for heimdal Critical: Less critical Where: From local network Impact: ID Spoofing Released: 2004-05-06 FreeBSD has addressed an older vulnerability in heimdal, which can allow certain people to impersonate others. Full Advisory: http://secunia.com/advisories/11551/ -- [SA11541] SuSE update for kernel Critical: Less critical Where: Local system Impact: Security Bypass, Exposure of system information, Exposure of sensitive information, Privilege escalation, DoS Released: 2004-05-04 SuSE has issued updated packages for the kernel. These fix some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges, gain knowledge of sensitive information, or cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/11541/ -- [SA11530] Debian update for flim Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-05-03 Debian has issued updated packages for flim. These fix a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/11530/ -- [SA11529] FLIM Insecure Temporary File Creation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-05-03 Tatsuya Kinoshita has reported a vulnerability in FLIM, which can be exploited by malicious, local users to take certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/11529/ -- [SA11526] ipmenu Insecure Temporary File Creation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-05-04 Akira Yoshiyama has discovered a vulnerability in ipmenu, which can be exploited by malicious, local users to perform certain actions on a system with escalated privileges. Full Advisory: http://secunia.com/advisories/11526/ -- [SA11522] Red Hat update for mc Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-05-03 Red Hat has issued updates for mc. These fix some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/11522/ -- [SA11519] Red Hat update for utempter Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-05-03 Red Hat has issued updated packages for utempter. These fix a security issue, which potentially can be exploited by malicious, local users to perform certain actions with higher privileges on a vulnerable system. Full Advisory: http://secunia.com/advisories/11519/ -- [SA11508] Debian update for mc Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-04-30 Debian has issued updates for mc. These fix some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/11508/ -- [SA11506] Mandrake update for mc Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-04-30 MandrakeSoft has issued updates for mc. These fix some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/11506/ -- [SA11503] Gentoo update for samba Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-04-30 Gentoo has issued updated packages for Samba. These fix a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/11503/ -- [SA11502] Midnight Commander Multiple Unspecified Vulnerabilities Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-04-30 Jacub Jelinek has reported some vulnerabilities in GNU Midnight Commander, allowing malicious users to escalate their privileges. Full Advisory: http://secunia.com/advisories/11502/ -- [SA11501] Slackware update for kernel Critical: Less critical Where: Local system Impact: Privilege escalation, Exposure of sensitive information, Exposure of system information Released: 2004-04-30 Slackware has issued updated packages for the kernel. These fix some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges, or gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/11501/ -- [SA11518] PaX Denial of Service Vulnerability Critical: Not critical Where: Local system Impact: DoS Released: 2004-05-04 borg has discovered a vulnerability in PaX, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/11518/ Other:-- [SA11499] Zonet ZSR1104WE Wireless Router NAT Implementation Weakness Critical: Less critical Where: From remote Impact: Security Bypass Released: 2004-04-29 Jason Wachtel has reported a weakness in the Zonet ZSR1104WE wireless router, which may prevent identification of remote attackers. Full Advisory: http://secunia.com/advisories/11499/ -- [SA11516] Network Appliances Data ONTAP and NetCache Denial of Service Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2004-04-30 An unspecified vulnerability has been reported in Data ONTAP and NetCache, allowing malicious people to cause a Denial of Service against vulnerable devices. Full Advisory: http://secunia.com/advisories/11516/ -- [SA11504] 3Com NBX 100 Communications System Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2004-04-30 Michael Scheidell has reported a vulnerability in 3Com NBX 100 Communications System, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/11504/ Cross Platform:-- [SA11546] Check Point VPN-1 Products ISAKMP Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2004-05-05 A vulnerability has been discovered in various Check Point VPN-1 products, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/11546/ -- [SA11524] Coppermine Photo Gallery Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Cross Site Scripting, Exposure of sensitive information, System access Released: 2004-05-03 Janek Vind has reported multiple vulnerabilities in Coppermine Photo Gallery, allowing malicious people to compromise a vulnerable system or conduct Cross Site Scripting attacks. Full Advisory: http://secunia.com/advisories/11524/ -- [SA11554] PHPX Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting Released: 2004-05-06 JeiAr has reported some vulnerabilities in PHPX, allowing malicious people to conduct Cross Site Scripting, SQL injection and potentially execute administrative functions. Full Advisory: http://secunia.com/advisories/11554/ -- [SA11497] Sesame Unauthorised User Repository Access Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of system information, Exposure of sensitive information Released: 2004-04-29 A vulnerability has been discovered in Sesame, which can be exploited by malicious, anonymous users to access other user's repositories. Full Advisory: http://secunia.com/advisories/11497/ -- [SA11536] HP Web Jetadmin Multiple Vulnerabilities Critical: Moderately critical Where: From local network Impact: Security Bypass, Exposure of system information, Exposure of sensitive information, DoS, System access Released: 2004-05-04 FX has reported multiple vulnerabilities in HP Web Jetadmin, where the most serious issues can be combined to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/11536/ -- [SA11535] Moodle "help.php" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2004-05-03 Bartek Nowotarski has discovered a vulnerability in Moodle, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/11535/ -- [SA11533] ReciPants Unspecified Input Validation Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2004-05-04 Jon McClintock has reported some vulnerabilities in ReciPants, potentially allowing malicious people to conduct Cross-Site Scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/11533/ -- [SA11556] Verity Ultraseek Reserved DOS Device Name Path Disclosure Critical: Not critical Where: From remote Impact: Exposure of system information Released: 2004-05-06 Martin O'Neal of Corsaire has discovered a security issue in Verity Ultraseek, which can be exploited by malicious people to disclose path information. Full Advisory: http://secunia.com/advisories/11556/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 ======================================================================== _________________________________________ ISN mailing list Sponsored by: OSVDB.org
This archive was generated by hypermail 2b30 : Fri May 07 2004 - 08:04:54 PDT