[ISN] Secunia Weekly Summary - Issue: 2004-36

From: InfoSec News (isn@private)
Date: Thu Sep 02 2004 - 04:50:44 PDT


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2004-08-26 - 2004-09-02                        

                       This week : 33 advisories                       

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Secunia has implemented new features at Secunia.com


SECUNIA ADVISORIES NOW INCLUDE "Solution Status":
In addition to the extensive information Secunia advisories already
include, Secunia has added a new parameter: "Solution Status". This
simply means that all Secunia advisories, including older advisories,
now include the current "Solution Status" of a advisory, e.g. if the
vendor has released a patch or not.


IMPROVED PRODUCT PAGES:
The improved product pages now include a detailed listing of all
Secunia advisories affecting each product. The listings include a clear
indication of the "Solution Status" each advisory has ("Unpatched",
"Vendor patch", "Vendor workaround", or "Partial fix"). View the
following for examples:

Opera 7:
http://secunia.com/product/761/

Internet Explorer 6:
http://secunia.com/product/11/

Mozilla Firefox:
http://secunia.com/product/3256/


EXTRA STATISTICS:
Each product page also includes a new pie graph, displaying the
"Solution Status" for all Secunia advisories affecting each product in
a given period. View the following for example:

Internet Explorer 6:
http://secunia.com/product/11/#statistics_solution


FEEDBACK SYSTEM:
To make it easier to provide feedback to the Secunia staff, we have
made an online feedback form. Enter your inquiry and it will
immediately be sent to the appropriate Secunia department.

Ideas, suggestions, and other feedback is most welcome

Secunia Feedback Form:
http://secunia.com/contact_form/


========================================================================
2) This Week in Brief:


ADVISORIES:

Several unspecified vulnerabilities have been reported in various
products from Oracle.

Oracle has issued patches that reportedly address the vulnerabilities.
See Secunia advisory below for details.

Reference:
http://secunia.com/SA12409

--

Multiple vulnerabilities has been reported in Kerberos V5, which can
be exploited to compromise vulnerable systems.

The vendor has issued patches to address the vulnerabilities.
Furthermore, several vendors that has Kerberos implemented, are
expected to issue updated versions. 

Please visit secunia.com for further details on updated programs and
distributions.

Reference:
http://secunia.com/SA12408


VIRUS ALERTS:

During the last week, Secunia issued one MEDIUM RISK virus alert.
Please refer to the grouped virus profiles below for more information:

HTML_BAGLE.AI - MEDIUM RISK Virus Alert - 2004-09-01 02:40 GMT+1
http://secunia.com/virus_information/11645/htmlbagle.ai/


========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA12381] Winamp Skin File Arbitrary Code Execution Vulnerability
2.  [SA12321] Microsoft Internet Explorer Drag and Drop Vulnerability
3.  [SA12304] Internet Explorer Address Bar Spoofing Vulnerability
4.  [SA12394] OpenBSD ICMP Denial of Service Vulnerability
5.  [SA12392] Netscape Apple Java Plugin Tab Spoofing Vulnerability
6.  [SA12403] Mozilla / Mozilla Firefox Apple Java Plugin Tab Spoofing
              Vulnerability
7.  [SA12376] Microsoft Outlook Express "BCC:" Recipient Disclosure
              Weakness
8.  [SA11978] Multiple Browsers Frame Injection Vulnerability
9.  [SA12395] Cisco IOS Telnet Service Denial of Service Vulnerability
10. [SA12371] Symantec Multiple Products ISAKMPd Buffer Overflow
              Vulnerability

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA12420] WFTPD Pro Server MLST Command Denial of Service
Vulnerability
[SA12419] Titan FTP Server Long Command Argument Denial of Service
Vulnerability
[SA12416] DasBlog Script Insertion Vulnerability
[SA12407] Password Protect Multiple Vulnerabilities
[SA12401] Smart Guest Book Database Content Disclosure Security Issue
[SA12422] Cerbere Proxy Server "Host:" Header Denial of Service
Vulnerability
[SA12417] Cesar FTP Server Long Command Denial of Service
Vulnerability
[SA12398] Chat Anywhere User Flooding Denial of Service Vulnerability

UNIX/Linux:
[SA12414] Red Hat update for krb5
[SA12413] Fedora update for krb5
[SA12412] Mandrake update for krb5
[SA12411] Debian update for krb5
[SA12408] Kerberos V5 Multiple Vulnerabilities
[SA12405] Debian update for qt
[SA12402] Gentoo update for zlib
[SA12400] OpenBSD update for zlib
[SA12396] FileZilla Server zlib Denial of Service Vulnerability
[SA12421] SCO OpenServer update for apache
[SA12403] Mozilla / Mozilla Firefox Apple Java Plugin Tab Spoofing
Vulnerability
[SA12392] Netscape Apple Java Plugin Tab Spoofing Vulnerability
[SA12399] Trustix update for samba
[SA12397] Samba Printer Change Notification Request Denial of Service
Vulnerability
[SA12394] OpenBSD ICMP Denial of Service Vulnerability
[SA12428] Gentoo update for mysql
[SA12391] Mandrake update for kernel

Other:
[SA12410] Cisco VPN 3000 Concentrator Multiple Kerberos
Vulnerabilities
[SA12395] Cisco IOS Telnet Service Denial of Service Vulnerability
[SA12393] Network Everywhere Cable/DSL 4-Port Router NR041 DHCP Script
Insertion

Cross Platform:
[SA12409] Oracle Products Multiple Unspecified Vulnerabilities
[SA12404] PvPGN Buffer Overflow Vulnerability
[SA12415] pLog Register Script Insertion Vulnerability
[SA12424] XOOPS Dictionary Cross-Site Scripting Vulnerability
[SA12406] WS_FTP Server File Path Parsing Denial of Service
Vulnerability

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA12420] WFTPD Pro Server MLST Command Denial of Service
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-09-01

lion has discovered a vulnerability in WFTPD Pro Server, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/12420/

 --

[SA12419] Titan FTP Server Long Command Argument Denial of Service
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-09-01

lion has discovered a vulnerability in Titan FTP Server, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/12419/

 --

[SA12416] DasBlog Script Insertion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting
Released:    2004-09-01

Dominick Baier has reported a vulnerability in DasBlog by
Newtelligence, which can be exploited by malicious people to conduct
script insertion attacks.

Full Advisory:
http://secunia.com/advisories/12416/

 --

[SA12407] Password Protect Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Exposure of system
information, Exposure of sensitive information
Released:    2004-08-31

Criolabs has reported multiple vulnerabilities in Password Protect,
which can be exploited by malicious people to conduct cross-site
scripting and SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/12407/

 --

[SA12401] Smart Guest Book Database Content Disclosure Security Issue

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2004-08-30

A security issue has been reported in Smart Guest Book, which may allow
malicious people to gain knowledge of sensitive information.

Full Advisory:
http://secunia.com/advisories/12401/

 --

[SA12422] Cerbere Proxy Server "Host:" Header Denial of Service
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2004-09-01

Ziv Kamir has reported a vulnerability in Cerbere Proxy Server, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/12422/

 --

[SA12417] Cesar FTP Server Long Command Denial of Service
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2004-09-01

lion has discovered a vulnerability in Cesar FTP Server, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/12417/

 --

[SA12398] Chat Anywhere User Flooding Denial of Service Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2004-08-31

Luigi Auriemma and Donato Ferrante have discovered a vulnerability in
Chat Anywhere, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/12398/


UNIX/Linux:--

[SA12414] Red Hat update for krb5

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-09-01

Red Hat has issued an update for krb5. This fixes multiple
vulnerabilities, where the most critical potentially can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12414/

 --

[SA12413] Fedora update for krb5

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-09-01

Fedora has issued an update for krb5. This fixes multiple
vulnerabilities, where the most critical potentially can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12413/

 --

[SA12412] Mandrake update for krb5

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-09-01

MandrakeSoft has issued an update for krb5. This fixes multiple
vulnerabilities, where the most critical potentially can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12412/

 --

[SA12411] Debian update for krb5

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-09-01

Debian has issued an update for krb5. This fixes multiple
vulnerabilities, where the most critical potentially can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12411/

 --

[SA12408] Kerberos V5 Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-09-01

Multiple vulnerabilities have been reported in Kerberos V5, where the
most serious potentially can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12408/

 --

[SA12405] Debian update for qt

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-08-31

Debian has issued an update for qt-copy. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/12405/

 --

[SA12402] Gentoo update for zlib

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-08-30

Gentoo has issued an update for zlib. This fixes a vulnerability, which
potentially can be exploited by malicious people to conduct a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/12402/

 --

[SA12400] OpenBSD update for zlib

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-08-30

OpenBSD has issued an update for zlib. This fixes a vulnerability,
which potentially can be exploited by malicious people to conduct a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/12400/

 --

[SA12396] FileZilla Server zlib Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-08-30

A vulnerability has been reported in FileZilla Server, which can be
exploited by malicious people to conduct DoS (Denial of Service)
attacks.

Full Advisory:
http://secunia.com/advisories/12396/

 --

[SA12421] SCO OpenServer update for apache

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Spoofing
Released:    2004-09-01

SCO has issued an update for apache. This fixes a vulnerability, which
potentially can be exploited by malicious people to gain unauthorised
access to other websites.

Full Advisory:
http://secunia.com/advisories/12421/

 --

[SA12403] Mozilla / Mozilla Firefox Apple Java Plugin Tab Spoofing
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Spoofing
Released:    2004-08-30

A vulnerability has been reported in Mozilla / Mozilla Firefox, which
can be exploited by malicious people to conduct phishing attacks.

Full Advisory:
http://secunia.com/advisories/12403/

 --

[SA12392] Netscape Apple Java Plugin Tab Spoofing Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Spoofing
Released:    2004-08-27

J. Courcoul has discovered a vulnerability in Netscape, which can be
exploited by malicious people to conduct phishing attacks.

Full Advisory:
http://secunia.com/advisories/12392/

 --

[SA12399] Trustix update for samba

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2004-08-30

Trustix has issued an update for samba. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/12399/

 --

[SA12397] Samba Printer Change Notification Request Denial of Service
Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2004-08-30

A vulnerability has been reported in Samba, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/12397/

 --

[SA12394] OpenBSD ICMP Denial of Service Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2004-08-27

Vafa Izadinia has reported a vulnerability in OpenBSD, which can be
exploited by malicious people to conduct DoS (Denial of Service)
attacks.

Full Advisory:
http://secunia.com/advisories/12394/

 --

[SA12428] Gentoo update for mysql

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-09-01

Gentoo has issued an update for MySQL. This fixes a vulnerability,
potentially allowing malicious users to escalate their privileges.

Full Advisory:
http://secunia.com/advisories/12428/

 --

[SA12391] Mandrake update for kernel

Critical:    Less critical
Where:       Local system
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2004-08-27

MandrakeSoft has issued an update for the kernel. This fixes a
vulnerability, which can be exploited by malicious, local users to
disclose sensitive information in kernel memory.

Full Advisory:
http://secunia.com/advisories/12391/


Other:--

[SA12410] Cisco VPN 3000 Concentrator Multiple Kerberos
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-09-01

Cisco has acknowledged multiple vulnerabilities in the Kerberos
implementation in Cisco VPN Concentrator 3000, where the most critical
potentially can be exploited by malicious people to compromise a
vulnerable device.

Full Advisory:
http://secunia.com/advisories/12410/

 --

[SA12395] Cisco IOS Telnet Service Denial of Service Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2004-08-27

A vulnerability has been reported in Cisco IOS, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/12395/

 --

[SA12393] Network Everywhere Cable/DSL 4-Port Router NR041 DHCP Script
Insertion

Critical:    Less critical
Where:       From local network
Impact:      Cross Site Scripting
Released:    2004-08-27

Mathieu Lacroix has reported a vulnerability in Network Everywhere
Cable/DSL 4-Port Router NR041, allowing malicious people to conduct
script insertion attacks.

Full Advisory:
http://secunia.com/advisories/12393/


Cross Platform:--

[SA12409] Oracle Products Multiple Unspecified Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Unknown, Manipulation of data, Exposure of system
information, Exposure of sensitive information, DoS, System access
Released:    2004-09-01

Multiple vulnerabilities with an unknown impact have been reported in
various Oracle products. Reportedly, some of the vulnerabilities can be
exploited to compromise a vulnerable system, cause a DoS (Denial of
Service), or conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/12409/

 --

[SA12404] PvPGN Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-08-31

A vulnerability has been reported in PvPGN, which can be exploited by
malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12404/

 --

[SA12415] pLog Register Script Insertion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-09-01

Jason Thistlethwaite has discovered a vulnerability in pLog, which can
be exploited by malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/12415/

 --

[SA12424] XOOPS Dictionary Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-09-01

CyruxNET has discovered a vulnerability in Dictionary module for Xoops,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/12424/

 --

[SA12406] WS_FTP Server File Path Parsing Denial of Service
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2004-08-31

lion has discovered a vulnerability in WS_FTP Server, which can be
exploited by malicious users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/12406/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45

========================================================================



_________________________________________
Donate online for the Ron Santo Walk to Cure Diabetes - http://www.c4i.org/ethan.html



This archive was generated by hypermail 2.1.3 : Thu Sep 02 2004 - 05:43:28 PDT