======================================================================== The Secunia Weekly Advisory Summary 2005-10-13 - 2005-10-20 This week : 69 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: The Secunia staff is spending hours every day to assure you the best and most reliable source for vulnerability information. Every single vulnerability report is being validated and verified before a Secunia advisory is written. Secunia validates and verifies vulnerability reports in many different ways e.g. by downloading the software and performing comprehensive tests, by reviewing source code, or by validating the credibility of the source from which the vulnerability report was issued. As a result, Secunia's database is the most correct and complete source for recent vulnerability information available on the Internet. Secunia Online Vulnerability Database: http://secunia.com/ ======================================================================== 2) This Week in Brief: Neel Mehta has reported a vulnerability in Snort, which can be exploited by malicious people to compromise a vulnerable system. What makes this vulnerability particular dangerous is that it may be exploited by sending a single specially crafted UDP packet to a vulnerable system. Users of Snort are advised to update to the latest version. Reference: http://secunia.com/SA17220 -- 85 vulnerabilities have been reported in various Oracle products. Some have an unknown impact, and others can be exploited to conduct PL/SQL injection attacks, cross-site scripting attacks, or potentially to compromise a vulnerable system. Details about some of the vulnerabilities may be found in the referenced Secunia advisory. The advisory will be continuously updated when more information becomes available. Reference: http://secunia.com/SA17250 -- A vulnerability has been discovered in the popular text-based browser Lynx, which can be exploited to compromise a vulnerable system. For additional details please view the referenced Secunia advisory. Reference: http://secunia.com/SA17216 VIRUS ALERTS: Secunia has not issued any virus alerts during the week. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA17071] Mozilla Firefox Iframe Size Denial of Service Weakness 2. [SA17167] Microsoft Collaboration Data Objects Buffer Overflow Vulnerability 3. [SA16480] Microsoft Windows COM Object Instantiation Memory Corruption Vulnerability 4. [SA15601] Mozilla / Mozilla Firefox Frame Injection Vulnerability 5. [SA17250] Oracle Products 85 Unspecified Vulnerabilities 6. [SA12758] Microsoft Word Document Parsing Buffer Overflow Vulnerabilities 7. [SA17062] UW-imapd Mailbox Name Parsing Buffer Overflow Vulnerability 8. [SA17220] Snort Back Orifice Pre-Processor Buffer Overflow Vulnerability 9. [SA17138] BEA WebLogic 24 Vulnerabilities and Security Issues 10. [SA17183] McAfee Anti-Virus Engine Malformed ARJ Archive Virus Detection Bypass ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA17223] Nortel Centrex IP Client Manager Multiple Vulnerabilities [SA17240] MailSite Express Attachment Upload Vulnerability [SA17214] IBM TotalStorage SAN Volume Controller PuTTY Vulnerability [SA17219] Comersus Power Pack Premium Cross-Site Scripting Vulnerabilities [SA17196] Typsoft FTP Server Denial of Service Vulnerability [SA17188] Kaspersky Anti-Virus Engine Malformed Archives Virus Detection Bypass [SA17186] AVG Anti-Virus Engine Malformed ARJ Archive Virus Detection Bypass UNIX/Linux: [SA17248] Fedora update for lynx [SA17238] Gentoo update for lynx [SA17235] Sun Solaris Multiple Mozilla Vulnerabilities [SA17231] Red Hat update for lynx [SA17230] Ubuntu update for lynx [SA17220] Snort Back Orifice Pre-Processor Buffer Overflow Vulnerability [SA17216] Lynx "HTrjis()" NNTP Buffer Overflow Vulnerability [SA17212] Fedora update for koffice [SA17190] Gentoo update for koffice/kword [SA17257] Avaya Products BFD Integer Overflow Vulnerability [SA17256] Red Hat update for netpbm [SA17252] Avaya Intuity LX Two Vulnerabilities [SA17247] Fedora update for wget [SA17236] Sun Solaris Network Security Services (NSS) Security Tools Zlib Vulnerability [SA17234] Gentoo update for phpmyadmin [SA17233] Red Hat update for openldap / nss_ldap [SA17228] Fedora update for curl [SA17222] Ubuntu update for netpbm [SA17221] NetPBM "pnmtopng" Stack Corruption Vulnerability [SA17215] SUSE Updates for Multiple Packages [SA17213] Fedora update for abiword [SA17208] Ubuntu update for libcurl2/libcurl3 [SA17206] Red Hat update for xloadimage [SA17203] Mandrake update for curl [SA17200] Ubuntu update for abiword [SA17199] AbiWord RTF Importer Buffer Overflow Vulnerabilities [SA17193] cURL/libcURL NTLM Username Handling Buffer Overflow Vulnerability [SA17192] wget NTLM Username Handling Buffer Overflow Vulnerability [SA17244] SUSE update for OpenWBEM [SA17245] Ubuntu update for openssh-server [SA17210] Fedora update for openssl/openssl096b/openssl097a [SA17191] Slackware update for openssl [SA17189] Ubuntu update for openssl [SA17217] Avaya Modular Messaging ucd-snmp Denial of Service Vulnerability [SA17258] Avaya CMS Solaris X11 Pixmap Creation Integer Overflow Vulnerability [SA17249] Avaya CMS / IR Solaris UFS File System Denial of Service [SA17246] Avaya CMS / IR Solaris Xsun and Xprt Privilege Escalation Vulnerability [SA17241] Gentoo update for spe [SA17232] Gentoo update for perl / qt-unixodbc / cmake [SA17226] Linux Kernel Console Keyboard Mapping Shell Command Injection [SA17224] Stani's Python Editor Insecure Default File Permissions [SA17211] Fedora update for texinfo [SA17209] Flexbackup Insecure Temporary File Creation [SA17207] Ubuntu update for graphviz [SA17202] AIX LSCFG Insecure Temporary File Handling Vulnerability [SA17194] XMail Command Line Buffer Overflow Vulnerability [SA17187] Debian update for hylafax [SA17242] YIFF Sound Systems Arbitrary File Playback Weakness [SA17229] Ubuntu update for php [SA17198] Sun Solaris SCTP Denial of Service Weaknesses [SA17195] HP-UX Unspecified Denial of Service Weakness Other: [SA17255] Nortel Threat Protection System Back Orifice Pre-Processor Buffer Overflow Cross Platform: [SA17237] e107 "a_name" SQL Injection Vulnerability [SA17201] W-Agora Local File Inclusion and File Upload Vulnerabilities [SA17250] Oracle Products 85 Unspecified Vulnerabilities [SA17243] Xerver Multiple Vulnerabilities [SA17227] PunBB "old_searches" SQL Injection Vulnerability [SA17225] Network Security Services (NSS) Library Zlib Vulnerability [SA17205] Gallery "g2_itemId" Disclosure of Sensitive Information [SA17253] ManageEngine NetFlow Analyzer "grDisp" Cross-Site Scripting [SA17197] BitDefender Anti-Virus Engine Malformed Archives Virus Detection Bypass [SA17204] iTunes Shared Music Potential Denial of Service ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA17223] Nortel Centrex IP Client Manager Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Privilege escalation, DoS, System access Released: 2005-10-18 Nortel Networks has acknowledged multiple vulnerabilities in Centrex IP Client Manager, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges, and by malicious people to cause a DoS (Denial of Service) or compromise a user's system. Full Advisory: http://secunia.com/advisories/17223/ -- [SA17240] MailSite Express Attachment Upload Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-18 Soroush dalili has discovered a vulnerability in MailSite Express, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17240/ -- [SA17214] IBM TotalStorage SAN Volume Controller PuTTY Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-17 IBM has acknowledged a vulnerability in TotalStorage SAN Volume Controller, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17214/ -- [SA17219] Comersus Power Pack Premium Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-10-17 Lostmon has reported a vulnerability in BackOffice Plus included in Comersus Power Pack Premium, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17219/ -- [SA17196] Typsoft FTP Server Denial of Service Vulnerability Critical: Less critical Where: From remote Impact: DoS Released: 2005-10-14 Donnie Werner has discovered a vulnerability in Typsoft FTP, which can be exploited by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/17196/ -- [SA17188] Kaspersky Anti-Virus Engine Malformed Archives Virus Detection Bypass Critical: Not critical Where: From remote Impact: Security Bypass Released: 2005-10-13 fRoGGz has reported a weakness in Kaspersky Anti-Virus scan engine, which can be exploited by malware to bypass certain scanning functionality. Full Advisory: http://secunia.com/advisories/17188/ -- [SA17186] AVG Anti-Virus Engine Malformed ARJ Archive Virus Detection Bypass Critical: Not critical Where: From remote Impact: Security Bypass Released: 2005-10-13 fRoGGz has discovered a weakness in AVG Anti-Virus scan engine, which can be exploited by malware to bypass certain scanning functionality. Full Advisory: http://secunia.com/advisories/17186/ UNIX/Linux:-- [SA17248] Fedora update for lynx Critical: Highly critical Where: From remote Impact: System access Released: 2005-10-18 Fedora has issued an update for lynx. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17248/ -- [SA17238] Gentoo update for lynx Critical: Highly critical Where: From remote Impact: System access Released: 2005-10-18 Gentoo has issued an update for lynx. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17238/ -- [SA17235] Sun Solaris Multiple Mozilla Vulnerabilities Critical: Highly critical Where: From remote Impact: Spoofing, System access Released: 2005-10-17 Sun Microsystems has acknowledged some vulnerabilities in Solaris, which can be exploited by malicious people to spoof the contents of web sites or to compromise a user's system. Full Advisory: http://secunia.com/advisories/17235/ -- [SA17231] Red Hat update for lynx Critical: Highly critical Where: From remote Impact: System access Released: 2005-10-17 Red Hat has issued an update for lynx. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17231/ -- [SA17230] Ubuntu update for lynx Critical: Highly critical Where: From remote Impact: System access Released: 2005-10-17 Ubuntu has issued an update for lynx. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17230/ -- [SA17220] Snort Back Orifice Pre-Processor Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2005-10-18 Neel Mehta has reported a vulnerability in Snort, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17220/ -- [SA17216] Lynx "HTrjis()" NNTP Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2005-10-17 Ulf Harnhammar has reported a vulnerability in Lynx, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17216/ -- [SA17212] Fedora update for koffice Critical: Highly critical Where: From remote Impact: System access Released: 2005-10-17 Fedora has issue an update for koffice. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17212/ -- [SA17190] Gentoo update for koffice/kword Critical: Highly critical Where: From remote Impact: System access Released: 2005-10-14 Gentoo has issued updates for koffice and kword. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17190/ -- [SA17257] Avaya Products BFD Integer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-19 Avaya has acknowledged a vulnerability in various products, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17257/ -- [SA17256] Red Hat update for netpbm Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2005-10-19 Red Hat has issued an update for netpbm. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system. Full Advisory: http://secunia.com/advisories/17256/ -- [SA17252] Avaya Intuity LX Two Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2005-10-19 Avaya has acknowledged a security issue and a vulnerability in Intuity LX, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17252/ -- [SA17247] Fedora update for wget Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-18 Fedora has issued an update for wget. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17247/ -- [SA17236] Sun Solaris Network Security Services (NSS) Security Tools Zlib Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2005-10-17 Sun Microsystems has acknowledged a vulnerability in Solaris and Sun Java Enterprise System, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system. Full Advisory: http://secunia.com/advisories/17236/ -- [SA17234] Gentoo update for phpmyadmin Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2005-10-18 Gentoo has issued an update for phpmyadmin. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/17234/ -- [SA17233] Red Hat update for openldap / nss_ldap Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of sensitive information Released: 2005-10-17 Red Hat has issued updates for openldap / nss_ldap. This fixes two security issues and a vulnerability, which can be exploit by malicious people to gain knowledge of sensitive information or bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/17233/ -- [SA17228] Fedora update for curl Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-19 Fedora has issued an update for curl. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17228/ -- [SA17222] Ubuntu update for netpbm Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2005-10-19 Ubuntu has issued an update for netpbm. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system. Full Advisory: http://secunia.com/advisories/17222/ -- [SA17221] NetPBM "pnmtopng" Stack Corruption Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2005-10-19 Bastien Nocera has reported a vulnerability in NetPBM, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system. Full Advisory: http://secunia.com/advisories/17221/ -- [SA17215] SUSE Updates for Multiple Packages Critical: Moderately critical Where: From remote Impact: Privilege escalation, DoS, System access Released: 2005-10-17 SUSE has issued updates for multiple packages. These fix various vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges, by malicious users to cause a DoS (Denial of Service), and by malicious people to potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/17215/ -- [SA17213] Fedora update for abiword Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-17 Fedora has issued an update for abiword. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17213/ -- [SA17208] Ubuntu update for libcurl2/libcurl3 Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-17 Ubuntu has issued an update for libcurl2/libcurl3. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17208/ -- [SA17206] Red Hat update for xloadimage Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-19 Red Hat has issued an update for xloadimage. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17206/ -- [SA17203] Mandrake update for curl Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-14 Mandriva has issued an update for curl. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17203/ -- [SA17200] Ubuntu update for abiword Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-14 Ubuntu has issued an update for abiword. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17200/ -- [SA17199] AbiWord RTF Importer Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-14 Chris Evans has reported some vulnerabilities in Abiword, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17199/ -- [SA17193] cURL/libcURL NTLM Username Handling Buffer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-14 A vulnerability has been reported in cURL/libcURL, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17193/ -- [SA17192] wget NTLM Username Handling Buffer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-14 A vulnerability has been reported in wget, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17192/ -- [SA17244] SUSE update for OpenWBEM Critical: Moderately critical Where: From local network Impact: System access Released: 2005-10-18 SUSE has issued an update for OpenWBEM. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17244/ -- [SA17245] Ubuntu update for openssh-server Critical: Less critical Where: From remote Impact: Privilege escalation Released: 2005-10-18 Ubuntu has issued an update for openssh-server. This fixes a security issue, which can be exploited malicious users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/17245/ -- [SA17210] Fedora update for openssl/openssl096b/openssl097a Critical: Less critical Where: From remote Impact: Security Bypass Released: 2005-10-17 Fedora has issued updates for openssl/openssl096b/openssl097a. These fix a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/17210/ -- [SA17191] Slackware update for openssl Critical: Less critical Where: From remote Impact: Security Bypass Released: 2005-10-14 Slackware has issued an update for openssl. This fixes a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/17191/ -- [SA17189] Ubuntu update for openssl Critical: Less critical Where: From remote Impact: Security Bypass Released: 2005-10-14 Ubuntu has issued an update for openssl. This fixes a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/17189/ -- [SA17217] Avaya Modular Messaging ucd-snmp Denial of Service Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2005-10-19 Avaya has acknowledged a vulnerability in Avaya Modular Messaging, which can be exploited by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/17217/ -- [SA17258] Avaya CMS Solaris X11 Pixmap Creation Integer Overflow Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-10-19 Avaya has acknowledged a vulnerability in CMS, which potentially can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/17258/ -- [SA17249] Avaya CMS / IR Solaris UFS File System Denial of Service Critical: Less critical Where: Local system Impact: DoS Released: 2005-10-19 Avaya has acknowledged a vulnerability in CMS and IR, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/17249/ -- [SA17246] Avaya CMS / IR Solaris Xsun and Xprt Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-10-19 Avaya has acknowledged a vulnerability in CMS and IR, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/17246/ -- [SA17241] Gentoo update for spe Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-10-17 Gentoo has issued an update for SPE. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/17241/ -- [SA17232] Gentoo update for perl / qt-unixodbc / cmake Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-10-17 Gentoo has issued updates for perl / qt-unixodbc / cmake. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/17232/ -- [SA17226] Linux Kernel Console Keyboard Mapping Shell Command Injection Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-10-17 Rudolf Polzer has reported a vulnerability in the Linux Kernel, which potentially can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/17226/ -- [SA17224] Stani's Python Editor Insecure Default File Permissions Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-10-17 Bryan Ostergaard has reported a security issue in Stani's Python Editor (SPE), which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/17224/ -- [SA17211] Fedora update for texinfo Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-10-17 Fedora has issued an update for texinfo. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/17211/ -- [SA17209] Flexbackup Insecure Temporary File Creation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-10-17 Eric Romang has reported a vulnerability in Flexbackup, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/17209/ -- [SA17207] Ubuntu update for graphviz Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-10-17 Ubuntu has issued an update for graphviz. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/17207/ -- [SA17202] AIX LSCFG Insecure Temporary File Handling Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-10-14 A vulnerability has been reported in AIX, which potentially can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/17202/ -- [SA17194] XMail Command Line Buffer Overflow Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-10-14 A vulnerability has been reported in XMail, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/17194/ -- [SA17187] Debian update for hylafax Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-10-13 Debian has issued an update for hylafax. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/17187/ -- [SA17242] YIFF Sound Systems Arbitrary File Playback Weakness Critical: Not critical Where: Local system Impact: Security Bypass Released: 2005-10-19 Javier Fernandez-Sanguino Pena has discovered a weakness in YIFF Sound Systems, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/17242/ -- [SA17229] Ubuntu update for php Critical: Not critical Where: Local system Impact: Security Bypass Released: 2005-10-17 Ubuntu has issued an update for php. This fixes a security issue, which can be exploited by malicious, local users to access certain files outside the "open_basedir" root. Full Advisory: http://secunia.com/advisories/17229/ -- [SA17198] Sun Solaris SCTP Denial of Service Weaknesses Critical: Not critical Where: Local system Impact: DoS Released: 2005-10-14 Some weaknesses have been reported in Solaris, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/17198/ -- [SA17195] HP-UX Unspecified Denial of Service Weakness Critical: Not critical Where: Local system Impact: DoS Released: 2005-10-14 A weakness has been reported in HP-UX, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/17195/ Other:-- [SA17255] Nortel Threat Protection System Back Orifice Pre-Processor Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2005-10-19 Nortel Networks has acknowledged a vulnerability in two Threat Protection System products, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17255/ Cross Platform:-- [SA17237] e107 "a_name" SQL Injection Vulnerability Critical: Highly critical Where: From remote Impact: Security Bypass, Manipulation of data, System access Released: 2005-10-19 rgod has reported a vulnerability in e107, which can be exploited by malicious people to conduct SQL injection attacks and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17237/ -- [SA17201] W-Agora Local File Inclusion and File Upload Vulnerabilities Critical: Highly critical Where: From remote Impact: Exposure of sensitive information, System access Released: 2005-10-17 rgod has discovered some vulnerabilities in W-Agora, which can be exploited by malicious people to disclose sensitive information and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17201/ -- [SA17250] Oracle Products 85 Unspecified Vulnerabilities Critical: Moderately critical Where: From remote Impact: Unknown, Cross Site Scripting, Manipulation of data, System access Released: 2005-10-19 85 vulnerabilities have been reported in various Oracle products. Some have an unknown impact, and others can be exploited to conduct PL/SQL injection attacks, cross-site scripting attacks, or potentially to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17250/ -- [SA17243] Xerver Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Exposure of system information, Exposure of sensitive information Released: 2005-10-19 Ziv Kamir has reported some vulnerabilities in Xerver, which can be exploited by malicious people to conduct cross-site scripting attacks, and disclose system and sensitive information. Full Advisory: http://secunia.com/advisories/17243/ -- [SA17227] PunBB "old_searches" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-10-17 Devil_box has reported a vulnerability in PunBB, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17227/ -- [SA17225] Network Security Services (NSS) Library Zlib Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2005-10-17 A vulnerability has been reported in Network Security Services (NSS), which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17225/ -- [SA17205] Gallery "g2_itemId" Disclosure of Sensitive Information Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2005-10-17 A vulnerability has been reported in Gallery, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/17205/ -- [SA17253] ManageEngine NetFlow Analyzer "grDisp" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-10-19 "Why" has discovered a vulnerability in ManageEngine NetFlow Analyzer, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17253/ -- [SA17197] BitDefender Anti-Virus Engine Malformed Archives Virus Detection Bypass Critical: Not critical Where: From remote Impact: Security Bypass Released: 2005-10-14 fRoGGz has reported a weakness in BitDefender Anti-Virus scan engine, which can be exploited by malware to bypass certain scanning functionality. Full Advisory: http://secunia.com/advisories/17197/ -- [SA17204] iTunes Shared Music Potential Denial of Service Critical: Not critical Where: From local network Impact: DoS Released: 2005-10-17 Seth Fogie has reported a security issue in iTunes, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/17204/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _________________________________________ InfoSec News v2.0 - Coming Soon! http://www.infosecnews.org
This archive was generated by hypermail 2.1.3 : Fri Oct 21 2005 - 13:22:53 PDT