======================================================================== The Secunia Weekly Advisory Summary 2004-10-14 - 2004-10-21 This week : 71 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: The Secunia staff is spending hours every day to assure you the best and most reliable source for vulnerability information. Every single vulnerability report is being validated and verified before a Secunia advisory is written. Secunia validates and verifies vulnerability reports in many different ways e.g. by downloading the software and performing comprehensive tests, by reviewing source code, or by validating the credibility of the source from which the vulnerability report was issued. As a result, Secunia's database is the most correct and complete source for recent vulnerability information available on the Internet. Secunia Online Vulnerability Database: http://secunia.com/ ======================================================================== 2) This Week in Brief: ADVISORIES: Secunia Research has discovered two spoofing vulnerabilities, affecting most browsers supporting tabbed browsing. The first vunerability allows inactive tabs to spawn dialog boxes, which appear to be from a web site in another tab e.g. a trusted bank site. The second vulnerability allows inactive tabs to "steal" focus from input fields from other tabs, which can lead the user into sending sensitive information to a malicious web site. Secunia has developed tests for both vulnerabilities, which can be found below. Dialog Box Spoofing Vulnerability Test: http://secunia.com/multiple_browsers_dialog_box_spoofing_test/ Form Field Focus Vulnerability Test: http://secunia.com/multiple_browsers_form_field_focus_test/ References: http://secunia.com/SA12706 http://secunia.com/SA12712 http://secunia.com/SA12713 http://secunia.com/SA12714 http://secunia.com/SA12717 http://secunia.com/SA12731 http://secunia.com/SA12892 -- Microsoft's patch for the Drag'n'Drop vulnerability in Internet Explorer has been proven insufficient by security researchers http-equiv and Andreas Sandblad, Secunia Research. Prior variants of the Drag'n'Drop vulnerability have been used on the Internet to compromise vulnerable systems. It is therefore very likely that this new unpatched variant of this issue, also will be used by malicious people to compromise systems. Currently, Microsoft has no solution to this issue, and users are therefore advised to disable Active Scripting or to use another browser. Reference: http://secunia.com/SA12889 VIRUS ALERTS: Secunia has not issued any virus alerts during the last week. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA12712] Mozilla / Mozilla Firefox / Camino Tabbed Browsing Vulnerabilities 2. [SA12806] Internet Explorer Multiple Vulnerabilities 3. [SA12809] Adobe Acrobat / Adobe Reader Disclosure of Sensitive Information 4. [SA12758] Microsoft Word Document Parsing Buffer Overflow Vulnerability 5. [SA12889] Microsoft Internet Explorer Two Vulnerabilities 6. [SA12804] Microsoft Windows Multiple Vulnerabilities 7. [SA12863] Symantec Norton AntiVirus Unprivileged Auto-Protection Deactivation 8. [SA12793] Windows XP Internet Connection Firewall Bypass Weakness 9. [SA12892] Safari Dialog Box Spoofing Vulnerability 10. [SA12304] Internet Explorer Address Bar Spoofing Vulnerability ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA12889] Microsoft Internet Explorer Two Vulnerabilities [SA12900] Abyss Web Server MS-DOS Device Names Denial of Service Vulnerability [SA12844] AliveSites Forum Unspecified Cross-Site Scripting and SQL Injection [SA12841] Dmxready Site Chassis Manager Unspecified Cross-Site Scripting and SQL Injection [SA12835] Ideal BB Multiple Unspecified Vulnerabilities [SA12834] NatterChat Unspecified SQL Injection Vulnerability [SA12883] Saleslogix Multiple Vulnerabilities [SA12849] Yak! File Upload Directory Traversal Vulnerability [SA12881] Nortel Contivity VPN Client Open Tunnel Certificate Verification Issue [SA12842] CyberStrong eShop ASP Shopping Card Unspecified Cross-Site Scripting [SA12839] Express-Web Content Management System Unspecified Cross-Site Scripting [SA12890] Vypress Tonecast Client Denial of Service Vulnerability [SA12894] Protector Plus 2000 Antivirus MS-DOS Device Name Handling Weakness [SA12893] AntiVir Antivirus MS-DOS Device Name Handling Weakness [SA12870] Twister Anti-TrojanVirus MS-DOS Device Name Handling Weakness [SA12863] Symantec Norton AntiVirus Unprivileged Auto-Protection Deactivation UNIX/Linux: [SA12910] Red Hat update for gaim [SA12887] Gaim MSN SLP Message Handling Buffer Overflow Vulnerability [SA12886] Mandrake update for mozilla [SA12885] Mandrake update for libtiff [SA12872] Conectiva update for gtk+ [SA12864] Debian update for netkit-telnet-ssl [SA12859] Gentoo update for phpMyAdmin [SA12851] Debian update for tiff [SA12833] VERITAS Cluster Server Unspecified System Compromise Vulnerability [SA12832] Fedora update for libtiff [SA12831] WeHelpBUS Arbitrary Command Execution Vulnerability [SA12892] Safari Dialog Box Spoofing Vulnerability [SA12871] UnixWare update for zlib [SA12855] Gnofract 4D ".fct" Arbitrary Code Execution Vulnerability [SA12845] Gentoo update for bnc [SA12827] Gentoo update for wordpress [SA12825] MediaWiki Multiple Vulnerabilities [SA12896] HP-UX Java XSLT Processor Privilege Escalation Vulnerability [SA12882] cabextract Directory Traversal Vulnerability [SA12865] cPanel Manipulation and Disclosure of Sensitive information Vulnerabilities [SA12857] Unzoo Directory Traversal Vulnerability [SA12847] mod_ssl SSLCipherSuite Security Bypass [SA12895] HP CIFS Server Arbitrary File Access Vulnerability [SA12866] Gentoo update for squid [SA12848] Trustix update for mysql [SA12830] Conectiva update for cups [SA12829] Conectiva update for samba [SA12914] Gentoo update for openoffice [SA12873] Sun Solaris LDAP and RBAC Privilege Escalation Vulnerability [SA12867] Gentoo update for postgresql [SA12860] PostgreSQL "make_oidjoins_check" Insecure Temporary File Handling [SA12852] Debian update for cyrus-sasl-mit [SA12838] Debian update for cupsys [SA12837] Fedora update for ruby [SA12828] KDocker "kdocker.cpp" Privilege Escalation Vulnerability [SA12884] Mandrake update for cvs [SA12836] ProFTPD User Enumeration Weakness Other: [SA12846] 3Com OfficeConnect ADSL Wireless 11g Firewall Router Information Disclosure Cross Platform: [SA12880] PBLang Unspecified Vulnerabilities [SA12879] RAV Antivirus Zip Archive Virus Detection Bypass Vulnerability [SA12878] NOD32 Antivirus Zip Archive Virus Detection Bypass Vulnerability [SA12877] eTrust Antivirus Zip Archive Virus Detection Bypass Vulnerability [SA12876] McAfee Anti-Virus Zip Archive Virus Detection Bypass Vulnerability [SA12874] Kaspersky Anti-Virus Zip Archive Virus Detection Bypass Vulnerability [SA12868] PSCRIPT Forum SQL Injection Vulnerabilities [SA12861] Anaconda Foundation Directory "template" Disclosure of Sensitive Information [SA12850] CoolPHP Cross-Site Scripting and Arbitrary Local File Inclusion Vulnerabilities [SA12843] WowBB Forum Unspecified SQL Injection and Cross-Site Scripting [SA12840] DevoyBB Unspecified Cross-Site Scripting and SQL Injection Vulnerabilities [SA12891] IBM Lotus Notes/Domino Cross-Site Scripting Vulnerability [SA12858] YaPiG comments Cross-Site Scripting Vulnerability [SA12854] MediaWiki Unspecified Security Issue [SA12826] SCT Campus Pipeline Cross-Site Scripting Vulnerability [SA12875] Sophos Anti-Virus Zip Archive Virus Detection Bypass [SA12862] ClientExec Exposure of Sensitive Information ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA12889] Microsoft Internet Explorer Two Vulnerabilities Critical: Highly critical Where: From remote Impact: Security Bypass, System access Released: 2004-10-20 http-equiv has discovered two vulnerabilities in Internet Explorer, which can be exploited by malicious people to compromise a user's system, link to local resources, and bypass a security feature in Microsoft Windows XP SP2. Full Advisory: http://secunia.com/advisories/12889/ -- [SA12900] Abyss Web Server MS-DOS Device Names Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2004-10-21 R00tCr4ck has reported a vulnerability in Abyss Web Server for Windows, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/12900/ -- [SA12844] AliveSites Forum Unspecified Cross-Site Scripting and SQL Injection Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2004-10-15 Positive Technologies has reported some vulnerabilities in AliveSites Forum, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/12844/ -- [SA12841] Dmxready Site Chassis Manager Unspecified Cross-Site Scripting and SQL Injection Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2004-10-15 Positive Technologies has reported some vulnerabilities in Dmxready Site Chassis Manager, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/12841/ -- [SA12835] Ideal BB Multiple Unspecified Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2004-10-15 Positive Technologies has reported some vulnerabilities in Ideal BB, which can be exploited by malicious people to conduct SQL injection, cross-site scripting and HTTP response splitting attacks. Full Advisory: http://secunia.com/advisories/12835/ -- [SA12834] NatterChat Unspecified SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2004-10-15 Positive Technologies has reported a vulnerability in NatterChat, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/12834/ -- [SA12883] Saleslogix Multiple Vulnerabilities Critical: Moderately critical Where: From local network Impact: Security Bypass, Spoofing, Manipulation of data, Exposure of system information, Exposure of sensitive information, DoS, System access Released: 2004-10-19 Carl Livitt has reported some vulnerabilities in SalesLogix, which can be exploited by malicious people to spoof users, cause a DoS (Denial of Service), disclose system and sensitive information, conduct SQL injection, bypass certain security restrictions, and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/12883/ -- [SA12849] Yak! File Upload Directory Traversal Vulnerability Critical: Moderately critical Where: From local network Impact: System access Released: 2004-10-15 Luigi Auriemma has reported a vulnerability in Yak!, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/12849/ -- [SA12881] Nortel Contivity VPN Client Open Tunnel Certificate Verification Issue Critical: Less critical Where: From remote Impact: Spoofing Released: 2004-10-20 Roger Sylvain has reported a vulnerability in Nortel Contivity VPN Client, potentially allowing malicious people to open a VPN tunnel to the client. Full Advisory: http://secunia.com/advisories/12881/ -- [SA12842] CyberStrong eShop ASP Shopping Card Unspecified Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2004-10-15 Positive Technologies has reported a vulnerability in CyberStrong eShop ASP Shopping Card, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/12842/ -- [SA12839] Express-Web Content Management System Unspecified Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2004-10-15 Positive Technologies has reported a vulnerability in Express-Web Content Management System, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/12839/ -- [SA12890] Vypress Tonecast Client Denial of Service Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2004-10-20 Luigi Auriemma has reported a vulnerability in Vypress Tonecast, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/12890/ -- [SA12894] Protector Plus 2000 Antivirus MS-DOS Device Name Handling Weakness Critical: Not critical Where: Local system Impact: Security Bypass Released: 2004-10-20 Sowhat has reported a weakness in Protector Plus 2000 Antivirus Software, which can be exploited by malware to bypass certain scanning functionality. Full Advisory: http://secunia.com/advisories/12894/ -- [SA12893] AntiVir Antivirus MS-DOS Device Name Handling Weakness Critical: Not critical Where: Local system Impact: Security Bypass Released: 2004-10-20 Sowhat has reported a weakness in Antivir Antivirus, which can be exploited by malware to bypass certain scanning functionality. Full Advisory: http://secunia.com/advisories/12893/ -- [SA12870] Twister Anti-TrojanVirus MS-DOS Device Name Handling Weakness Critical: Not critical Where: Local system Impact: Security Bypass Released: 2004-10-20 Sowhat has reported a weakness in Twister Anti-TrojanVirus, which can be exploited by malware to bypass certain scanning functionality. Full Advisory: http://secunia.com/advisories/12870/ -- [SA12863] Symantec Norton AntiVirus Unprivileged Auto-Protection Deactivation Critical: Not critical Where: Local system Impact: Unknown Released: 2004-10-18 Daniel Milisic has reported an issue in Symantec Norton AntiVirus / Norton Internet Security. Full Advisory: http://secunia.com/advisories/12863/ UNIX/Linux:-- [SA12910] Red Hat update for gaim Critical: Highly critical Where: From remote Impact: System access Released: 2004-10-21 Red Hat has issued an update for gaim. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/12910/ -- [SA12887] Gaim MSN SLP Message Handling Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2004-10-20 A vulnerability has been reported in Gaim, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/12887/ -- [SA12886] Mandrake update for mozilla Critical: Highly critical Where: From remote Impact: System access, Exposure of system information, Manipulation of data, Cross Site Scripting Released: 2004-10-20 MandrakeSoft has issued an update for mozilla. This fixes several vulnerabilities, which potentially can be exploited by malicious people to conduct cross-site scripting attacks, access and modify sensitive information, and compromise a user's system. Full Advisory: http://secunia.com/advisories/12886/ -- [SA12885] Mandrake update for libtiff Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2004-10-20 MandrakeSoft has issued an update for libtiff. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system or cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/12885/ -- [SA12872] Conectiva update for gtk+ Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2004-10-19 Conectiva has issued an update for gtk+. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/12872/ -- [SA12864] Debian update for netkit-telnet-ssl Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2004-10-18 Debian has issued an update for netkit-telnet-ssl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/12864/ -- [SA12859] Gentoo update for phpMyAdmin Critical: Highly critical Where: From remote Impact: System access Released: 2004-10-19 Gentoo has issued an update for phpMyAdmin. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/12859/ -- [SA12851] Debian update for tiff Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2004-10-18 Debian has issued an update for tiff. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system or cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/12851/ -- [SA12833] VERITAS Cluster Server Unspecified System Compromise Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2004-10-15 A vulnerability has been reported in VERITAS Cluster Server, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/12833/ -- [SA12832] Fedora update for libtiff Critical: Highly critical Where: From remote Impact: System access Released: 2004-10-15 Fedora has issued an update for libtiff. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/12832/ -- [SA12831] WeHelpBUS Arbitrary Command Execution Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2004-10-15 A vulnerability has been reported in WeHelpBUS, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/12831/ -- [SA12892] Safari Dialog Box Spoofing Vulnerability Critical: Moderately critical Where: From remote Impact: Spoofing Released: 2004-10-20 Secunia Research has discovered a vulnerability in Safari, which can be exploited by malicious web sites to spoof dialog boxes. Full Advisory: http://secunia.com/advisories/12892/ -- [SA12871] UnixWare update for zlib Critical: Moderately critical Where: From remote Impact: DoS Released: 2004-10-19 SCO has issued an update for zlib. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/12871/ -- [SA12855] Gnofract 4D ".fct" Arbitrary Code Execution Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2004-10-18 A vulnerability has been reported in Gnofract 4D, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/12855/ -- [SA12845] Gentoo update for bnc Critical: Moderately critical Where: From remote Impact: Spoofing Released: 2004-10-15 Gentoo has issued an update for bnc. This fixes a vulnerability, which can be exploited by malicious users to spoof their identity. Full Advisory: http://secunia.com/advisories/12845/ -- [SA12827] Gentoo update for wordpress Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2004-10-14 Gentoo has issued an update for wordpress. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct script insertion and cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/12827/ -- [SA12825] MediaWiki Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2004-10-14 Multiple vulnerabilities have been reported in MediaWiki, which can be exploited by malicious people to conduct script insertion, cross-site scripting, and SQL injection attacks. Full Advisory: http://secunia.com/advisories/12825/ -- [SA12896] HP-UX Java XSLT Processor Privilege Escalation Vulnerability Critical: Less critical Where: From remote Impact: Exposure of sensitive information, Privilege escalation Released: 2004-10-20 HP has acknowledged a vulnerability in the Java Runtime Environment software for HP-UX, which can be exploited by untrusted applets to gain escalated privileges on a vulnerable system. Full Advisory: http://secunia.com/advisories/12896/ -- [SA12882] cabextract Directory Traversal Vulnerability Critical: Less critical Where: From remote Impact: Security Bypass Released: 2004-10-19 A vulnerability has been reported in cabextract, which potentially can be exploited to overwrite arbitrary files on a vulnerable system. Full Advisory: http://secunia.com/advisories/12882/ -- [SA12865] cPanel Manipulation and Disclosure of Sensitive information Vulnerabilities Critical: Less critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2004-10-19 Karol Wiesek has reported two vulnerabilities in cPanel, which can be exploited by malicious, authenticated users to manipulate and disclose sensitive information. Full Advisory: http://secunia.com/advisories/12865/ -- [SA12857] Unzoo Directory Traversal Vulnerability Critical: Less critical Where: From remote Impact: System access Released: 2004-10-18 Doubles has discovered a vulnerability in Unzoo, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/12857/ -- [SA12847] mod_ssl SSLCipherSuite Security Bypass Critical: Less critical Where: From remote Impact: Security Bypass Released: 2004-10-15 Hartmut Keil has reported a security issue in mod_ssl, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/12847/ -- [SA12895] HP CIFS Server Arbitrary File Access Vulnerability Critical: Less critical Where: From local network Impact: Security Bypass Released: 2004-10-20 HP has acknowledged a vulnerability in HP CIFS Server, which can be exploited by malicious users to access arbitrary files and directories. Full Advisory: http://secunia.com/advisories/12895/ -- [SA12866] Gentoo update for squid Critical: Less critical Where: From local network Impact: DoS Released: 2004-10-19 Gentoo has issued an update for squid. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/12866/ -- [SA12848] Trustix update for mysql Critical: Less critical Where: From local network Impact: Security Bypass, Privilege escalation, DoS, System access Released: 2004-10-15 Trustix has issued an update for mysql. This fixes multiple vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise the system. Full Advisory: http://secunia.com/advisories/12848/ -- [SA12830] Conectiva update for cups Critical: Less critical Where: From local network Impact: DoS Released: 2004-10-14 Conectiva has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/12830/ -- [SA12829] Conectiva update for samba Critical: Less critical Where: From local network Impact: Security Bypass, DoS Released: 2004-10-14 Conectiva has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and access arbitrary files and directories. Full Advisory: http://secunia.com/advisories/12829/ -- [SA12914] Gentoo update for openoffice Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2004-10-21 Gentoo has issued an update for openoffice. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/12914/ -- [SA12873] Sun Solaris LDAP and RBAC Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-10-19 A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to escalate their privileges. Full Advisory: http://secunia.com/advisories/12873/ -- [SA12867] Gentoo update for postgresql Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-10-19 Gentoo has issued an update for PostgreSQL. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/12867/ -- [SA12860] PostgreSQL "make_oidjoins_check" Insecure Temporary File Handling Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-10-19 A vulnerability has been reported in PostgreSQL, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/12860/ -- [SA12852] Debian update for cyrus-sasl-mit Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-10-18 Debian has issued an update for cyrus-sasl-mit. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/12852/ -- [SA12838] Debian update for cupsys Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2004-10-15 Debian has issued an update for cupsys. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/12838/ -- [SA12837] Fedora update for ruby Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2004-10-15 Fedora has issued an update for ruby. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/12837/ -- [SA12828] KDocker "kdocker.cpp" Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-10-14 A vulnerability has been reported in KDocker, which potentially can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/12828/ -- [SA12884] Mandrake update for cvs Critical: Not critical Where: From remote Impact: Exposure of system information Released: 2004-10-20 MandrakeSoft has issued an update for cvs. This fixes a weakness, which potentially can be exploited by malicious users to gain knowledge of certain system information. Full Advisory: http://secunia.com/advisories/12884/ -- [SA12836] ProFTPD User Enumeration Weakness Critical: Not critical Where: From remote Impact: Exposure of system information Released: 2004-10-15 LSS Security Team has reported a weakness in ProFTPD, which potentially can be exploited by malicious people to determine valid usernames. Full Advisory: http://secunia.com/advisories/12836/ Other:-- [SA12846] 3Com OfficeConnect ADSL Wireless 11g Firewall Router Information Disclosure Critical: Moderately critical Where: From local network Impact: Exposure of system information, Exposure of sensitive information Released: 2004-10-15 Karb0nOxyde has reported a security issue in 3Com OfficeConnect ADSL Wireless 11g Firewall Router, which can be exploited by malicious people to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/12846/ Cross Platform:-- [SA12880] PBLang Unspecified Vulnerabilities Critical: Moderately critical Where: From remote Impact: Unknown Released: 2004-10-19 Some vulnerabilities with an unknown impact have been reported in PBLang. Full Advisory: http://secunia.com/advisories/12880/ -- [SA12879] RAV Antivirus Zip Archive Virus Detection Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2004-10-20 A vulnerability has been reported in RAV Antivirus, which can be exploited by malware to bypass certain scanning functionality. Full Advisory: http://secunia.com/advisories/12879/ -- [SA12878] NOD32 Antivirus Zip Archive Virus Detection Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2004-10-20 A vulnerability has been reported in NOD32 Antivirus, which can be exploited by malware to bypass certain scanning functionality. Full Advisory: http://secunia.com/advisories/12878/ -- [SA12877] eTrust Antivirus Zip Archive Virus Detection Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2004-10-20 A vulnerability has been reported in eTrust Antivirus, which can be exploited by malware to bypass certain scanning functionality. Full Advisory: http://secunia.com/advisories/12877/ -- [SA12876] McAfee Anti-Virus Zip Archive Virus Detection Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2004-10-20 A vulnerability has been reported in McAfee Anti-Virus Engine, which can be exploited by malware to bypass certain scanning functionality. Full Advisory: http://secunia.com/advisories/12876/ -- [SA12874] Kaspersky Anti-Virus Zip Archive Virus Detection Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2004-10-20 A vulnerability has been reported in Kaspersky Anti-Virus, which can be exploited by malware to bypass certain scanning functionality. Full Advisory: http://secunia.com/advisories/12874/ -- [SA12868] PSCRIPT Forum SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2004-10-19 Christoph Jeschke has reported some vulnerabilities PSCRIPT Forum, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/12868/ -- [SA12861] Anaconda Foundation Directory "template" Disclosure of Sensitive Information Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2004-10-19 Zero X has discovered a vulnerability in Anaconda Foundation Directory, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/12861/ -- [SA12850] CoolPHP Cross-Site Scripting and Arbitrary Local File Inclusion Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Exposure of system information, Exposure of sensitive information Released: 2004-10-18 R00tCr4ck has reported some vulnerabilities in CoolPHP, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information. Full Advisory: http://secunia.com/advisories/12850/ -- [SA12843] WowBB Forum Unspecified SQL Injection and Cross-Site Scripting Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2004-10-15 Positive Technologies has reported some vulnerabilities in WowBB Forum, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/12843/ -- [SA12840] DevoyBB Unspecified Cross-Site Scripting and SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2004-10-15 Positive Technologies has reported some vulnerabilities in DevoyBB, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/12840/ -- [SA12891] IBM Lotus Notes/Domino Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2004-10-20 Juan C Calderon has reported a vulnerability in IBM Lotus Notes/Domino, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/12891/ -- [SA12858] YaPiG comments Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2004-10-18 A vulnerability has been reported in YaPiG, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/12858/ -- [SA12854] MediaWiki Unspecified Security Issue Critical: Less critical Where: From remote Impact: Unknown Released: 2004-10-18 The vendor has reported a security issue in MediaWiki, with an unknown impact. Full Advisory: http://secunia.com/advisories/12854/ -- [SA12826] SCT Campus Pipeline Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2004-10-14 Spiffomatic64 has reported a vulnerability in SCT Campus Pipeline, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/12826/ -- [SA12875] Sophos Anti-Virus Zip Archive Virus Detection Bypass Critical: Not critical Where: From remote Impact: Security Bypass Released: 2004-10-20 A weakness has been reported in Sophos Anti-Virus, which can be exploited by malware to bypass certain scanning functionality. Full Advisory: http://secunia.com/advisories/12875/ -- [SA12862] ClientExec Exposure of Sensitive Information Critical: Not critical Where: From remote Impact: Exposure of system information Released: 2004-10-18 A security issue has been reported in ClientExec, which can be exploited by malicious people to gain knowledge of various system information. Full Advisory: http://secunia.com/advisories/12862/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 ======================================================================== _________________________________________ Open Source Vulnerability Database (OSVDB) Everything is Vulnerable - http://www.osvdb.org/
This archive was generated by hypermail 2.1.3 : Fri Oct 22 2004 - 01:11:14 PDT