======================================================================== The Secunia Weekly Advisory Summary 2004-08-26 - 2004-09-02 This week : 33 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: Secunia has implemented new features at Secunia.com SECUNIA ADVISORIES NOW INCLUDE "Solution Status": In addition to the extensive information Secunia advisories already include, Secunia has added a new parameter: "Solution Status". This simply means that all Secunia advisories, including older advisories, now include the current "Solution Status" of a advisory, e.g. if the vendor has released a patch or not. IMPROVED PRODUCT PAGES: The improved product pages now include a detailed listing of all Secunia advisories affecting each product. The listings include a clear indication of the "Solution Status" each advisory has ("Unpatched", "Vendor patch", "Vendor workaround", or "Partial fix"). View the following for examples: Opera 7: http://secunia.com/product/761/ Internet Explorer 6: http://secunia.com/product/11/ Mozilla Firefox: http://secunia.com/product/3256/ EXTRA STATISTICS: Each product page also includes a new pie graph, displaying the "Solution Status" for all Secunia advisories affecting each product in a given period. View the following for example: Internet Explorer 6: http://secunia.com/product/11/#statistics_solution FEEDBACK SYSTEM: To make it easier to provide feedback to the Secunia staff, we have made an online feedback form. Enter your inquiry and it will immediately be sent to the appropriate Secunia department. Ideas, suggestions, and other feedback is most welcome Secunia Feedback Form: http://secunia.com/contact_form/ ======================================================================== 2) This Week in Brief: ADVISORIES: Several unspecified vulnerabilities have been reported in various products from Oracle. Oracle has issued patches that reportedly address the vulnerabilities. See Secunia advisory below for details. Reference: http://secunia.com/SA12409 -- Multiple vulnerabilities has been reported in Kerberos V5, which can be exploited to compromise vulnerable systems. The vendor has issued patches to address the vulnerabilities. Furthermore, several vendors that has Kerberos implemented, are expected to issue updated versions. Please visit secunia.com for further details on updated programs and distributions. Reference: http://secunia.com/SA12408 VIRUS ALERTS: During the last week, Secunia issued one MEDIUM RISK virus alert. Please refer to the grouped virus profiles below for more information: HTML_BAGLE.AI - MEDIUM RISK Virus Alert - 2004-09-01 02:40 GMT+1 http://secunia.com/virus_information/11645/htmlbagle.ai/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA12381] Winamp Skin File Arbitrary Code Execution Vulnerability 2. [SA12321] Microsoft Internet Explorer Drag and Drop Vulnerability 3. [SA12304] Internet Explorer Address Bar Spoofing Vulnerability 4. [SA12394] OpenBSD ICMP Denial of Service Vulnerability 5. [SA12392] Netscape Apple Java Plugin Tab Spoofing Vulnerability 6. [SA12403] Mozilla / Mozilla Firefox Apple Java Plugin Tab Spoofing Vulnerability 7. [SA12376] Microsoft Outlook Express "BCC:" Recipient Disclosure Weakness 8. [SA11978] Multiple Browsers Frame Injection Vulnerability 9. [SA12395] Cisco IOS Telnet Service Denial of Service Vulnerability 10. [SA12371] Symantec Multiple Products ISAKMPd Buffer Overflow Vulnerability ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA12420] WFTPD Pro Server MLST Command Denial of Service Vulnerability [SA12419] Titan FTP Server Long Command Argument Denial of Service Vulnerability [SA12416] DasBlog Script Insertion Vulnerability [SA12407] Password Protect Multiple Vulnerabilities [SA12401] Smart Guest Book Database Content Disclosure Security Issue [SA12422] Cerbere Proxy Server "Host:" Header Denial of Service Vulnerability [SA12417] Cesar FTP Server Long Command Denial of Service Vulnerability [SA12398] Chat Anywhere User Flooding Denial of Service Vulnerability UNIX/Linux: [SA12414] Red Hat update for krb5 [SA12413] Fedora update for krb5 [SA12412] Mandrake update for krb5 [SA12411] Debian update for krb5 [SA12408] Kerberos V5 Multiple Vulnerabilities [SA12405] Debian update for qt [SA12402] Gentoo update for zlib [SA12400] OpenBSD update for zlib [SA12396] FileZilla Server zlib Denial of Service Vulnerability [SA12421] SCO OpenServer update for apache [SA12403] Mozilla / Mozilla Firefox Apple Java Plugin Tab Spoofing Vulnerability [SA12392] Netscape Apple Java Plugin Tab Spoofing Vulnerability [SA12399] Trustix update for samba [SA12397] Samba Printer Change Notification Request Denial of Service Vulnerability [SA12394] OpenBSD ICMP Denial of Service Vulnerability [SA12428] Gentoo update for mysql [SA12391] Mandrake update for kernel Other: [SA12410] Cisco VPN 3000 Concentrator Multiple Kerberos Vulnerabilities [SA12395] Cisco IOS Telnet Service Denial of Service Vulnerability [SA12393] Network Everywhere Cable/DSL 4-Port Router NR041 DHCP Script Insertion Cross Platform: [SA12409] Oracle Products Multiple Unspecified Vulnerabilities [SA12404] PvPGN Buffer Overflow Vulnerability [SA12415] pLog Register Script Insertion Vulnerability [SA12424] XOOPS Dictionary Cross-Site Scripting Vulnerability [SA12406] WS_FTP Server File Path Parsing Denial of Service Vulnerability ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA12420] WFTPD Pro Server MLST Command Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2004-09-01 lion has discovered a vulnerability in WFTPD Pro Server, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/12420/ -- [SA12419] Titan FTP Server Long Command Argument Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2004-09-01 lion has discovered a vulnerability in Titan FTP Server, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/12419/ -- [SA12416] DasBlog Script Insertion Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting Released: 2004-09-01 Dominick Baier has reported a vulnerability in DasBlog by Newtelligence, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/12416/ -- [SA12407] Password Protect Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Exposure of system information, Exposure of sensitive information Released: 2004-08-31 Criolabs has reported multiple vulnerabilities in Password Protect, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/12407/ -- [SA12401] Smart Guest Book Database Content Disclosure Security Issue Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2004-08-30 A security issue has been reported in Smart Guest Book, which may allow malicious people to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/12401/ -- [SA12422] Cerbere Proxy Server "Host:" Header Denial of Service Vulnerability Critical: Less critical Where: From remote Impact: DoS Released: 2004-09-01 Ziv Kamir has reported a vulnerability in Cerbere Proxy Server, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/12422/ -- [SA12417] Cesar FTP Server Long Command Denial of Service Vulnerability Critical: Less critical Where: From remote Impact: DoS Released: 2004-09-01 lion has discovered a vulnerability in Cesar FTP Server, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/12417/ -- [SA12398] Chat Anywhere User Flooding Denial of Service Vulnerability Critical: Less critical Where: From remote Impact: DoS Released: 2004-08-31 Luigi Auriemma and Donato Ferrante have discovered a vulnerability in Chat Anywhere, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/12398/ UNIX/Linux:-- [SA12414] Red Hat update for krb5 Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2004-09-01 Red Hat has issued an update for krb5. This fixes multiple vulnerabilities, where the most critical potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/12414/ -- [SA12413] Fedora update for krb5 Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2004-09-01 Fedora has issued an update for krb5. This fixes multiple vulnerabilities, where the most critical potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/12413/ -- [SA12412] Mandrake update for krb5 Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2004-09-01 MandrakeSoft has issued an update for krb5. This fixes multiple vulnerabilities, where the most critical potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/12412/ -- [SA12411] Debian update for krb5 Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2004-09-01 Debian has issued an update for krb5. This fixes multiple vulnerabilities, where the most critical potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/12411/ -- [SA12408] Kerberos V5 Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2004-09-01 Multiple vulnerabilities have been reported in Kerberos V5, where the most serious potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/12408/ -- [SA12405] Debian update for qt Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2004-08-31 Debian has issued an update for qt-copy. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/12405/ -- [SA12402] Gentoo update for zlib Critical: Moderately critical Where: From remote Impact: DoS Released: 2004-08-30 Gentoo has issued an update for zlib. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/12402/ -- [SA12400] OpenBSD update for zlib Critical: Moderately critical Where: From remote Impact: DoS Released: 2004-08-30 OpenBSD has issued an update for zlib. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/12400/ -- [SA12396] FileZilla Server zlib Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2004-08-30 A vulnerability has been reported in FileZilla Server, which can be exploited by malicious people to conduct DoS (Denial of Service) attacks. Full Advisory: http://secunia.com/advisories/12396/ -- [SA12421] SCO OpenServer update for apache Critical: Less critical Where: From remote Impact: Security Bypass, Spoofing Released: 2004-09-01 SCO has issued an update for apache. This fixes a vulnerability, which potentially can be exploited by malicious people to gain unauthorised access to other websites. Full Advisory: http://secunia.com/advisories/12421/ -- [SA12403] Mozilla / Mozilla Firefox Apple Java Plugin Tab Spoofing Vulnerability Critical: Less critical Where: From remote Impact: Spoofing Released: 2004-08-30 A vulnerability has been reported in Mozilla / Mozilla Firefox, which can be exploited by malicious people to conduct phishing attacks. Full Advisory: http://secunia.com/advisories/12403/ -- [SA12392] Netscape Apple Java Plugin Tab Spoofing Vulnerability Critical: Less critical Where: From remote Impact: Spoofing Released: 2004-08-27 J. Courcoul has discovered a vulnerability in Netscape, which can be exploited by malicious people to conduct phishing attacks. Full Advisory: http://secunia.com/advisories/12392/ -- [SA12399] Trustix update for samba Critical: Less critical Where: From local network Impact: DoS Released: 2004-08-30 Trustix has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/12399/ -- [SA12397] Samba Printer Change Notification Request Denial of Service Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2004-08-30 A vulnerability has been reported in Samba, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/12397/ -- [SA12394] OpenBSD ICMP Denial of Service Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2004-08-27 Vafa Izadinia has reported a vulnerability in OpenBSD, which can be exploited by malicious people to conduct DoS (Denial of Service) attacks. Full Advisory: http://secunia.com/advisories/12394/ -- [SA12428] Gentoo update for mysql Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-09-01 Gentoo has issued an update for MySQL. This fixes a vulnerability, potentially allowing malicious users to escalate their privileges. Full Advisory: http://secunia.com/advisories/12428/ -- [SA12391] Mandrake update for kernel Critical: Less critical Where: Local system Impact: Exposure of system information, Exposure of sensitive information Released: 2004-08-27 MandrakeSoft has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to disclose sensitive information in kernel memory. Full Advisory: http://secunia.com/advisories/12391/ Other:-- [SA12410] Cisco VPN 3000 Concentrator Multiple Kerberos Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2004-09-01 Cisco has acknowledged multiple vulnerabilities in the Kerberos implementation in Cisco VPN Concentrator 3000, where the most critical potentially can be exploited by malicious people to compromise a vulnerable device. Full Advisory: http://secunia.com/advisories/12410/ -- [SA12395] Cisco IOS Telnet Service Denial of Service Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2004-08-27 A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/12395/ -- [SA12393] Network Everywhere Cable/DSL 4-Port Router NR041 DHCP Script Insertion Critical: Less critical Where: From local network Impact: Cross Site Scripting Released: 2004-08-27 Mathieu Lacroix has reported a vulnerability in Network Everywhere Cable/DSL 4-Port Router NR041, allowing malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/12393/ Cross Platform:-- [SA12409] Oracle Products Multiple Unspecified Vulnerabilities Critical: Highly critical Where: From remote Impact: Unknown, Manipulation of data, Exposure of system information, Exposure of sensitive information, DoS, System access Released: 2004-09-01 Multiple vulnerabilities with an unknown impact have been reported in various Oracle products. Reportedly, some of the vulnerabilities can be exploited to compromise a vulnerable system, cause a DoS (Denial of Service), or conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/12409/ -- [SA12404] PvPGN Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2004-08-31 A vulnerability has been reported in PvPGN, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/12404/ -- [SA12415] pLog Register Script Insertion Vulnerability Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2004-09-01 Jason Thistlethwaite has discovered a vulnerability in pLog, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/12415/ -- [SA12424] XOOPS Dictionary Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2004-09-01 CyruxNET has discovered a vulnerability in Dictionary module for Xoops, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/12424/ -- [SA12406] WS_FTP Server File Path Parsing Denial of Service Vulnerability Critical: Less critical Where: From remote Impact: DoS Released: 2004-08-31 lion has discovered a vulnerability in WS_FTP Server, which can be exploited by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/12406/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 ======================================================================== _________________________________________ Donate online for the Ron Santo Walk to Cure Diabetes - http://www.c4i.org/ethan.html
This archive was generated by hypermail 2.1.3 : Thu Sep 02 2004 - 05:43:28 PDT