======================================================================== The Secunia Weekly Advisory Summary 2004-10-28 - 2004-11-04 This week : 75 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: Monitor, Filter, and Manage Security Information - Filtering and Management of Secunia advisories - Overview, documentation, and detailed reports - Alerting via email and SMS Request Trial: https://ca.secunia.com/?f=s ======================================================================== 2) This Week in Brief: ADVISORIES: A new vulnerability has been discovered in Internet Explorer, which can be exploited to compromise vulnerable systems. Secunia issued a rare "Extremely Critical" Secunia advisory regarding this, since working exploit code has been posted to several public mailing lists. The vulnerability does not affect users running Windows XP with Service Pack 2 installed. However, for Windows XP Service Pack 1 and Windows 2000 users, there is no solution available and users are advised to use an alternate product. References: http://secunia.com/SA12959 VIRUS ALERTS: During the last week, Secunia issued two MEDIUM RISK virus alerts. Please refer to the grouped virus profiles below for more information: Bagle.AR - MEDIUM RISK Virus Alert - 2004-10-29 19:49 GMT+1 http://secunia.com/virus_information/13040/bagle.ar/ Bagle.AQ - MEDIUM RISK Virus Alert - 2004-10-29 11:10 GMT+1 http://secunia.com/virus_information/13033/bagle.aq/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA12959] Internet Explorer IFRAME Buffer Overflow Vulnerability 2. [SA12889] Microsoft Internet Explorer Two Vulnerabilities 3. [SA13005] Quicktime Two Vulnerabilities 4. [SA12712] Mozilla / Mozilla Firefox / Camino Tabbed Browsing Vulnerabilities 5. [SA12820] Debian update for mpg123 6. [SA12758] Microsoft Word Document Parsing Buffer Overflow Vulnerability 7. [SA12304] Internet Explorer Address Bar Spoofing Vulnerability 8. [SA13015] Internet Explorer/Outlook Express Restricted Zone Status Bar Spoofing 9. [SA12713] Opera Tabbed Browsing Vulnerability 10. [SA13028] Shadow "passwd_check()" Security Bypass Vulnerability ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA13079] Helm Web Hosting Control Panel Two Vulnerabilities [SA13078] Web Forum Server Directory Traversal and Clear Text User Credentials [SA13070] WinRAR "Repair Archive" Feature Vulnerability [SA13066] Cisco Secure ACS EAP-TLS User Authentication Bypass Vulnerability [SA13063] ArGoSoft FTP Server Shortcut Upload Vulnerability [SA13062] MailEnable Professional Unspecified Webmail Vulnerability [SA13067] F-Secure Anti-Virus for Exchange Nested Password Protected Archives Bypass Issue [SA13024] Cyber Web Filter IP Address Restriction Security Bypass [SA13015] Internet Explorer/Outlook Express Restricted Zone Status Bar Spoofing UNIX/Linux: [SA13082] Debian update for xpdf [SA13058] Gentoo update for Cherokee [SA13057] Cherokee Format String Vulnerability [SA13056] Mandrake update for gaim [SA13053] Mandrake update for mpg123 [SA13046] Debian update for mpg123 [SA13044] Conectiva update for squid [SA13043] Slackware update for libtiff [SA13037] qwik-smtpd Format String Vulnerability [SA13036] Sun Java System Web Proxy Server Unspecified Buffer Overflow Vulnerabilities [SA13027] OpenVMS Secure Web Server Multiple Vulnerabilities [SA13020] Fedora update for kdegraphics [SA13019] Fedora update for gpdf [SA13014] Gentoo update for GPdf/KPDF/KOffice [SA13092] Gentoo update for GD [SA13080] Debian update for libxml [SA13077] Gentoo update for MIME-tools [SA13076] Gentoo update for libxml2 [SA13075] SGI IRIX OpenSSL and OpenSSH Vulnerabilities [SA13064] Mandrake update for perl-MIME-tools [SA13060] Debian update for abiword [SA13055] Mandrake update for perl-Archive-Zip [SA13040] Caudium HTTP Request Processing Denial of Service [SA13039] Gentoo update for Archive::Zip [SA13035] bogofilter "quoted-printable decoder" Denial of Service Vulnerability [SA13031] haserl Manipulation of Critical Environment Variables Vulnerability [SA13026] HP Tru64 Secure Web Server Multiple Vulnerabilities [SA13025] HP-UX Apache Multiple Vulnerabilities [SA13016] Fedora update for libxml2 [SA13061] Debian iptables Module Loading Security Issue [SA13050] Mandrake update for mod_ssl/apache2-mod_ssl [SA13048] Conectiva update for rsync [SA13018] MIMEDefang Unspecified Vulnerabilities [SA13017] Debian update for squid [SA13087] Gentoo update for proxytunnel [SA13081] proxytunnel "message()" Format String Vulnerability [SA13059] HP OpenView Operations Unspecified Vulnerability [SA13054] Mandrake update for MySQL [SA13084] Debian update for lvm10 [SA13083] LVM "lvmcreate_initrd" Script Insecure Temporary File Creation [SA13069] Gentoo update for Speedtouch USB driver [SA13068] Gentoo update for Apache [SA13052] Mandrake update for netatalk [SA13042] Slackware update for apache/mod_ssl [SA13032] Debian update for postgresql [SA13028] Shadow "passwd_check()" Security Bypass Vulnerability [SA13022] Debian update for catdoc [SA13021] catdoc "xlsview" Privilege Escalation Vulnerability [SA13049] Gentoo update for ppp [SA13047] Safari "Javascript Disabled" Status Bar Spoofing Other: [SA13065] NetGear FWAG114 Default SNMP Community Strings Security Issue Cross Platform: [SA13013] Quake2 Engine Multiple Vulnerabilities [SA13073] Gbook MX Multiple SQL Injection Vulnerabilities [SA13072] Sun Java System Web and Application Server Certificate Handling Denial of Service [SA13071] Gallery Unspecified Script Insertion Vulnerability [SA13051] MIME::tools Malware Detection Bypass Vulnerability [SA13041] HTML::Merge "template" Directory Traversal Vulnerability [SA13038] Archive::Zip Zip Archive Virus Detection Bypass Vulnerability [SA13034] Land Down Under SQL Injection Vulnerabilities [SA13029] PuTTY IPv6 "SSH2_MSG_DEBUG" Packet Handling Buffer Overflow [SA13033] Chesapeake TFTP Server Directory Traversal and Denial of Service [SA13074] FsPHPGallery Denial of Service and Disclosure of System Information Vulnerabilities [SA13045] Apache "Space Headers" Denial of Service Vulnerability [SA13090] Sun Java System Application Server HTTP TRACE Response Cross-Site Scripting [SA13086] Mozilla / Thunderbird Valid Email Address Enumeration Weakness [SA13023] PHP CURL "open_basedir" Security Bypass Vulnerability ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA13079] Helm Web Hosting Control Panel Two Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2004-11-03 Behrang Fouladi has reported two vulnerabilities in Helm Web Hosting Control Panel, which can be exploited by malicious people to conduct SQL injection and script insertion attacks. Full Advisory: http://secunia.com/advisories/13079/ -- [SA13078] Web Forum Server Directory Traversal and Clear Text User Credentials Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2004-11-03 R00tCr4ck has discovered two vulnerabilities in Web Forum Server, which can be exploited to disclose sensitive information. Full Advisory: http://secunia.com/advisories/13078/ -- [SA13070] WinRAR "Repair Archive" Feature Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2004-11-03 Peter Winter-Smith of NGSSoftware has reported a vulnerability in WinRAR, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/13070/ -- [SA13066] Cisco Secure ACS EAP-TLS User Authentication Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2004-11-03 A vulnerability has been reported in Cisco Secure Access Control Server and Cisco Secure ACS Solution Engine, which can be exploited by malicious people to bypass the user authentication. Full Advisory: http://secunia.com/advisories/13066/ -- [SA13063] ArGoSoft FTP Server Shortcut Upload Vulnerability Critical: Moderately critical Where: From remote Impact: Unknown Released: 2004-11-02 A vulnerability with an unknown impact has been reported in ArGoSoft FTP Server. Full Advisory: http://secunia.com/advisories/13063/ -- [SA13062] MailEnable Professional Unspecified Webmail Vulnerability Critical: Moderately critical Where: From remote Impact: Unknown Released: 2004-11-02 A vulnerability with an unknown impact has been reported in MailEnable Professional. Full Advisory: http://secunia.com/advisories/13062/ -- [SA13067] F-Secure Anti-Virus for Exchange Nested Password Protected Archives Bypass Issue Critical: Less critical Where: From remote Impact: Security Bypass Released: 2004-11-03 A vulnerability has been discovered in F-Secure Anti-Virus for MS Exchange, which may prevent detection of malware in certain archives. Full Advisory: http://secunia.com/advisories/13067/ -- [SA13024] Cyber Web Filter IP Address Restriction Security Bypass Critical: Less critical Where: From local network Impact: Security Bypass Released: 2004-10-29 Ziv Kamir has discovered a vulnerability in Cyber Web Filter, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/13024/ -- [SA13015] Internet Explorer/Outlook Express Restricted Zone Status Bar Spoofing Critical: Not critical Where: From remote Impact: Security Bypass Released: 2004-10-29 Benjamin Tobias Franz has discovered a weakness in Internet Explorer, which can be exploited by malicious people to trick users into visiting a malicious website by obfuscating URLs. Full Advisory: http://secunia.com/advisories/13015/ UNIX/Linux:-- [SA13082] Debian update for xpdf Critical: Highly critical Where: From remote Impact: System access Released: 2004-11-03 Debian has issued an update for xpdf. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/13082/ -- [SA13058] Gentoo update for Cherokee Critical: Highly critical Where: From remote Impact: System access Released: 2004-11-02 Gentoo has issued an update for Cherokee. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13058/ -- [SA13057] Cherokee Format String Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2004-11-02 Florian Schilhabel has reported a vulnerability in Cherokee, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13057/ -- [SA13056] Mandrake update for gaim Critical: Highly critical Where: From remote Impact: System access Released: 2004-11-02 MandrakeSoft has issued an update for gaim. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/13056/ -- [SA13053] Mandrake update for mpg123 Critical: Highly critical Where: From remote Impact: System access Released: 2004-11-02 MandrakeSoft has issued an update for mpg123. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/13053/ -- [SA13046] Debian update for mpg123 Critical: Highly critical Where: From remote Impact: System access Released: 2004-11-01 Debian has issued an update for mpg123. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/13046/ -- [SA13044] Conectiva update for squid Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2004-11-03 Conectiva has issued an update for squid. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system or cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/13044/ -- [SA13043] Slackware update for libtiff Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2004-11-01 Slackware has issued an update for libtiff. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system or cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/13043/ -- [SA13037] qwik-smtpd Format String Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2004-11-01 Dark Eagle has reported a vulnerability in qwik-smtpd, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13037/ -- [SA13036] Sun Java System Web Proxy Server Unspecified Buffer Overflow Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2004-11-01 Pentest Limited has reported some vulnerabilities in Sun Java System Web Proxy Server, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13036/ -- [SA13027] OpenVMS Secure Web Server Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Security Bypass, Privilege escalation, DoS, System access Released: 2004-10-29 HP has acknowledged some vulnerabilities in OpenVMS running Secure Web Server (CSWS), which can be exploited to cause a DoS (Denial of Service), bypass certain security functionality, gain escalated privileges, or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13027/ -- [SA13020] Fedora update for kdegraphics Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2004-10-29 Fedora has issued an update for kdegraphics. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system or cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/13020/ -- [SA13019] Fedora update for gpdf Critical: Highly critical Where: From remote Impact: System access Released: 2004-10-29 Fedora has issued an update for gpdf. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13019/ -- [SA13014] Gentoo update for GPdf/KPDF/KOffice Critical: Highly critical Where: From remote Impact: System access Released: 2004-10-28 Gentoo has issued updates for GPdf, KPDF, and KOffice. These fix some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13014/ -- [SA13092] Gentoo update for GD Critical: Moderately critical Where: From remote Impact: System access Released: 2004-11-04 Gentoo has issued an update for gd. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13092/ -- [SA13080] Debian update for libxml Critical: Moderately critical Where: From remote Impact: System access Released: 2004-11-03 Debian has issued an update for libxml. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13080/ -- [SA13077] Gentoo update for MIME-tools Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2004-11-03 Gentoo has issued an update for MIME-tools. This fixes a vulnerability, which can be exploited by malware to bypass certain scanning functionality. Full Advisory: http://secunia.com/advisories/13077/ -- [SA13076] Gentoo update for libxml2 Critical: Moderately critical Where: From remote Impact: System access Released: 2004-11-03 Gentoo has issued an update for libxml2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13076/ -- [SA13075] SGI IRIX OpenSSL and OpenSSH Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data, DoS Released: 2004-11-03 SGI has acknowledged some vulnerabilities in IRIX, which can be exploited by malicious people to cause a DoS (Denial-of-Service) or potentially overwrite arbitrary files. Full Advisory: http://secunia.com/advisories/13075/ -- [SA13064] Mandrake update for perl-MIME-tools Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2004-11-02 MandrakeSoft has issued an update for perl-MIME-tools. This fixes a vulnerability, which can be exploited by malware to bypass certain scanning functionality. Full Advisory: http://secunia.com/advisories/13064/ -- [SA13060] Debian update for abiword Critical: Moderately critical Where: From remote Impact: System access Released: 2004-11-02 Debian has issued an update for abiword. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/13060/ -- [SA13055] Mandrake update for perl-Archive-Zip Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2004-11-02 MandrakeSoft has issued an update for perl-Archive-Zip. This fixes a vulnerability, which can be exploited by malware to bypass certain scanning functionality. Full Advisory: http://secunia.com/advisories/13055/ -- [SA13040] Caudium HTTP Request Processing Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2004-11-01 A vulnerability has been reported in Caudium, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/13040/ -- [SA13039] Gentoo update for Archive::Zip Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2004-11-01 Gentoo has issued an update for Archive::Zip. This fixes a vulnerability, which can be exploited by malware to bypass certain scanning functionality. Full Advisory: http://secunia.com/advisories/13039/ -- [SA13035] bogofilter "quoted-printable decoder" Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2004-11-01 A vulnerability has been reported in bogofilter, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/13035/ -- [SA13031] haserl Manipulation of Critical Environment Variables Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2004-11-01 A vulnerability has been reported in haserl, which can be exploited by malicious people to manipulate critical environment variables. Full Advisory: http://secunia.com/advisories/13031/ -- [SA13026] HP Tru64 Secure Web Server Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Privilege escalation, DoS, System access Released: 2004-10-29 HP has acknowledged some vulnerabilities in Secure Web Server for HP Tru64, which is included in HP Internet Express (IX). These can be exploited to gain escalated privileges, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13026/ -- [SA13025] HP-UX Apache Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Privilege escalation, DoS, System access Released: 2004-10-29 HP has confirmed some vulnerabilities in HP-UX Apache, which can be exploited to cause a DoS (Denial of Service), bypass configured access controls, gain escalated privileges, or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13025/ -- [SA13016] Fedora update for libxml2 Critical: Moderately critical Where: From remote Impact: System access Released: 2004-10-29 Fedora has issued an update for libxml2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13016/ -- [SA13061] Debian iptables Module Loading Security Issue Critical: Less critical Where: From remote Impact: Released: 2004-11-02 Full Advisory: http://secunia.com/advisories/13061/ -- [SA13050] Mandrake update for mod_ssl/apache2-mod_ssl Critical: Less critical Where: From remote Impact: Security Bypass Released: 2004-11-02 MandrakeSoft has issued updates for mod_ssl/apache2-mod_ssl. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/13050/ -- [SA13048] Conectiva update for rsync Critical: Less critical Where: From remote Impact: Security Bypass, Manipulation of data, Exposure of system information, Exposure of sensitive information Released: 2004-11-01 Conectiva has issued an update for rsync. This fixes two vulnerabilities, which potentially can be exploited by malicious users to read or write arbitrary files on a vulnerable system. Full Advisory: http://secunia.com/advisories/13048/ -- [SA13018] MIMEDefang Unspecified Vulnerabilities Critical: Less critical Where: From remote Impact: Unknown Released: 2004-10-29 Some vulnerabilities with unknown impacts have been reported in MIMEDefang. Full Advisory: http://secunia.com/advisories/13018/ -- [SA13017] Debian update for squid Critical: Less critical Where: From remote Impact: Spoofing, DoS Released: 2004-10-29 Debian has issued an update for squid. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and use the system for port scanning other hosts. Full Advisory: http://secunia.com/advisories/13017/ -- [SA13087] Gentoo update for proxytunnel Critical: Less critical Where: From local network Impact: System access Released: 2004-11-03 Gentoo has issued an update for proxytunnel. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13087/ -- [SA13081] proxytunnel "message()" Format String Vulnerability Critical: Less critical Where: From local network Impact: System access Released: 2004-11-03 Florian Schilhabel has reported a vulnerability in proxytunnel, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13081/ -- [SA13059] HP OpenView Operations Unspecified Vulnerability Critical: Less critical Where: From local network Impact: Privilege escalation Released: 2004-11-02 A vulnerability has been reported in HP OpenView Operations (OVO), which can be exploited by certain malicious people to gain escalated privileges on a vulnerable system. Full Advisory: http://secunia.com/advisories/13059/ -- [SA13054] Mandrake update for MySQL Critical: Less critical Where: From local network Impact: Security Bypass, Privilege escalation, DoS, System access Released: 2004-11-02 MandrakeSoft has issued an update for MySQL. This fixes some vulnerabilities, which can be exploited to overwrite arbitrary files, bypass certain security restrictions, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13054/ -- [SA13084] Debian update for lvm10 Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-11-03 Debian has issued an update for lvm10. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/13084/ -- [SA13083] LVM "lvmcreate_initrd" Script Insecure Temporary File Creation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-11-03 A vulnerability has been reported in LVM, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/13083/ -- [SA13069] Gentoo update for Speedtouch USB driver Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-11-02 Gentoo has issued an update for Speedtouch USB driver. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/13069/ -- [SA13068] Gentoo update for Apache Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-11-02 Gentoo has issued an update for apache. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/13068/ -- [SA13052] Mandrake update for netatalk Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-11-02 MandrakeSoft has issued an update for netatalk. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/13052/ -- [SA13042] Slackware update for apache/mod_ssl Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-11-01 Slackware has issued updates for apache and mod_ssl. These fix a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/13042/ -- [SA13032] Debian update for postgresql Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-10-29 Debian has issued an update for postgresql. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/13032/ -- [SA13028] Shadow "passwd_check()" Security Bypass Vulnerability Critical: Less critical Where: Local system Impact: Security Bypass Released: 2004-10-29 Martin Schulze has reported a vulnerability in Shadow, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/13028/ -- [SA13022] Debian update for catdoc Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-10-29 Debian has issued an update for catdoc. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/13022/ -- [SA13021] catdoc "xlsview" Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2004-10-29 Colin Phipps has reported a vulnerability in catdoc, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/13021/ -- [SA13049] Gentoo update for ppp Critical: Not critical Where: From remote Impact: DoS Released: 2004-11-01 Gentoo has issued an update for ppp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/13049/ -- [SA13047] Safari "Javascript Disabled" Status Bar Spoofing Critical: Not critical Where: From remote Impact: Security Bypass Released: 2004-11-01 A weakness has been discovered in Safari, which can be exploited by malicious people to trick users into visiting a malicious website by obfuscating URLs. Full Advisory: http://secunia.com/advisories/13047/ Other:-- [SA13065] NetGear FWAG114 Default SNMP Community Strings Security Issue Critical: Moderately critical Where: From local network Impact: Manipulation of data, Exposure of system information, Exposure of sensitive information Released: 2004-11-02 Lyndon Dubeau has reported a security issue in NetGear FWAG114 ProSafe Dual Band Wireless VPN Firewall, which can be exploited by malicious people to read or manipulate configuration information. Full Advisory: http://secunia.com/advisories/13065/ Cross Platform:-- [SA13013] Quake2 Engine Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Spoofing, Manipulation of data, Exposure of sensitive information, DoS, System access Released: 2004-10-28 Multiple vulnerabilities have been reported in Quake2 engine, which can be exploited by malicious people to cause a DoS (Denial of Service), potentially execute arbitrary code, disclose sensitive information, conduct spoofing attacks, and corrupt server data for other clients. Full Advisory: http://secunia.com/advisories/13013/ -- [SA13073] Gbook MX Multiple SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2004-11-03 Some vulnerabilities have been reported in Gbook MX, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/13073/ -- [SA13072] Sun Java System Web and Application Server Certificate Handling Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2004-11-03 Some vulnerabilities have been reported in Sun Java System Web Server and Sun Java System Application Server, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/13072/ -- [SA13071] Gallery Unspecified Script Insertion Vulnerability Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2004-11-03 A vulnerability has been reported in Gallery, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/13071/ -- [SA13051] MIME::tools Malware Detection Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2004-11-02 Stephane Lentz and Julian Field has reported a vulnerability in MIME::tools, which can be exploited by malware to bypass certain scanning functionality. Full Advisory: http://secunia.com/advisories/13051/ -- [SA13041] HTML::Merge "template" Directory Traversal Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2004-11-01 A vulnerability has been reported in HTML::Merge, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/13041/ -- [SA13038] Archive::Zip Zip Archive Virus Detection Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2004-11-01 A vulnerability has been reported in the Archive::Zip Perl module, which potentially can be exploited by malware to bypass certain scanning functionality. Full Advisory: http://secunia.com/advisories/13038/ -- [SA13034] Land Down Under SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2004-11-01 Positive Technologies has reported some vulnerabilities in Land Down Under, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/13034/ -- [SA13029] PuTTY IPv6 "SSH2_MSG_DEBUG" Packet Handling Buffer Overflow Critical: Moderately critical Where: From remote Impact: System access Released: 2004-10-29 A vulnerability has been reported in PuTTY IPv6, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/13029/ -- [SA13033] Chesapeake TFTP Server Directory Traversal and Denial of Service Critical: Moderately critical Where: From local network Impact: Exposure of sensitive information, DoS, System access Released: 2004-11-01 Luigi Auriemma has reported two vulnerabilities in Chesapeake TFTP Server, which can be exploited by malicious people to disclose sensitive information, potentially compromise a vulnerable system, and cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/13033/ -- [SA13074] FsPHPGallery Denial of Service and Disclosure of System Information Vulnerabilities Critical: Less critical Where: From remote Impact: Exposure of system information, DoS Released: 2004-11-03 Two vulnerabilities have been reported in FsPHPGallery, which can be exploited by malicious people to cause a DoS (Denial of Service) and disclose system information. Full Advisory: http://secunia.com/advisories/13074/ -- [SA13045] Apache "Space Headers" Denial of Service Vulnerability Critical: Less critical Where: From remote Impact: DoS Released: 2004-11-03 Chintan Trivedi has discovered a vulnerability in Apache, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/13045/ -- [SA13090] Sun Java System Application Server HTTP TRACE Response Cross-Site Scripting Critical: Not critical Where: From remote Impact: Cross Site Scripting Released: 2004-11-04 Sun has acknowledged a problem in Sun Java System Application Server, which potentially can be exploited to conduct cross-site scripting attacks against users. Full Advisory: http://secunia.com/advisories/13090/ -- [SA13086] Mozilla / Thunderbird Valid Email Address Enumeration Weakness Critical: Not critical Where: From remote Impact: Exposure of system information Released: 2004-11-03 plonk has discovered a weakness in Mozilla and Thunderbird, which can be exploited by malicious people to enumerate valid email addresses. Full Advisory: http://secunia.com/advisories/13086/ -- [SA13023] PHP CURL "open_basedir" Security Bypass Vulnerability Critical: Not critical Where: Local system Impact: Security Bypass Released: 2004-10-29 FraMe has discovered a vulnerability in PHP, which can be exploited by malicious, local users to access files outside the "open_basedir" root. Full Advisory: http://secunia.com/advisories/13023/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 ======================================================================== _________________________________________ Open Source Vulnerability Database (OSVDB) Everything is Vulnerable - http://www.osvdb.org/
This archive was generated by hypermail 2.1.3 : Fri Nov 05 2004 - 00:55:50 PST