======================================================================== The Secunia Weekly Advisory Summary 2005-04-21 - 2005-04-28 This week : 98 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: Want a new IT Security job? Vacant positions at Secunia: http://secunia.com/secunia_vacancies/ ======================================================================== 2) This Week in Brief: Microsoft Windows XP is vulnerable to a DoS (Denial of Service) vulnerability, which can be exploited when e.g. a vulnerable user visits a malicious web site using Internet Explorer. Successful exploitation would cause the system to crash. Currently, no solution is available from the vendor. Reference: http://secunia.com/SA15064 -- A vulnerability has been reported in KDE, which can be exploited by malicious people to compromise a user's system. The vendor has released patches, which can be found in referenced Secunia advisory below. References: http://secunia.com/SA15060 VIRUS ALERTS: Secunia has not issued any virus alerts during the week. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA15023] Realplayer/RealOne RAM File Processing Buffer Overflow Vulnerability 2. [SA14820] Mozilla Firefox JavaScript Engine Information Disclosure Vulnerability 3. [SA15103] Netscape GIF Image Netscape Extension 2 Buffer Overflow 4. [SA15064] Microsoft Windows Image Rendering Denial of Service Vulnerability 5. [SA15017] Microsoft Windows Explorer Web View Script Insertion Vulnerability 6. [SA14938] Mozilla Firefox Multiple Vulnerabilities 7. [SA14654] Mozilla Firefox Three Vulnerabilities 8. [SA12758] Microsoft Word Document Parsing Buffer Overflow Vulnerabilities 9. [SA12889] Microsoft Internet Explorer Multiple Vulnerabilities 10. [SA14821] Mozilla Suite JavaScript Engine Information Disclosure Vulnerability ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA15103] Netscape GIF Image Netscape Extension 2 Buffer Overflow [SA15068] MailEnable Unspecified IMAP and SMTP Vulnerabilities [SA15062] MailEnable HTTPMail Connector Authorization Header Buffer Overflow [SA15140] NetTerm NetFtpd "USER" Command Buffer Overflow Vulnerability [SA15137] MetaCart e-Shop Two SQL Injection Vulnerabilities [SA15136] MetaBid Three SQL Injection Vulnerabilities [SA15134] MetaCart Multiple SQL Injection Vulnerabilities [SA15108] Citrix Program Neighborhood Agent Two Vulnerabilities [SA15105] ACS Blog Login Check Security Bypass Vulnerability [SA15104] OneWorldStore "idOrder" Disclosure of Sensitive Information [SA15101] nProtect Netizen Arbitrary File Placement Vulnerability [SA15100] Argosoft Mail Server Cross-Site Scripting and Script Insertion [SA15087] Musicmatch Jukebox Two Vulnerabilities [SA15072] BK Forum SQL Injection Vulnerabilities [SA15071] StorePortal SQL Injection Vulnerabilities [SA15066] Asp Nuke Cross-Site Scripting and SQL Injection Vulnerabilities [SA15057] OneWorldStore "chksettings.asp" Denial of Service Vulnerability [SA15055] CartWIZ Cross-Site Scripting and SQL Injection Vulnerabilities [SA15052] Yawcam Web Server Directory Traversal Vulnerability [SA15106] ACS Blog Unspecified Cross-Site Scripting Vulnerability [SA15064] Microsoft Windows Image Rendering Denial of Service Vulnerability [SA15085] Novell NSure Audit ASN.1 Message Parsing Denial of Service [SA15118] dBpowerAMP Music Converter Privilege Escalation Vulnerability [SA15076] BitDefender Insecure Program Execution Vulnerability UNIX/Linux: [SA15148] Debian update for lsh-utils [SA15146] Debian update for kdelibs [SA15139] Red Hat update for mozilla [SA15129] Gentoo update for xine-lib [SA15122] HP-UX Mozilla Multiple Vulnerabilities [SA15113] Sun Solaris Multiple libtiff Vulnerabilities [SA15111] Red Hat update for openoffice [SA15096] Gentoo update for kdelibs [SA15095] Gentoo update for realplayer/helixplayer [SA15069] Slackware update for mozilla [SA15065] xine-lib RTSP and MMS Streams Buffer Overflow Vulnerabilities [SA15162] Fedora update for cyrus-imapd [SA15131] Gentoo update for Convert-UUlib [SA15126] Debian CVS Password Protection Bypass and Denial of Service [SA15123] HP-UX Unspecified TCP/IP Denial of Service Vulnerability [SA15117] Astaro update for kernel [SA15114] Gentoo update for egroupware [SA15112] Red Hat update for cvs [SA15102] NetIQ Security Manager Directory Traversal Security Bypass [SA15099] SafeStone DetectIT Directory Traversal Security Bypass [SA15097] Gentoo update for kdewebdev [SA15094] PowerLock NetworkSecurity Directory Traversal Security Bypass [SA15092] Red Hat update for kernel [SA15091] Bsafe/Global Security for iSeries Directory Traversal Security Bypass [SA15090] FreeBSD update for cvs [SA15088] Castlehill Computer Services SECURE/NET Directory Traversal Security Bypass [SA15070] Slackware update for python [SA15063] RazLee Firewall+++ Directory Traversal Security Bypass [SA15061] Slackware update for cvs [SA15060] KDE Kommander Arbitrary Code Execution Vulnerability [SA15056] Trustix update for cvs [SA15053] Debian update for junkbuster [SA15120] Snmppd Logging Functionality Format String Vulnerability [SA15157] Conectiva update for squid [SA15144] Ethereal RSVP Protocol Decoding Denial of Service Vulnerability [SA15125] tcpdump Multiple Denial of Service Vulnerabilities [SA15119] SqWebMail "redirect" HTTP Response Splitting Vulnerability [SA15082] Forwards Parent Frame Page Title Cross-Site Scripting Vulnerability [SA15081] Accounts Parent Frame Page Title Cross-Site Scripting Vulnerability [SA15080] Kronolith Parent Frame Page Title Cross-Site Scripting Vulnerability [SA15079] Nag Parent Frame Page Title Cross-Site Scripting Vulnerability [SA15078] Mnemo Parent Frame Page Title Cross-Site Scripting Vulnerability [SA15077] Horde IMP Parent Frame Page Title Cross-Site Scripting Vulnerability [SA15075] Passwd Parent Frame Page Title Cross-Site Scripting Vulnerability [SA15074] Turba Parent Frame Page Title Cross-Site Scripting Vulnerability [SA15073] Vacation Parent Frame Page Title Cross-Site Scripting Vulnerability [SA15115] Trustix update for postgresql [SA15098] BIG-IP / 3-DNS Radius Authentication "login_radius" Security Bypass [SA15132] Gentoo update for rkhunter [SA15127] Rootkit Hunter Insecure Temporary File Creation [SA15086] Affix "affix_sock_register()" Privilege Escalation Vulnerability [SA15051] Gentoo update for openmosixview [SA15163] Conectiva update for gaim [SA15151] Fedora update for imagemagick [SA15149] Debian update for gaim [SA15124] ImageMagick PNM Image Decoding Buffer Overflow Vulnerability [SA15059] Slackware update for gaim [SA15138] Red Hat update for sharutils Other: Cross Platform: [SA15133] GrayCMS "path_prefix" File Inclusion Vulnerability [SA15107] yappa-ng Cross-Site Scripting and File Inclusion Vulnerabilities [SA15054] WebAPP E-Cart Module Shell Command Injection Vulnerability [SA15147] PHPCart Price Manipulation Vulnerability [SA15145] Serendipity Multiple Vulnerabilities [SA15141] phpMyVisites "mylang" Local File Inclusion Vulnerability [SA15130] Perl Convert::UUlib Module Buffer Overflow Vulnerability [SA15116] PHP-Calendar SQL Injection Vulnerability [SA15109] MaxDB Web Administration Service Buffer Overflow Vulnerabilities [SA15121] Confixx "change user" SQL Injection Vulnerability [SA15110] VooDoo cIRCle BOTNET Buffer Overflow Vulnerability [SA15084] phpMyVisites Cross-Site Scripting Vulnerabilities [SA15083] Chora Parent Frame Page Title Cross-Site Scripting Vulnerability [SA15067] IBM WebSphere Application Server Cross-Site Scripting Vulnerability [SA15058] Woltlab Burning Board Two Cross-Site Scripting Vulnerabilities [SA15050] Macromedia ColdFusion Error Page Cross-Site Scripting ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA15103] Netscape GIF Image Netscape Extension 2 Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2005-04-26 A vulnerability has been reported in Netscape, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/15103/ -- [SA15068] MailEnable Unspecified IMAP and SMTP Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2005-04-26 Some vulnerabilities have been reported in MailEnable Professional and MailEnable Enterprise, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15068/ -- [SA15062] MailEnable HTTPMail Connector Authorization Header Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2005-04-22 CorryL has reported a vulnerability in MailEnable, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15062/ -- [SA15140] NetTerm NetFtpd "USER" Command Buffer Overflow Vulnerability Critical: Highly critical Where: From local network Impact: System access Released: 2005-04-27 Sergio Alvarez has reported a vulnerability in NetTerm, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15140/ -- [SA15137] MetaCart e-Shop Two SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-04-27 Diabolic Crab has reported two vulnerabilities in MetaCart e-Shop, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/15137/ -- [SA15136] MetaBid Three SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-04-27 Diabolic Crab has reported some vulnerabilities in MetaBid, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/15136/ -- [SA15134] MetaCart Multiple SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-04-27 Diabolic Crab has reported some vulnerabilities in MetaCart for SQL Server, MetaCart for PayPal and MetaCart for PayFlow Link, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/15134/ -- [SA15108] Citrix Program Neighborhood Agent Two Vulnerabilities Critical: Moderately critical Where: From remote Impact: System access Released: 2005-04-26 Patrik Karlsson has reported two vulnerabilities in Citrix Program Neighborhood Agent, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/15108/ -- [SA15105] ACS Blog Login Check Security Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2005-04-25 farhad koosha has reported a vulnerability in ACS Blog, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/15105/ -- [SA15104] OneWorldStore "idOrder" Disclosure of Sensitive Information Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2005-04-25 Lostmon has reported a vulnerability in OneWorldStore, which can be exploited by malicious people to disclose some sensitive information. Full Advisory: http://secunia.com/advisories/15104/ -- [SA15101] nProtect Netizen Arbitrary File Placement Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2005-04-25 Keigo Yamazaki has reported a vulnerability in nProtect Netizen, which can be exploited by malicious people to place arbitrary files on a vulnerable system. Full Advisory: http://secunia.com/advisories/15101/ -- [SA15100] Argosoft Mail Server Cross-Site Scripting and Script Insertion Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2005-04-26 ShineShadow has discovered two vulnerabilities in Argosoft Mail Server, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks. Full Advisory: http://secunia.com/advisories/15100/ -- [SA15087] Musicmatch Jukebox Two Vulnerabilities Critical: Moderately critical Where: From remote Impact: Unknown, Manipulation of data Released: 2005-04-25 Two vulnerabilities have been reported in Musicmatch Jukebox, where one has an unknown impact, and the other can be exploited by malicious people to create or overwrite arbitrary files. Full Advisory: http://secunia.com/advisories/15087/ -- [SA15072] BK Forum SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-04-25 Diabolic Crab has reported some vulnerabilities in BK Forum, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/15072/ -- [SA15071] StorePortal SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-04-25 Diabolic Crab has reported some vulnerabilities in StorePortal, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/15071/ -- [SA15066] Asp Nuke Cross-Site Scripting and SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2005-04-25 Diabolic Crab has reported some vulnerabilities in Asp Nuke, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/15066/ -- [SA15057] OneWorldStore "chksettings.asp" Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2005-04-22 Lostmon has reported a vulnerability in OneWorldStore, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/15057/ -- [SA15055] CartWIZ Cross-Site Scripting and SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data, Exposure of system information Released: 2005-04-25 Diabolic Crab has reported some vulnerabilities in CartWIZ, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/15055/ -- [SA15052] Yawcam Web Server Directory Traversal Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2005-04-22 Donato Ferrante has reported a vulnerability in Yawcam, which can be exploited by malicious people to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/15052/ -- [SA15106] ACS Blog Unspecified Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-04-25 A vulnerability has been reported in ACS Blog, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/15106/ -- [SA15064] Microsoft Windows Image Rendering Denial of Service Vulnerability Critical: Less critical Where: From remote Impact: DoS Released: 2005-04-22 Andrew has discovered a vulnerability in Windows, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/15064/ -- [SA15085] Novell NSure Audit ASN.1 Message Parsing Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2005-04-25 Dennis Rand has reported a vulnerability in Novell NSure Audit, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/15085/ -- [SA15118] dBpowerAMP Music Converter Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-04-26 fRoGGz has discovered a vulnerability in dBpowerAMP Music Converter, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/15118/ -- [SA15076] BitDefender Insecure Program Execution Vulnerability Critical: Not critical Where: Local system Impact: Privilege escalation, DoS Released: 2005-04-26 fRoGGz has reported a vulnerability in BitDefender, which can be exploited by malicious, local users to disable the virus protection or gain escalated privileges. Full Advisory: http://secunia.com/advisories/15076/ UNIX/Linux:-- [SA15148] Debian update for lsh-utils Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2005-04-27 Debian has issued an update for lsh-utils. This fixes two vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15148/ -- [SA15146] Debian update for kdelibs Critical: Highly critical Where: From remote Impact: System access Released: 2005-04-27 Debian has issued an update for kdelibs. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15146/ -- [SA15139] Red Hat update for mozilla Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Exposure of system information, Exposure of sensitive information, System access Released: 2005-04-27 Red Hat has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to gain knowledge of potentially sensitive information, conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. Full Advisory: http://secunia.com/advisories/15139/ -- [SA15129] Gentoo update for xine-lib Critical: Highly critical Where: From remote Impact: System access Released: 2005-04-27 Gentoo has issued an update for xine-lib. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/15129/ -- [SA15122] HP-UX Mozilla Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Security Bypass, Exposure of system information, Exposure of sensitive information, DoS, System access Released: 2005-04-26 HP has acknowledged multiple vulnerabilities in Mozilla for HP-UX, which can be exploited by malicious people to cause a DoS (Denial of Service), gain knowledge of potentially sensitive information, bypass certain security restrictions, and compromise a user's system. Full Advisory: http://secunia.com/advisories/15122/ -- [SA15113] Sun Solaris Multiple libtiff Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2005-04-26 Sun has acknowledged some vulnerabilities in Solaris, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15113/ -- [SA15111] Red Hat update for openoffice Critical: Highly critical Where: From remote Impact: System access Released: 2005-04-26 Red Hat has issued an update for openoffice. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/15111/ -- [SA15096] Gentoo update for kdelibs Critical: Highly critical Where: From remote Impact: System access Released: 2005-04-25 Gentoo has issued an update for kdelibs. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15096/ -- [SA15095] Gentoo update for realplayer/helixplayer Critical: Highly critical Where: From remote Impact: System access Released: 2005-04-25 Gentoo has issued updates for realplayer and helixplayer. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/15095/ -- [SA15069] Slackware update for mozilla Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Exposure of system information, Exposure of sensitive information, System access Released: 2005-04-22 Slackware has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, gain knowledge of potentially sensitive information, and compromise a user's system. Full Advisory: http://secunia.com/advisories/15069/ -- [SA15065] xine-lib RTSP and MMS Streams Buffer Overflow Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2005-04-22 Some vulnerabilities have been reported in xine-lib, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/15065/ -- [SA15162] Fedora update for cyrus-imapd Critical: Moderately critical Where: From remote Impact: System access, DoS Released: 2005-04-28 Fedora has issued an update for cyrus-imapd. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15162/ -- [SA15131] Gentoo update for Convert-UUlib Critical: Moderately critical Where: From remote Impact: System access Released: 2005-04-27 Gentoo has issued an update for Convert-UUlib. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15131/ -- [SA15126] Debian CVS Password Protection Bypass and Denial of Service Critical: Moderately critical Where: From remote Impact: DoS, Security Bypass Released: 2005-04-27 Debian has issued an update for cvs. This fixes two vulnerabilities, which can be exploited by malicious people to bypass password protection or cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/15126/ -- [SA15123] HP-UX Unspecified TCP/IP Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2005-04-26 A vulnerability has been reported in HP-UX, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/15123/ -- [SA15117] Astaro update for kernel Critical: Moderately critical Where: From remote Impact: DoS Released: 2005-04-26 Astaro has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/15117/ -- [SA15114] Gentoo update for egroupware Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2005-04-26 Gentoo has issued an update for egroupware. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/15114/ -- [SA15112] Red Hat update for cvs Critical: Moderately critical Where: From remote Impact: System access, DoS, Unknown Released: 2005-04-26 Red Hat has issued an update for cvs. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15112/ -- [SA15102] NetIQ Security Manager Directory Traversal Security Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2005-04-25 NOTE: Based on information from the vendor, this is NOT a security issue in the mentioned product and the advisory has therefore been revoked. Full Advisory: http://secunia.com/advisories/15102/ -- [SA15099] SafeStone DetectIT Directory Traversal Security Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2005-04-25 Shalom Carmel has reported a security issue in SafeStone DetectIT, which can be exploited by malicious users to bypass certain restrictions. Full Advisory: http://secunia.com/advisories/15099/ -- [SA15097] Gentoo update for kdewebdev Critical: Moderately critical Where: From remote Impact: System access Released: 2005-04-25 Gentoo has issued an update for kdewebdev. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/15097/ -- [SA15094] PowerLock NetworkSecurity Directory Traversal Security Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2005-04-25 Shalom Carmel has reported a security issue in PowerLock NetworkSecurity, which can be exploited by malicious users to bypass certain restrictions. Full Advisory: http://secunia.com/advisories/15094/ -- [SA15092] Red Hat update for kernel Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information, Privilege escalation, DoS Released: 2005-04-25 Red Hat has issued an update for the kernel. This fixes multiple vulnerabilities, which can be exploited to gain knowledge of potentially sensitive information, cause a DoS (Denial of Service), or gain escalated privileges. Full Advisory: http://secunia.com/advisories/15092/ -- [SA15091] Bsafe/Global Security for iSeries Directory Traversal Security Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2005-04-25 Shalom Carmel has reported a security issue in Bsafe/Global Security for iSeries, which can be exploited by malicious users to bypass certain restrictions. Full Advisory: http://secunia.com/advisories/15091/ -- [SA15090] FreeBSD update for cvs Critical: Moderately critical Where: From remote Impact: Unknown, DoS, System access Released: 2005-04-25 FreeBSD has issued an update for cvs. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15090/ -- [SA15088] Castlehill Computer Services SECURE/NET Directory Traversal Security Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2005-04-25 Shalom Carmel has reported a security issue in Castlehill Computer Services SECURE/NET, which can be exploited by malicious users to bypass certain restrictions. Full Advisory: http://secunia.com/advisories/15088/ -- [SA15070] Slackware update for python Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data, Exposure of sensitive information, System access Released: 2005-04-22 Slackware has issued an update for python. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/15070/ -- [SA15063] RazLee Firewall+++ Directory Traversal Security Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2005-04-25 Shalom Carmel has reported a security issue in RazLee Firewall+++, which can be exploited by malicious users to bypass certain restrictions. Full Advisory: http://secunia.com/advisories/15063/ -- [SA15061] Slackware update for cvs Critical: Moderately critical Where: From remote Impact: Unknown, DoS, System access Released: 2005-04-22 Slackware has issued an update for cvs. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15061/ -- [SA15060] KDE Kommander Arbitrary Code Execution Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2005-04-22 Eckhart Wörner has reported a vulnerability in KDE, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/15060/ -- [SA15056] Trustix update for cvs Critical: Moderately critical Where: From remote Impact: Unknown, DoS, System access Released: 2005-04-22 Trustix has issued an update for cvs. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15056/ -- [SA15053] Debian update for junkbuster Critical: Moderately critical Where: From remote Impact: Manipulation of data, DoS, System access Released: 2005-04-22 Debian has issued an update for junkbuster. This fixes two vulnerabilities, which can be exploited by malicious people to manipulate certain information, cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15053/ -- [SA15120] Snmppd Logging Functionality Format String Vulnerability Critical: Moderately critical Where: From local network Impact: System access Released: 2005-04-26 dong-houn you has reported a vulnerability in Snmppd, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15120/ -- [SA15157] Conectiva update for squid Critical: Less critical Where: From remote Impact: Exposure of sensitive information Released: 2005-04-28 Conectiva has issued an update for squid. This fixes a security issue, which may disclose sensitive information to malicious people. Full Advisory: http://secunia.com/advisories/15157/ -- [SA15144] Ethereal RSVP Protocol Decoding Denial of Service Vulnerability Critical: Less critical Where: From remote Impact: DoS Released: 2005-04-27 Vade79 has reported a vulnerability in Ethereal, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/15144/ -- [SA15125] tcpdump Multiple Denial of Service Vulnerabilities Critical: Less critical Where: From remote Impact: DoS Released: 2005-04-27 Vade79 has reported some vulnerabilities in tcpdump, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/15125/ -- [SA15119] SqWebMail "redirect" HTTP Response Splitting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-04-26 Zinho has reported a vulnerability in SqWebMail, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/15119/ -- [SA15082] Forwards Parent Frame Page Title Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-04-25 A vulnerability has been reported in Forwards, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/15082/ -- [SA15081] Accounts Parent Frame Page Title Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-04-25 A vulnerability has been reported in Accounts, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/15081/ -- [SA15080] Kronolith Parent Frame Page Title Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-04-25 A vulnerability has been reported in Kronolith, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/15080/ -- [SA15079] Nag Parent Frame Page Title Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-04-25 A vulnerability has been reported in Nag, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/15079/ -- [SA15078] Mnemo Parent Frame Page Title Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-04-25 A vulnerability has been reported in Mnemo, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/15078/ -- [SA15077] Horde IMP Parent Frame Page Title Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-04-25 A vulnerability has been reported in Horde IMP, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/15077/ -- [SA15075] Passwd Parent Frame Page Title Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-04-25 A vulnerability has been reported in Passwd, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/15075/ -- [SA15074] Turba Parent Frame Page Title Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-04-25 A vulnerability has been reported in Turba, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/15074/ -- [SA15073] Vacation Parent Frame Page Title Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-04-25 A vulnerability has been reported in Vacation, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/15073/ -- [SA15115] Trustix update for postgresql Critical: Less critical Where: From local network Impact: Privilege escalation Released: 2005-04-26 Trustix has issued an update for postgresql. This fixes some vulnerabilities, which can be exploited by malicious users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/15115/ -- [SA15098] BIG-IP / 3-DNS Radius Authentication "login_radius" Security Bypass Critical: Less critical Where: From local network Impact: Security Bypass Released: 2005-04-25 The vendor has acknowledged a vulnerability in BIG-IP and 3-DNS, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/15098/ -- [SA15132] Gentoo update for rkhunter Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-04-27 Gentoo has issued an update for rkhunter. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/15132/ -- [SA15127] Rootkit Hunter Insecure Temporary File Creation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-04-27 Sune Kloppenborg Jeppesen and Tavis Ormandy has reported some vulnerabilities in Rootkit Hunter, which potentially can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/15127/ -- [SA15086] Affix "affix_sock_register()" Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-04-25 Kevin Finisterre has reported a vulnerability in Affix, which may be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/15086/ -- [SA15051] Gentoo update for openmosixview Critical: Less critical Where: Local system Impact: Manipulation of data, Privilege escalation Released: 2005-04-22 Gentoo has issued an update for openmosixview. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/15051/ -- [SA15163] Conectiva update for gaim Critical: Not critical Where: From remote Impact: DoS Released: 2005-04-28 Conectiva has issued an update for gaim. This fixes some weaknesses, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/15163/ -- [SA15151] Fedora update for imagemagick Critical: Not critical Where: From remote Impact: DoS Released: 2005-04-28 Fedora has issued an update for imagemagick. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/15151/ -- [SA15149] Debian update for gaim Critical: Not critical Where: From remote Impact: DoS Released: 2005-04-27 Debian has issued an update for gaim. This fixes a weakness, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/15149/ -- [SA15124] ImageMagick PNM Image Decoding Buffer Overflow Vulnerability Critical: Not critical Where: From remote Impact: DoS Released: 2005-04-27 Damian Put has reported a vulnerability in ImageMagick, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/15124/ -- [SA15059] Slackware update for gaim Critical: Not critical Where: From remote Impact: DoS Released: 2005-04-22 Slackware has issued an update for gaim. This fixes some weaknesses, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/15059/ -- [SA15138] Red Hat update for sharutils Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2005-04-27 Red Hat has issued an update for sharutils. This fixes a vulnerability, which potentially can be exploited by malicious, local users to conduct certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/15138/ Other: Cross Platform:-- [SA15133] GrayCMS "path_prefix" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2005-04-27 Kold has reported a vulnerability in GrayCMS, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15133/ -- [SA15107] yappa-ng Cross-Site Scripting and File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: Cross Site Scripting, System access Released: 2005-04-26 James Bercegay has reported some vulnerabilities in yappa-ng, which can be exploited by malicious people to conduct cross-site scripting attacks and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15107/ -- [SA15054] WebAPP E-Cart Module Shell Command Injection Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2005-04-22 SoulBlack has reported a vulnerability in the E-Cart module for WebAPP, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15054/ -- [SA15147] PHPCart Price Manipulation Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-04-27 Lostmon has reported a vulnerability in PHPCart, which can be exploited by malicious people to manipulate orders. Full Advisory: http://secunia.com/advisories/15147/ -- [SA15145] Serendipity Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Unknown, Cross Site Scripting, Manipulation of data Released: 2005-04-27 Some vulnerabilities have been reported in Serendipity, where some have unknown impacts and others, which potentially can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/15145/ -- [SA15141] phpMyVisites "mylang" Local File Inclusion Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2005-04-27 Max Cerny has reported a vulnerability in phpMyVisites, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/15141/ -- [SA15130] Perl Convert::UUlib Module Buffer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2005-04-27 A vulnerability has been reported in the Convert::UUlib module for Perl, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15130/ -- [SA15116] PHP-Calendar SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-04-27 A vulnerability has been reported in PHP-Calendar, which potentially can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/15116/ -- [SA15109] MaxDB Web Administration Service Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From local network Impact: System access Released: 2005-04-26 Three vulnerabilities have been reported in MaxDB, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/15109/ -- [SA15121] Confixx "change user" SQL Injection Vulnerability Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2005-04-26 Erich Klaus has reported a vulnerability in Confixx, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/15121/ -- [SA15110] VooDoo cIRCle BOTNET Buffer Overflow Vulnerability Critical: Less critical Where: From remote Impact: DoS Released: 2005-04-26 A vulnerability has been reported in VooDoo cIRCle, which can be exploited by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/15110/ -- [SA15084] phpMyVisites Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-04-25 benjilenoob has reported some vulnerabilities in phpMyVisites, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/15084/ -- [SA15083] Chora Parent Frame Page Title Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-04-25 A vulnerability has been reported in Chora, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/15083/ -- [SA15067] IBM WebSphere Application Server Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-04-25 Dr_insane has reported a vulnerability in IBM WebSphere Application Server, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/15067/ -- [SA15058] Woltlab Burning Board Two Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-04-25 Two vulnerabilities have been reported in Woltlab Burning Board, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/15058/ -- [SA15050] Macromedia ColdFusion Error Page Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-04-26 Dr_insane has discovered a vulnerability in Macromedia ColdFusion, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/15050/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _________________________________________ InfoSec News v2.0 - Coming Soon! http://www.infosecnews.org
This archive was generated by hypermail 2.1.3 : Fri Apr 29 2005 - 07:39:40 PDT