[ISN] Secunia Weekly Summary - Issue: 2005-1

From: InfoSec News (isn@private)
Date: Thu Jan 06 2005 - 03:06:13 PST


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2004-12-30 - 2005-01-06                        

                       This week : 31 advisories                       

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

The Secunia staff is spending hours every day to assure you the best
and most reliable source for vulnerability information. Every single 
vulnerability report is being validated and verified before a Secunia
advisory is written.

Secunia validates and verifies vulnerability reports in many different
ways e.g. by downloading the software and performing comprehensive
tests, by reviewing source code, or by validating the credibility of
the source from which the vulnerability report was issued.

As a result, Secunia's database is the most correct and complete source
for recent vulnerability information available on the Internet.

Secunia Online Vulnerability Database:
http://secunia.com/

========================================================================
2) This Week in Brief:


ADVISORIES: 

Maurycy Prodeus of iSEC has released detailed information about a
vulnerability in Mozilla, which potentially can be exploited to gain
system access on vulnerable systems.

The vulnerability was fixed with the release of Mozilla 1.7.5, which is
available from the vendors web site.

References:
http://secunia.com/SA13687/ 

-- 

A new vulnerability in Internet Explorer has been discovered, which can
be exploited to compromise a users system.

Currently, no vendor solution is available. Please refer to referenced
Secunia advisory below for details.

References:
http://secunia.com/SA13704/ 


VIRUS ALERTS:

Secunia has not issued any virus alerts during the week.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA13704] Internet Explorer FTP Download Directory Traversal
2.  [SA13599] Mozilla / Mozilla Firefox Download Dialog Source Spoofing
3.  [SA13482] Internet Explorer DHTML Edit ActiveX Control Cross-Site
              Scripting
4.  [SA13645] Microsoft Windows Multiple Vulnerabilities
5.  [SA13687] Mozilla "MSG_UnEscapeSearchUrl()" Buffer Overflow
              Vulnerability
6.  [SA13129] Mozilla / Mozilla Firefox Window Injection Vulnerability
7.  [SA12889] Microsoft Internet Explorer Multiple Vulnerabilities
8.  [SA13251] Microsoft Internet Explorer Window Injection
              Vulnerability
9.  [SA12758] Microsoft Word Document Parsing Buffer Overflow
              Vulnerability
10. [SA13671] Symantec Nexland Firewall Appliances Three
              Vulnerabilities

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA13716] Soldner Secret Wars Multiple Vulnerabilities
[SA13710] Macallan Mail Solution Two Vulnerabilities
[SA13708] GFI MailEssentials / MailSecurity Mail Processing Denial of
Service
[SA13704] Internet Explorer FTP Download Directory Traversal

UNIX/Linux:
[SA13731] Conectiva update for mplayer
[SA13726] Gentoo update for shoutcast-server
[SA13724] Gentoo update for mozilla/firefox/thunderbird
[SA13705] Fedora update for tetex
[SA13698] Gentoo update for phprojekt
[SA13729] Debian update for pcal
[SA13707] Debian update for cupsys
[SA13727] Gentoo update for mit-krb5
[SA13719] Gentoo update for linpopup
[SA13723] Debian update for nasm
[SA13703] ViewCVS "content-type" HTTP Response Splitting Vulnerability
[SA13701] Bugzilla Internal Error Response Cross-Site Scripting
[SA13706] Fedora update for kernel
[SA13735] Red Hat update for vim
[SA13730] Debian update for zip
[SA13720] Gentoo update for a2ps
[SA13715] Debian update for htmlheadline
[SA13714] HtmlHeadLine.sh Insecure Temporary File Creation
[SA13702] Debian update for perl
[SA13733] Red Hat update for fam

Other:


Cross Platform:
[SA13711] GNUBoard File Upload Vulnerability
[SA13709] FlatNuke PHP Script Creation Vulnerability
[SA13700] KorWeblog "lng" and "G_PATH" File Inclusion Vulnerability
[SA13699] PhotoPost Classifieds Multiple Vulnerabilities
[SA13697] ReviewPost PHP Pro Multiple Vulnerabilities
[SA13722] MyBulletinBoard "uid" SQL Injection Vulnerability
[SA13718] b2evolution "title" SQL Injection Vulnerability

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA13716] Soldner Secret Wars Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, DoS, System access
Released:    2005-01-05

Luigi Auriemma has reported multiple vulnerabilities in Secret Wars,
which can be exploited by malicious people to cause a DoS (Denial of
Service), conduct script insertion attacks, and compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/13716/

 --

[SA13710] Macallan Mail Solution Two Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS
Released:    2005-01-03

Dennis Rand has reported two vulnerabilities in Macallan Mail Solution,
which can be exploited by malicious people to bypass authentication or
cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/13710/

 --

[SA13708] GFI MailEssentials / MailSecurity Mail Processing Denial of
Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2005-01-04

Peter Kruse has reported a vulnerability in GFI MailSecurity and GFI
MailEssentials, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/13708/

 --

[SA13704] Internet Explorer FTP Download Directory Traversal

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-01-03

Albert Puigsech Galicia has discovered a vulnerability in Internet
Explorer, which can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/13704/


UNIX/Linux:--

[SA13731] Conectiva update for mplayer

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-01-06

Conectiva has issued an update for mplayer. This fixes multiple
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/13731/

 --

[SA13726] Gentoo update for shoutcast-server

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-01-06

Gentoo has issued an update for shoutcast-server. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/13726/

 --

[SA13724] Gentoo update for mozilla/firefox/thunderbird

Critical:    Highly critical
Where:       From remote
Impact:      Spoofing, Exposure of system information, Exposure of
sensitive information, DoS, System access
Released:    2005-01-05

Gentoo has issued updates for mozilla, firefox and thunderbird. These
fix some vulnerabilities, which can be exploited to cause a DoS (Denial
of Service), detect the presence of local files, spoof the file download
dialog, disclose sensitive information, or potentially compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/13724/

 --

[SA13705] Fedora update for tetex

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-01-04

Fedora has issued an update for tetex. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/13705/

 --

[SA13698] Gentoo update for phprojekt

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-12-30

Gentoo has issued an update for phprojekt. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/13698/

 --

[SA13729] Debian update for pcal

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-01-06

Debian has issued an update for pcal. This fixes two vulnerabilities,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/13729/

 --

[SA13707] Debian update for cupsys

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-01-03

Debian has issued an update for cupsys. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/13707/

 --

[SA13727] Gentoo update for mit-krb5

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2005-01-06

Gentoo has issued an update for mit-krb5. This fixes a vulnerability,
which potentially can be exploited by malicious users to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/13727/

 --

[SA13719] Gentoo update for linpopup

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2005-01-05

Gentoo has issued an update for linpopup. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/13719/

 --

[SA13723] Debian update for nasm

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2005-01-06

Debian has issued an update for nasm. This fixes a vulnerability, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/13723/

 --

[SA13703] ViewCVS "content-type" HTTP Response Splitting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-01-03

Joxean Koret has reported a vulnerability in ViewCVS, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/13703/

 --

[SA13701] Bugzilla Internal Error Response Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-01-04

Michael Krax has reported a vulnerability in Bugzilla, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/13701/

 --

[SA13706] Fedora update for kernel

Critical:    Less critical
Where:       From local network
Impact:      Unknown, Exposure of sensitive information, Privilege
escalation, DoS
Released:    2005-01-04

Fedora has issued an update for the kernel. This fixes multiple
vulnerabilities, where some have unknown impacts and others can be
exploited to gain knowledge of sensitive information, cause a DoS
(Denial of Service), or gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/13706/

 --

[SA13735] Red Hat update for vim

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-01-06

Red Hat has issued an update for vim. This fixes some vulnerabilities,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/13735/

 --

[SA13730] Debian update for zip

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-01-06

Debian has issued an update for zip. This fixes a vulnerability, which
potentially can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/13730/

 --

[SA13720] Gentoo update for a2ps

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-01-05

Gentoo has issued an update for a2ps. This fixes two vulnerabilities,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/13720/

 --

[SA13715] Debian update for htmlheadline

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-01-03

Debian has issued an update for htmlheadline. This fixes a
vulnerability, which can be exploited by malicious, local users to
perform certain actions on a vulnerable system with escalated
privileges.

Full Advisory:
http://secunia.com/advisories/13715/

 --

[SA13714] HtmlHeadLine.sh Insecure Temporary File Creation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-01-03

Javier Fernández-Sanguino Peña has reported a vulnerability in
HtmlHeadLine.sh, which can be exploited by malicious, local users to
perform certain actions on a vulnerable system with escalated
privileges.

Full Advisory:
http://secunia.com/advisories/13714/

 --

[SA13702] Debian update for perl

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-01-03

Debian has issued an update for perl. This fixes some vulnerabilities,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/13702/

 --

[SA13733] Red Hat update for fam

Critical:    Not critical
Where:       Local system
Impact:      Exposure of system information
Released:    2005-01-06

Red Hat has issued an update for fam. This fixes an old security issue,
which can be exploited by malicious, local users to gain knowledge of
certain system information.

Full Advisory:
http://secunia.com/advisories/13733/


Other:


Cross Platform:--

[SA13711] GNUBoard File Upload Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-01-04

Jeremy Bae has reported a vulnerability in GNUBoard, which potentially
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/13711/

 --

[SA13709] FlatNuke PHP Script Creation Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Manipulation of data, System access
Released:    2005-01-05

Pierquinto "Mantra" Manco has reported a vulnerability in FlatNuke,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/13709/

 --

[SA13700] KorWeblog "lng" and "G_PATH" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-01-03

Min-sung Choi has reported a vulnerability in KorWeblog, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/13700/

 --

[SA13699] PhotoPost Classifieds Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, System access
Released:    2005-01-04

James Bercegay has reported some vulnerabilities in PhotoPost
Classifieds, which can be exploited by malicious people to conduct
cross-site scripting and SQL injection attacks, and compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/13699/

 --

[SA13697] ReviewPost PHP Pro Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, System access
Released:    2005-01-04

James Bercegay has reported some vulnerabilities in ReviewPost PHP Pro,
which can be exploited by malicious people to conduct cross-site
scripting and SQL injection attacks, and compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/13697/

 --

[SA13722] MyBulletinBoard "uid" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2005-01-05

scottm has reported a vulnerability in MyBulletinBoard, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/13722/

 --

[SA13718] b2evolution "title" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2005-01-06

r0ut3r has reported a vulnerability in b2evolution, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/13718/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45

========================================================================



_________________________________________
Open Source Vulnerability Database (OSVDB) Everything is Vulnerable - http://www.osvdb.org/



This archive was generated by hypermail 2.1.3 : Thu Jan 06 2005 - 04:03:39 PST