======================================================================== The Secunia Weekly Advisory Summary 2005-02-04 - 2005-02-11 This week : 93 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: The Secunia staff is spending hours every day to assure you the best and most reliable source for vulnerability information. Every single vulnerability report is being validated and verified before a Secunia advisory is written. Secunia validates and verifies vulnerability reports in many different ways e.g. by downloading the software and performing comprehensive tests, by reviewing source code, or by validating the credibility of the source from which the vulnerability report was issued. As a result, Secunia's database is the most correct and complete source for recent vulnerability information available on the Internet. Secunia Online Vulnerability Database: http://secunia.com/ ======================================================================== 2) This Week in Brief: ADVISORIES: Microsoft has released their monthly security bulletins for February, which correct vulnerabilities in various products. Users of Microsoft products are advised to visit Windows Update and check for available updates. Additional information can be found in referenced Secunia advisories below. References: http://secunia.com/SA11165 http://secunia.com/SA14190 http://secunia.com/SA14193 http://secunia.com/SA14192 http://secunia.com/SA14195 http://secunia.com/SA14177 http://secunia.com/SA14189 http://secunia.com/SA11634 http://secunia.com/SA14174 -- Multiple browsers have been reported vulnerable to a spoofing issue using IDN (International Domain Name). The problem is caused due to an unintended result of the IDN implementation, which allows using international characters in domain names. This can be exploited by registering domain names with certain international characters that resembles other commonly used characters, thereby causing the user to believe they are on a trusted site. Secunia has constructed a test, which can be used to check if your browser is affected by this issue: http://secunia.com/multiple_browsers_idn_spoofing_test/ References: http://secunia.com/SA14166 http://secunia.com/SA14154 http://secunia.com/SA14163 http://secunia.com/SA14162 http://secunia.com/SA14165 http://secunia.com/SA14164 http://secunia.com/SA14209 -- Many products from Symantec and F-Secure have been reported vulnerable to a buffer overflow vulnerability, which can be exploited by malicious people to compromise a vulnerable system. A comprehensive list of affected products is available in referenced Secunia advisory below. References: http://secunia.com/SA14179/ http://secunia.com/SA14216/ VIRUS ALERTS: Secunia has not issued any virus alerts during the week. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA14163] Mozilla / Firefox / Camino IDN Spoofing Security Issue 2. [SA14179] Symantec Multiple Products UPX Parsing Engine Buffer Overflow 3. [SA14164] Safari IDN Spoofing Security Issue 4. [SA14160] Mozilla / Firefox Three Vulnerabilities 5. [SA11165] Microsoft Internet Explorer Multiple Vulnerabilities 6. [SA14154] Opera IDN Spoofing Security Issue 7. [SA12889] Microsoft Internet Explorer Multiple Vulnerabilities 8. [SA14188] Mac OS X Finder Insecure File Creation Vulnerability 9. [SA14165] Netscape IDN Spoofing Security Issue 10. [SA13818] Opera "data:" URI Handler Spoofing Vulnerability ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA14193] Microsoft Windows OLE / COM Two Vulnerabilities [SA14190] Microsoft Windows Drag and Drop Vulnerability [SA14177] Microsoft Office URL File Location Handling Buffer Overflow [SA14174] Microsoft Various Products PNG Image Parsing Vulnerabilities [SA14145] Foxmail Server "Mail From:" Buffer Overflow Vulnerability [SA14209] VeriSign i-Nav Plug-In IDN Spoofing Security Issue [SA14195] Microsoft Windows Hyperlink Object Library Buffer Overflow [SA14187] RealArcade Two Vulnerabilities [SA14172] ArGoSoft FTP Server Compressed Shortcut Upload Security Bypass [SA14169] 602LAN SUITE Webmail Arbitrary File Upload Vulnerability [SA14161] ArGoSoft Mail Server Directory Traversal Vulnerabilities [SA14146] RaidenHTTPD Relative Pathname Disclosure of Sensitive Information [SA14192] Microsoft Windows License Logging Service Buffer Overflow [SA14206] Netscape Three Vulnerabilities [SA14180] SharePoint Services Cross-Site Scripting and Spoofing Vulnerability [SA14134] LANChat Malformed Data Processing Denial of Service [SA14144] Microsoft Outlook Web Access "owalogon.asp" Redirection Weakness [SA14189] Windows Anonymous Named Pipe Connection Information Disclosure UNIX/Linux: [SA14167] Debian update for php3 [SA14156] Gentoo update for openmotif [SA14149] SUSE Updates for Multiple Packages [SA14140] Gentoo update for lesstif [SA14241] Red Hat update for squirrelmail [SA14229] Mandrake update for enscript [SA14227] Mandrake update for python [SA14223] Debian update for mailman [SA14222] Red Hat update for mailman [SA14220] HP-UX BIND Unspecified Denial of Service Vulnerability [SA14215] Debian update for evolution [SA14212] Ubuntu update for mailman [SA14211] Mailman "private.py" Directory Traversal Vulnerability [SA14208] SUSE update for squid [SA14207] Gentoo update for pdftohtml [SA14202] Gentoo update for python [SA14196] Fedora update for emacs [SA14194] Debian update for emacs20 [SA14191] Debian update for xemacs21 [SA14185] Ubuntu update for squid [SA14182] Frox Deny ACL Security Bypass Vulnerability [SA14178] UnixWare update for racoon [SA14168] Ubuntu update for emacs21-bin-common [SA14166] OmniWeb IDN Spoofing Security Issue [SA14164] Safari IDN Spoofing Security Issue [SA14162] KDE Applications IDN Spoofing Security Issue [SA14158] Debian update for python2.2 [SA14150] Fedora update for python [SA14148] GNU Emacs "popmail()" Format String Vulnerability [SA14137] Ubuntu Postfix IPv6 Relaying Security Issue [SA14133] Mozilla Application Suite "MSG_UnEscapeSearchUrl()" Buffer Overflow [SA14129] Ubuntu update for python [SA14201] Avaya krb5 Two Vulnerabilities [SA14132] HP CIFS Server Security Descriptor Parsing Integer Overflow [SA14130] Sun Solaris Samba Integer Overflow Vulnerability [SA14184] Fedora update for postgresql [SA14170] UnixWare / OpenServer TCP Connection Reset Denial of Service [SA14228] Mandrake update for squid [SA14157] Debian update for squid [SA14226] Mandrake update for mysql [SA14218] Debian update for xview [SA14213] XView "xv_parse_one()" Buffer Overflow Vulnerability [SA14203] Mandrake update for perl [SA14200] Avaya Various Products Kernel Vulnerabilities [SA14199] Mandrake update for perl-DBI [SA14198] IBM AIX auditselect Format String Vulnerability [SA14188] Mac OS X Finder Insecure File Creation Vulnerability [SA14186] Red Hat update for perl [SA14176] SCO OpenServer "enable" Buffer Overflow Vulnerability [SA14175] UnixWare update for foomatic-rip [SA14173] IBM AIX chdev Format String Vulnerability [SA14171] Gentoo update for postgresql [SA14159] osh "iopen()" Buffer Overflow Vulnerability [SA14152] Avaya PDS Multiple Privilege Escalation Vulnerabilities [SA14151] Debian update for postgresql [SA14139] Debian update for ncpfs [SA14138] Ubuntu update for cpio [SA14153] Avaya CMS UDP End Point Handling Denial of Service Other: [SA14136] Linksys PSUS4 Print Server HTTP POST Request Denial of Service Cross Platform: [SA14216] F-Secure Multiple Products ARJ Archive Handling Vulnerability [SA14179] Symantec Multiple Products UPX Parsing Engine Buffer Overflow [SA14205] MyPHP Forum Multiple SQL Injection Vulnerabilities [SA14181] xGB Administrative User Authentication Bypass Vulnerability [SA14165] Netscape IDN Spoofing Security Issue [SA14163] Mozilla / Firefox / Camino IDN Spoofing Security Issue [SA14154] Opera IDN Spoofing Security Issue [SA14143] Chipmunk Forum Multiple SQL Injection Vulnerabilities [SA14142] CMScore Multiple SQL Injection Vulnerabilities [SA14141] BXCP "show" Local File Inclusion Vulnerability [SA14128] Python SimpleXMLRPCServer Library Module Vulnerability [SA14183] BrightStor ARCserve Backup Discovery Service Buffer Overflow [SA14160] Mozilla / Firefox Three Vulnerabilities [SA14135] PowerDNS Traffic Handling Denial of Service Vulnerability [SA14131] Claroline Add Course Script Insertion Vulnerability [SA14204] Emdros MQL Parser Memory Leak Vulnerabilities ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA14193] Microsoft Windows OLE / COM Two Vulnerabilities Critical: Highly critical Where: From remote Impact: Privilege escalation, System access Released: 2005-02-08 Cesar Cerrudo has reported two vulnerabilities in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges or by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/14193/ -- [SA14190] Microsoft Windows Drag and Drop Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2005-02-08 A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/14190/ -- [SA14177] Microsoft Office URL File Location Handling Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2005-02-08 Rafel Ivgi has reported a vulnerability Microsoft Office XP, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/14177/ -- [SA14174] Microsoft Various Products PNG Image Parsing Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2005-02-08 Two vulnerabilities have been reported in various Microsoft products, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/14174/ -- [SA14145] Foxmail Server "Mail From:" Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2005-02-08 Fortinet has reported a vulnerability in Foxmail Server, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/14145/ -- [SA14209] VeriSign i-Nav Plug-In IDN Spoofing Security Issue Critical: Moderately critical Where: From remote Impact: Spoofing Released: 2005-02-09 Eric Johanson has reported a security issue in i-Nav Plug-In, which can be exploited by a malicious web site to spoof the URL displayed in the address bar, SSL certificate, and status bar. Full Advisory: http://secunia.com/advisories/14209/ -- [SA14195] Microsoft Windows Hyperlink Object Library Buffer Overflow Critical: Moderately critical Where: From remote Impact: System access Released: 2005-02-08 Anna Hollingzworth has reported a vulnerability in Microsoft Windows, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/14195/ -- [SA14187] RealArcade Two Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data, System access Released: 2005-02-09 Luigi Auriemma has reported two vulnerabilities in RealArcade, which can be exploited by malicious people delete arbitrary files or compromise a user's system. Full Advisory: http://secunia.com/advisories/14187/ -- [SA14172] ArGoSoft FTP Server Compressed Shortcut Upload Security Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2005-02-08 Remus Hociota has reported a vulnerability in ArGoSoft FTP Server, which can be exploited by malicious users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/14172/ -- [SA14169] 602LAN SUITE Webmail Arbitrary File Upload Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2005-02-08 Tan Chew Keong has reported a vulnerability in 602LAN SUITE, which can be exploited by malicious webmail users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/14169/ -- [SA14161] ArGoSoft Mail Server Directory Traversal Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information, System access Released: 2005-02-09 Tan Chew Keong has reported some vulnerabilities in ArGoSoft Mail Server, which can be exploited by malicious users to disclose and manipulate sensitive information, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/14161/ -- [SA14146] RaidenHTTPD Relative Pathname Disclosure of Sensitive Information Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2005-02-07 Donato Ferrante has reported a vulnerability in RaidenHTTPD, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/14146/ -- [SA14192] Microsoft Windows License Logging Service Buffer Overflow Critical: Moderately critical Where: From local network Impact: System access Released: 2005-02-08 Kostya Kortchinsky has reported a vulnerability in some versions of Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/14192/ -- [SA14206] Netscape Three Vulnerabilities Critical: Less critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Manipulation of data Released: 2005-02-09 mikx has discovered three vulnerabilities in Netscape, which can be exploited by malicious people to plant malware on a user's system, conduct cross-site scripting attacks and bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/14206/ -- [SA14180] SharePoint Services Cross-Site Scripting and Spoofing Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting, Spoofing, Manipulation of data Released: 2005-02-08 A vulnerability has been reported in Windows SharePoint Services and SharePoint Team Services, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/14180/ -- [SA14134] LANChat Malformed Data Processing Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2005-02-04 Donato Ferrante has reported a vulnerability in LANChat Pro Revival, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/14134/ -- [SA14144] Microsoft Outlook Web Access "owalogon.asp" Redirection Weakness Critical: Not critical Where: From remote Impact: Security Bypass Released: 2005-02-08 Donnie Werner has reported a weakness in Microsoft Outlook Web Access (OWA), which potentially can be exploited by malicious people to conduct phishing attacks. Full Advisory: http://secunia.com/advisories/14144/ -- [SA14189] Windows Anonymous Named Pipe Connection Information Disclosure Critical: Not critical Where: From local network Impact: Exposure of system information Released: 2005-02-08 Jean-Baptiste Marchand has reported a weakness in Microsoft Windows XP, which can be exploited by malicious people to gain knowledge of certain system information. Full Advisory: http://secunia.com/advisories/14189/ UNIX/Linux:-- [SA14167] Debian update for php3 Critical: Highly critical Where: From remote Impact: System access, Security Bypass Released: 2005-02-07 Debian has issued an update for php3. This fixes two vulnerabilities, which can be exploited by malicious people to bypass certain security functionality or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/14167/ -- [SA14156] Gentoo update for openmotif Critical: Highly critical Where: From remote Impact: System access Released: 2005-02-07 Gentoo has issued an update for openmotif. This fixes multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/14156/ -- [SA14149] SUSE Updates for Multiple Packages Critical: Highly critical Where: From remote Impact: Unknown, Security Bypass, Cross Site Scripting, Spoofing, Exposure of sensitive information, Privilege escalation, DoS, System access Released: 2005-02-07 SUSE has issued updates for multiple packages. These fix various vulnerabilities, where some has an unknown impacts, and others can be exploited to cause a DoS (Denial of Service), perform spoofing and cross-site scripting attacks, disclose sensitive information, perform certain actions with escalated privileges, or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/14149/ -- [SA14140] Gentoo update for lesstif Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2005-02-07 Gentoo has issued an update for lesstif. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/14140/ -- [SA14241] Red Hat update for squirrelmail Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information, Cross Site Scripting Released: 2005-02-11 Red Hat has issued an update for squirrelmail. This fixes three vulnerabilities, which can be exploited by malicious people to gain knowledge of sensitive information or conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/14241/ -- [SA14229] Mandrake update for enscript Critical: Moderately critical Where: From remote Impact: System access Released: 2005-02-11 MandrakeSoft has issued an update for enscript. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/14229/ -- [SA14227] Mandrake update for python Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data, Exposure of sensitive information, System access Released: 2005-02-11 MandrakeSoft has issued an update for python. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/14227/ -- [SA14223] Debian update for mailman Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Exposure of sensitive information Released: 2005-02-11 Debian has issued an update for mailman. This fixes two vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information. Full Advisory: http://secunia.com/advisories/14223/ -- [SA14222] Red Hat update for mailman Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2005-02-11 Red Hat has issued an update for mailman. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/14222/ -- [SA14220] HP-UX BIND Unspecified Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2005-02-10 A vulnerability has been reported in HP-UX, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/14220/ -- [SA14215] Debian update for evolution Critical: Moderately critical Where: From remote Impact: Privilege escalation, System access Released: 2005-02-10 Debian has issued an update for evolution. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/14215/ -- [SA14212] Ubuntu update for mailman Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2005-02-10 Ubuntu has issued an update for mailman. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/14212/ -- [SA14211] Mailman "private.py" Directory Traversal Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2005-02-10 John Cartwright has reported a vulnerability in Mailman, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/14211/ -- [SA14208] SUSE update for squid Critical: Moderately critical Where: From remote Impact: Unknown, Security Bypass, DoS, System access Released: 2005-02-11 SUSE has issued an update for squid, which fixes multiple vulnerabilities. One has an unknown impact, and others can be exploited to bypass certain security restrictions, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/14208/ -- [SA14207] Gentoo update for pdftohtml Critical: Moderately critical Where: From remote Impact: System access Released: 2005-02-10 Gentoo has issued an update for pdftohtml. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/14207/ -- [SA14202] Gentoo update for python Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data, Exposure of sensitive information, System access Released: 2005-02-09 Gentoo has issued an update for python. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/14202/ -- [SA14196] Fedora update for emacs Critical: Moderately critical Where: From remote Impact: System access Released: 2005-02-09 Fedora has issued an update for emacs. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/14196/ -- [SA14194] Debian update for emacs20 Critical: Moderately critical Where: From remote Impact: System access Released: 2005-02-09 Debian has issued an update for emacs20. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/14194/ -- [SA14191] Debian update for xemacs21 Critical: Moderately critical Where: From remote Impact: System access Released: 2005-02-09 Debian has issued an update for xemacs21. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/14191/ -- [SA14185] Ubuntu update for squid Critical: Moderately critical Where: From remote Impact: Unknown, Security Bypass, DoS Released: 2005-02-08 Ubuntu has issued an update for squid, which fixes various vulnerabilities. One has an unknown impact, and others can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/14185/ -- [SA14182] Frox Deny ACL Security Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2005-02-08 A vulnerability has been reported in Frox, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/14182/ -- [SA14178] UnixWare update for racoon Critical: Moderately critical Where: From remote Impact: Hijacking, Security Bypass, Manipulation of data, DoS Released: 2005-02-08 SCO has issued an update for racoon. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), establish unauthorised connections, bypass certain security restrictions, and conduct MitM (Man-in-the-Middle) attacks. Full Advisory: http://secunia.com/advisories/14178/ -- [SA14168] Ubuntu update for emacs21-bin-common Critical: Moderately critical Where: From remote Impact: System access Released: 2005-02-08 Ubuntu has issued an update for emacs21-bin-common. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/14168/ -- [SA14166] OmniWeb IDN Spoofing Security Issue Critical: Moderately critical Where: From remote Impact: Spoofing Released: 2005-02-07 Eric Johanson has reported a security issue in OmniWeb, which can be exploited by a malicious web site to spoof the URL displayed in the address bar, SSL certificate, and status bar. Full Advisory: http://secunia.com/advisories/14166/ -- [SA14164] Safari IDN Spoofing Security Issue Critical: Moderately critical Where: From remote Impact: Spoofing Released: 2005-02-07 Eric Johanson has reported a security issue in Safari, which can be exploited by a malicious web site to spoof the URL displayed in the address bar, SSL certificate, and status bar. Full Advisory: http://secunia.com/advisories/14164/ -- [SA14162] KDE Applications IDN Spoofing Security Issue Critical: Moderately critical Where: From remote Impact: Spoofing Released: 2005-02-07 Eric Johanson has reported a security issue in Konqueror, which can be exploited by a malicious web site to spoof the URL displayed in the address bar and status bar. Full Advisory: http://secunia.com/advisories/14162/ -- [SA14158] Debian update for python2.2 Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data, Exposure of sensitive information, System access Released: 2005-02-07 Debian has issued an update for python2.2. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/14158/ -- [SA14150] Fedora update for python Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data, Exposure of sensitive information, System access Released: 2005-02-07 Fedora has issued an update for python. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/14150/ -- [SA14148] GNU Emacs "popmail()" Format String Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2005-02-08 A vulnerability has been reported in GNU Emacs, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/14148/ -- [SA14137] Ubuntu Postfix IPv6 Relaying Security Issue Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2005-02-04 Ubuntu has issued an update for postfix. This fixes a security issue, which can be exploited by malicious people to use a vulnerable system as an open relay. Full Advisory: http://secunia.com/advisories/14137/ -- [SA14133] Mozilla Application Suite "MSG_UnEscapeSearchUrl()" Buffer Overflow Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2005-02-04 HP has confirmed a vulnerability in Mozilla Application Suite for Tru64 UNIX, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/14133/ -- [SA14129] Ubuntu update for python Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data, Exposure of sensitive information, System access Released: 2005-02-04 Ubuntu has issued updates for python2.2 and python2.3. These fix a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/14129/ -- [SA14201] Avaya krb5 Two Vulnerabilities Critical: Moderately critical Where: From local network Impact: Privilege escalation, System access Released: 2005-02-10 Avaya has acknowledged some vulnerabilities in krb5, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges and by malicious users to potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/14201/ -- [SA14132] HP CIFS Server Security Descriptor Parsing Integer Overflow Critical: Moderately critical Where: From local network Impact: System access Released: 2005-02-04 HP has acknowledged a vulnerability in CIFS Server, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/14132/ -- [SA14130] Sun Solaris Samba Integer Overflow Vulnerability Critical: Moderately critical Where: From local network Impact: System access Released: 2005-02-04 Sun has acknowledged a vulnerability in Solaris, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/14130/ -- [SA14184] Fedora update for postgresql Critical: Less critical Where: From remote Impact: Unknown, Security Bypass, Privilege escalation Released: 2005-02-08 Fedora has issued an update for postgresql. This fixes various vulnerabilities, where some have an unknown impact and others can be exploited by malicious users to gain escalated privileges or bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/14184/ -- [SA14170] UnixWare / OpenServer TCP Connection Reset Denial of Service Critical: Less critical Where: From remote Impact: DoS Released: 2005-02-08 SCO has acknowledged a vulnerability in UnixWare and OpenServer, which can be exploited by malicious people to reset established TCP connections on a vulnerable system. Full Advisory: http://secunia.com/advisories/14170/ -- [SA14228] Mandrake update for squid Critical: Less critical Where: From local network Impact: Security Bypass, DoS Released: 2005-02-11 MandrakeSoft has issued an update for squid. This fixes a vulnerability and a security issue, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/14228/ -- [SA14157] Debian update for squid Critical: Less critical Where: From local network Impact: Security Bypass, DoS Released: 2005-02-07 Debian has issued an update for squid. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/14157/ -- [SA14226] Mandrake update for mysql Critical: Less critical Where: Local system Impact: Manipulation of data, Exposure of sensitive information, Privilege escalation Released: 2005-02-11 MandrakeSoft has issued an update for mysql. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/14226/ -- [SA14218] Debian update for xview Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-02-10 Debian has issued an update for xview. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/14218/ -- [SA14213] XView "xv_parse_one()" Buffer Overflow Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-02-10 Erik Sjölund has reported a vulnerability in XView, which potentially can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/14213/ -- [SA14203] Mandrake update for perl Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-02-09 MandrakeSoft has issued an update for perl. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/14203/ -- [SA14200] Avaya Various Products Kernel Vulnerabilities Critical: Less critical Where: Local system Impact: Privilege escalation, DoS Released: 2005-02-09 Avaya has acknowledged some vulnerabilities in various products, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. Full Advisory: http://secunia.com/advisories/14200/ -- [SA14199] Mandrake update for perl-DBI Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-02-09 MandrakeSoft has issued an update for perl-DBI. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/14199/ -- [SA14198] IBM AIX auditselect Format String Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-02-09 iDEFENSE has reported a vulnerability in IBM AIX, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/14198/ -- [SA14188] Mac OS X Finder Insecure File Creation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-02-08 vade79 has discovered a vulnerability in Finder, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/14188/ -- [SA14186] Red Hat update for perl Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-02-08 Red Hat has issued an update for perl. This fixes two vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/14186/ -- [SA14176] SCO OpenServer "enable" Buffer Overflow Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-02-08 A vulnerability has been reported in OpenServer, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/14176/ -- [SA14175] UnixWare update for foomatic-rip Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-02-08 SCO has issued an update for foomatic-rip. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/14175/ -- [SA14173] IBM AIX chdev Format String Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-02-08 iDEFENSE has reported a vulnerability in AIX, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/14173/ -- [SA14171] Gentoo update for postgresql Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-02-08 Gentoo has issued an update for postgresql. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/14171/ -- [SA14159] osh "iopen()" Buffer Overflow Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-02-08 Charles Stevenson has reported a vulnerability in osh, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/14159/ -- [SA14152] Avaya PDS Multiple Privilege Escalation Vulnerabilities Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-02-07 Avaya has acknowledged some vulnerabilities in PDS, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/14152/ -- [SA14151] Debian update for postgresql Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-02-07 Debian has issued an update for postgresql. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/14151/ -- [SA14139] Debian update for ncpfs Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-02-04 Debian has issued an update for ncpfs. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/14139/ -- [SA14138] Ubuntu update for cpio Critical: Less critical Where: Local system Impact: Manipulation of data, Exposure of sensitive information Released: 2005-02-04 Ubuntu has issued an update for cpio. This fixes a vulnerability, which can be exploited by malicious, local users to disclose and manipulate information. Full Advisory: http://secunia.com/advisories/14138/ -- [SA14153] Avaya CMS UDP End Point Handling Denial of Service Critical: Not critical Where: Local system Impact: DoS Released: 2005-02-07 Avaya has acknowledged a vulnerability in CMS, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/14153/ Other:-- [SA14136] Linksys PSUS4 Print Server HTTP POST Request Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2005-02-04 Rstack team has reported a vulnerability in Linksys PSUS4, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/14136/ Cross Platform:-- [SA14216] F-Secure Multiple Products ARJ Archive Handling Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2005-02-10 ISS X-Force has reported a vulnerability in multiple F-Secure products, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/14216/ -- [SA14179] Symantec Multiple Products UPX Parsing Engine Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2005-02-09 ISS X-Force has reported a vulnerability in multiple Symantec products, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/14179/ -- [SA14205] MyPHP Forum Multiple SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-02-10 foster GHC has reported some vulnerabilities in MyPHP Forum, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/14205/ -- [SA14181] xGB Administrative User Authentication Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2005-02-08 Albania Security Clan has reported a vulnerability in xGB, which can be exploited by malicious people to bypass the user authentication and gain administrative access. Full Advisory: http://secunia.com/advisories/14181/ -- [SA14165] Netscape IDN Spoofing Security Issue Critical: Moderately critical Where: From remote Impact: Spoofing Released: 2005-02-07 Eric Johanson has reported a security issue in Netscape, which can be exploited by a malicious web site to spoof the URL displayed in the address bar, SSL certificate, and status bar. Full Advisory: http://secunia.com/advisories/14165/ -- [SA14163] Mozilla / Firefox / Camino IDN Spoofing Security Issue Critical: Moderately critical Where: From remote Impact: Spoofing Released: 2005-02-07 Eric Johanson has reported a security issue in Mozilla / Firefox / Camino, which can be exploited by a malicious web site to spoof the URL displayed in the address bar, SSL certificate, and status bar. Full Advisory: http://secunia.com/advisories/14163/ -- [SA14154] Opera IDN Spoofing Security Issue Critical: Moderately critical Where: From remote Impact: Spoofing Released: 2005-02-07 Eric Johanson has reported a security issue in Opera, which can be exploited by a malicious web site to spoof the URL displayed in the address bar, SSL certificate, and status bar. Full Advisory: http://secunia.com/advisories/14154/ -- [SA14143] Chipmunk Forum Multiple SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-02-07 GHC vision has reported some vulnerabilities in Chipmunk Forum, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/14143/ -- [SA14142] CMScore Multiple SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-02-07 GHC vision has reported some vulnerabilities in CMScore, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/14142/ -- [SA14141] BXCP "show" Local File Inclusion Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2005-02-07 Majest has reported a vulnerability in BXCP, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/14141/ -- [SA14128] Python SimpleXMLRPCServer Library Module Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data, Exposure of sensitive information, System access Released: 2005-02-04 Graham Dumpleton has reported a vulnerability in Python, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/14128/ -- [SA14183] BrightStor ARCserve Backup Discovery Service Buffer Overflow Critical: Moderately critical Where: From local network Impact: System access Released: 2005-02-08 Patrik Karlsson has reported a vulnerability in BrightStor ARCserve/Enterprise Backup, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/14183/ -- [SA14160] Mozilla / Firefox Three Vulnerabilities Critical: Less critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Manipulation of data Released: 2005-02-08 mikx has discovered three vulnerabilities in Mozilla and Firefox, which can be exploited by malicious people to plant malware on a user's system, conduct cross-site scripting attacks and bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/14160/ -- [SA14135] PowerDNS Traffic Handling Denial of Service Vulnerability Critical: Less critical Where: From remote Impact: DoS Released: 2005-02-04 A vulnerability has been reported in PowerDNS, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/14135/ -- [SA14131] Claroline Add Course Script Insertion Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-02-04 Yiannis Girod has reported a vulnerability in Claroline, which can be exploited by malicious users to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/14131/ -- [SA14204] Emdros MQL Parser Memory Leak Vulnerabilities Critical: Less critical Where: From local network Impact: DoS Released: 2005-02-09 Some vulnerabilities have been reported in Emdros, which potentially can be exploited by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/14204/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _________________________________________ Bellua Cyber Security Asia 2005 - http://www.bellua.com/bcs2005
This archive was generated by hypermail 2.1.3 : Mon Feb 14 2005 - 03:45:27 PST