======================================================================== The Secunia Weekly Advisory Summary 2004-12-30 - 2005-01-06 This week : 31 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: The Secunia staff is spending hours every day to assure you the best and most reliable source for vulnerability information. Every single vulnerability report is being validated and verified before a Secunia advisory is written. Secunia validates and verifies vulnerability reports in many different ways e.g. by downloading the software and performing comprehensive tests, by reviewing source code, or by validating the credibility of the source from which the vulnerability report was issued. As a result, Secunia's database is the most correct and complete source for recent vulnerability information available on the Internet. Secunia Online Vulnerability Database: http://secunia.com/ ======================================================================== 2) This Week in Brief: ADVISORIES: Maurycy Prodeus of iSEC has released detailed information about a vulnerability in Mozilla, which potentially can be exploited to gain system access on vulnerable systems. The vulnerability was fixed with the release of Mozilla 1.7.5, which is available from the vendors web site. References: http://secunia.com/SA13687/ -- A new vulnerability in Internet Explorer has been discovered, which can be exploited to compromise a users system. Currently, no vendor solution is available. Please refer to referenced Secunia advisory below for details. References: http://secunia.com/SA13704/ VIRUS ALERTS: Secunia has not issued any virus alerts during the week. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA13704] Internet Explorer FTP Download Directory Traversal 2. [SA13599] Mozilla / Mozilla Firefox Download Dialog Source Spoofing 3. [SA13482] Internet Explorer DHTML Edit ActiveX Control Cross-Site Scripting 4. [SA13645] Microsoft Windows Multiple Vulnerabilities 5. [SA13687] Mozilla "MSG_UnEscapeSearchUrl()" Buffer Overflow Vulnerability 6. [SA13129] Mozilla / Mozilla Firefox Window Injection Vulnerability 7. [SA12889] Microsoft Internet Explorer Multiple Vulnerabilities 8. [SA13251] Microsoft Internet Explorer Window Injection Vulnerability 9. [SA12758] Microsoft Word Document Parsing Buffer Overflow Vulnerability 10. [SA13671] Symantec Nexland Firewall Appliances Three Vulnerabilities ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA13716] Soldner Secret Wars Multiple Vulnerabilities [SA13710] Macallan Mail Solution Two Vulnerabilities [SA13708] GFI MailEssentials / MailSecurity Mail Processing Denial of Service [SA13704] Internet Explorer FTP Download Directory Traversal UNIX/Linux: [SA13731] Conectiva update for mplayer [SA13726] Gentoo update for shoutcast-server [SA13724] Gentoo update for mozilla/firefox/thunderbird [SA13705] Fedora update for tetex [SA13698] Gentoo update for phprojekt [SA13729] Debian update for pcal [SA13707] Debian update for cupsys [SA13727] Gentoo update for mit-krb5 [SA13719] Gentoo update for linpopup [SA13723] Debian update for nasm [SA13703] ViewCVS "content-type" HTTP Response Splitting Vulnerability [SA13701] Bugzilla Internal Error Response Cross-Site Scripting [SA13706] Fedora update for kernel [SA13735] Red Hat update for vim [SA13730] Debian update for zip [SA13720] Gentoo update for a2ps [SA13715] Debian update for htmlheadline [SA13714] HtmlHeadLine.sh Insecure Temporary File Creation [SA13702] Debian update for perl [SA13733] Red Hat update for fam Other: Cross Platform: [SA13711] GNUBoard File Upload Vulnerability [SA13709] FlatNuke PHP Script Creation Vulnerability [SA13700] KorWeblog "lng" and "G_PATH" File Inclusion Vulnerability [SA13699] PhotoPost Classifieds Multiple Vulnerabilities [SA13697] ReviewPost PHP Pro Multiple Vulnerabilities [SA13722] MyBulletinBoard "uid" SQL Injection Vulnerability [SA13718] b2evolution "title" SQL Injection Vulnerability ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA13716] Soldner Secret Wars Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Cross Site Scripting, DoS, System access Released: 2005-01-05 Luigi Auriemma has reported multiple vulnerabilities in Secret Wars, which can be exploited by malicious people to cause a DoS (Denial of Service), conduct script insertion attacks, and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13716/ -- [SA13710] Macallan Mail Solution Two Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, DoS Released: 2005-01-03 Dennis Rand has reported two vulnerabilities in Macallan Mail Solution, which can be exploited by malicious people to bypass authentication or cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/13710/ -- [SA13708] GFI MailEssentials / MailSecurity Mail Processing Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2005-01-04 Peter Kruse has reported a vulnerability in GFI MailSecurity and GFI MailEssentials, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/13708/ -- [SA13704] Internet Explorer FTP Download Directory Traversal Critical: Moderately critical Where: From remote Impact: System access Released: 2005-01-03 Albert Puigsech Galicia has discovered a vulnerability in Internet Explorer, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/13704/ UNIX/Linux:-- [SA13731] Conectiva update for mplayer Critical: Highly critical Where: From remote Impact: System access Released: 2005-01-06 Conectiva has issued an update for mplayer. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/13731/ -- [SA13726] Gentoo update for shoutcast-server Critical: Highly critical Where: From remote Impact: System access Released: 2005-01-06 Gentoo has issued an update for shoutcast-server. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13726/ -- [SA13724] Gentoo update for mozilla/firefox/thunderbird Critical: Highly critical Where: From remote Impact: Spoofing, Exposure of system information, Exposure of sensitive information, DoS, System access Released: 2005-01-05 Gentoo has issued updates for mozilla, firefox and thunderbird. These fix some vulnerabilities, which can be exploited to cause a DoS (Denial of Service), detect the presence of local files, spoof the file download dialog, disclose sensitive information, or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13724/ -- [SA13705] Fedora update for tetex Critical: Highly critical Where: From remote Impact: System access Released: 2005-01-04 Fedora has issued an update for tetex. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/13705/ -- [SA13698] Gentoo update for phprojekt Critical: Highly critical Where: From remote Impact: System access Released: 2004-12-30 Gentoo has issued an update for phprojekt. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13698/ -- [SA13729] Debian update for pcal Critical: Moderately critical Where: From remote Impact: System access Released: 2005-01-06 Debian has issued an update for pcal. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/13729/ -- [SA13707] Debian update for cupsys Critical: Moderately critical Where: From remote Impact: System access Released: 2005-01-03 Debian has issued an update for cupsys. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13707/ -- [SA13727] Gentoo update for mit-krb5 Critical: Moderately critical Where: From local network Impact: System access Released: 2005-01-06 Gentoo has issued an update for mit-krb5. This fixes a vulnerability, which potentially can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13727/ -- [SA13719] Gentoo update for linpopup Critical: Moderately critical Where: From local network Impact: System access Released: 2005-01-05 Gentoo has issued an update for linpopup. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/13719/ -- [SA13723] Debian update for nasm Critical: Less critical Where: From remote Impact: System access Released: 2005-01-06 Debian has issued an update for nasm. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/13723/ -- [SA13703] ViewCVS "content-type" HTTP Response Splitting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-01-03 Joxean Koret has reported a vulnerability in ViewCVS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/13703/ -- [SA13701] Bugzilla Internal Error Response Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-01-04 Michael Krax has reported a vulnerability in Bugzilla, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/13701/ -- [SA13706] Fedora update for kernel Critical: Less critical Where: From local network Impact: Unknown, Exposure of sensitive information, Privilege escalation, DoS Released: 2005-01-04 Fedora has issued an update for the kernel. This fixes multiple vulnerabilities, where some have unknown impacts and others can be exploited to gain knowledge of sensitive information, cause a DoS (Denial of Service), or gain escalated privileges. Full Advisory: http://secunia.com/advisories/13706/ -- [SA13735] Red Hat update for vim Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-01-06 Red Hat has issued an update for vim. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/13735/ -- [SA13730] Debian update for zip Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-01-06 Debian has issued an update for zip. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/13730/ -- [SA13720] Gentoo update for a2ps Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-01-05 Gentoo has issued an update for a2ps. This fixes two vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/13720/ -- [SA13715] Debian update for htmlheadline Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-01-03 Debian has issued an update for htmlheadline. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/13715/ -- [SA13714] HtmlHeadLine.sh Insecure Temporary File Creation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-01-03 Javier Fernández-Sanguino Peña has reported a vulnerability in HtmlHeadLine.sh, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/13714/ -- [SA13702] Debian update for perl Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-01-03 Debian has issued an update for perl. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/13702/ -- [SA13733] Red Hat update for fam Critical: Not critical Where: Local system Impact: Exposure of system information Released: 2005-01-06 Red Hat has issued an update for fam. This fixes an old security issue, which can be exploited by malicious, local users to gain knowledge of certain system information. Full Advisory: http://secunia.com/advisories/13733/ Other: Cross Platform:-- [SA13711] GNUBoard File Upload Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2005-01-04 Jeremy Bae has reported a vulnerability in GNUBoard, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13711/ -- [SA13709] FlatNuke PHP Script Creation Vulnerability Critical: Highly critical Where: From remote Impact: Manipulation of data, System access Released: 2005-01-05 Pierquinto "Mantra" Manco has reported a vulnerability in FlatNuke, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13709/ -- [SA13700] KorWeblog "lng" and "G_PATH" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2005-01-03 Min-sung Choi has reported a vulnerability in KorWeblog, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13700/ -- [SA13699] PhotoPost Classifieds Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Cross Site Scripting, Manipulation of data, System access Released: 2005-01-04 James Bercegay has reported some vulnerabilities in PhotoPost Classifieds, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks, and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13699/ -- [SA13697] ReviewPost PHP Pro Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Cross Site Scripting, Manipulation of data, System access Released: 2005-01-04 James Bercegay has reported some vulnerabilities in ReviewPost PHP Pro, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks, and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/13697/ -- [SA13722] MyBulletinBoard "uid" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-01-05 scottm has reported a vulnerability in MyBulletinBoard, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/13722/ -- [SA13718] b2evolution "title" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-01-06 r0ut3r has reported a vulnerability in b2evolution, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/13718/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 ======================================================================== _________________________________________ Open Source Vulnerability Database (OSVDB) Everything is Vulnerable - http://www.osvdb.org/
This archive was generated by hypermail 2.1.3 : Thu Jan 06 2005 - 04:03:39 PST