[ISN] Secunia Weekly Summary - Issue: 2005-42

From: InfoSec News (isn@private)
Date: Fri Oct 21 2005 - 13:07:28 PDT


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2005-10-13 - 2005-10-20                        

                       This week : 69 advisories                       

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

The Secunia staff is spending hours every day to assure you the best
and most reliable source for vulnerability information. Every single 
vulnerability report is being validated and verified before a Secunia
advisory is written.

Secunia validates and verifies vulnerability reports in many different
ways e.g. by downloading the software and performing comprehensive
tests, by reviewing source code, or by validating the credibility of
the source from which the vulnerability report was issued.

As a result, Secunia's database is the most correct and complete source
for recent vulnerability information available on the Internet.

Secunia Online Vulnerability Database:
http://secunia.com/

========================================================================
2) This Week in Brief:

Neel Mehta has reported a vulnerability in Snort, which can be
exploited by malicious people to compromise a vulnerable system.

What makes this vulnerability particular dangerous is that it may
be exploited by sending a single specially crafted UDP packet to a
vulnerable system.

Users of Snort are advised to update to the latest version.

Reference:
http://secunia.com/SA17220

--

85 vulnerabilities have been reported in various Oracle products. Some
have an unknown impact, and others can be exploited to conduct PL/SQL
injection attacks, cross-site scripting attacks, or potentially to
compromise a vulnerable system.

Details about some of the vulnerabilities may be found in the
referenced Secunia advisory. The advisory will be continuously updated
when more information becomes available.

Reference:
http://secunia.com/SA17250

--

A vulnerability has been discovered in the popular text-based browser
Lynx, which can be exploited to compromise a vulnerable system.

For additional details please view the referenced Secunia advisory.

Reference:
http://secunia.com/SA17216


VIRUS ALERTS:

Secunia has not issued any virus alerts during the week.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA17071] Mozilla Firefox Iframe Size Denial of Service Weakness
2.  [SA17167] Microsoft Collaboration Data Objects Buffer Overflow
              Vulnerability
3.  [SA16480] Microsoft Windows COM Object Instantiation Memory
              Corruption Vulnerability
4.  [SA15601] Mozilla / Mozilla Firefox Frame Injection Vulnerability
5.  [SA17250] Oracle Products 85 Unspecified Vulnerabilities
6.  [SA12758] Microsoft Word Document Parsing Buffer Overflow
              Vulnerabilities
7.  [SA17062] UW-imapd Mailbox Name Parsing Buffer Overflow
              Vulnerability
8.  [SA17220] Snort Back Orifice Pre-Processor Buffer Overflow
              Vulnerability
9.  [SA17138] BEA WebLogic 24 Vulnerabilities and Security Issues
10. [SA17183] McAfee Anti-Virus Engine Malformed ARJ Archive Virus
              Detection Bypass

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA17223] Nortel Centrex IP Client Manager Multiple Vulnerabilities
[SA17240] MailSite Express Attachment Upload Vulnerability
[SA17214] IBM TotalStorage SAN Volume Controller PuTTY Vulnerability
[SA17219] Comersus Power Pack Premium Cross-Site Scripting
Vulnerabilities
[SA17196] Typsoft FTP Server Denial of Service Vulnerability
[SA17188] Kaspersky Anti-Virus Engine Malformed Archives Virus
Detection Bypass
[SA17186] AVG Anti-Virus Engine Malformed ARJ Archive Virus Detection
Bypass

UNIX/Linux:
[SA17248] Fedora update for lynx
[SA17238] Gentoo update for lynx
[SA17235] Sun Solaris Multiple Mozilla Vulnerabilities
[SA17231] Red Hat update for lynx
[SA17230] Ubuntu update for lynx
[SA17220] Snort Back Orifice Pre-Processor Buffer Overflow
Vulnerability
[SA17216] Lynx "HTrjis()" NNTP Buffer Overflow Vulnerability
[SA17212] Fedora update for koffice
[SA17190] Gentoo update for koffice/kword
[SA17257] Avaya Products BFD Integer Overflow Vulnerability
[SA17256] Red Hat update for netpbm
[SA17252] Avaya Intuity LX Two Vulnerabilities
[SA17247] Fedora update for wget
[SA17236] Sun Solaris Network Security Services (NSS) Security Tools
Zlib Vulnerability
[SA17234] Gentoo update for phpmyadmin
[SA17233] Red Hat update for openldap / nss_ldap
[SA17228] Fedora update for curl
[SA17222] Ubuntu update for netpbm
[SA17221] NetPBM "pnmtopng" Stack Corruption Vulnerability
[SA17215] SUSE Updates for Multiple Packages
[SA17213] Fedora update for abiword
[SA17208] Ubuntu update for libcurl2/libcurl3
[SA17206] Red Hat update for xloadimage
[SA17203] Mandrake update for curl
[SA17200] Ubuntu update for abiword
[SA17199] AbiWord RTF Importer Buffer Overflow Vulnerabilities
[SA17193] cURL/libcURL NTLM Username Handling Buffer Overflow
Vulnerability
[SA17192] wget NTLM Username Handling Buffer Overflow Vulnerability
[SA17244] SUSE update for OpenWBEM
[SA17245] Ubuntu update for openssh-server
[SA17210] Fedora update for openssl/openssl096b/openssl097a
[SA17191] Slackware update for openssl
[SA17189] Ubuntu update for openssl
[SA17217] Avaya Modular Messaging ucd-snmp Denial of Service
Vulnerability
[SA17258] Avaya CMS Solaris X11 Pixmap Creation Integer Overflow
Vulnerability
[SA17249] Avaya CMS / IR Solaris UFS File System Denial of Service
[SA17246] Avaya CMS / IR Solaris Xsun and Xprt Privilege Escalation
Vulnerability
[SA17241] Gentoo update for spe
[SA17232] Gentoo update for perl / qt-unixodbc / cmake
[SA17226] Linux Kernel Console Keyboard Mapping Shell Command
Injection
[SA17224] Stani's Python Editor Insecure Default File Permissions
[SA17211] Fedora update for texinfo
[SA17209] Flexbackup Insecure Temporary File Creation
[SA17207] Ubuntu update for graphviz
[SA17202] AIX LSCFG Insecure Temporary File Handling Vulnerability
[SA17194] XMail Command Line Buffer Overflow Vulnerability
[SA17187] Debian update for hylafax
[SA17242] YIFF Sound Systems Arbitrary File Playback Weakness
[SA17229] Ubuntu update for php
[SA17198] Sun Solaris SCTP Denial of Service Weaknesses
[SA17195] HP-UX Unspecified Denial of Service Weakness

Other:
[SA17255] Nortel Threat Protection System Back Orifice Pre-Processor
Buffer Overflow

Cross Platform:
[SA17237] e107 "a_name" SQL Injection Vulnerability
[SA17201] W-Agora Local File Inclusion and File Upload Vulnerabilities
[SA17250] Oracle Products 85 Unspecified Vulnerabilities
[SA17243] Xerver Multiple Vulnerabilities
[SA17227] PunBB "old_searches" SQL Injection Vulnerability
[SA17225] Network Security Services (NSS) Library Zlib Vulnerability
[SA17205] Gallery "g2_itemId" Disclosure of Sensitive Information
[SA17253] ManageEngine NetFlow Analyzer "grDisp" Cross-Site Scripting
[SA17197] BitDefender Anti-Virus Engine Malformed Archives Virus
Detection Bypass
[SA17204] iTunes Shared Music Potential Denial of Service

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA17223] Nortel Centrex IP Client Manager Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Privilege escalation, DoS, System access
Released:    2005-10-18

Nortel Networks has acknowledged multiple vulnerabilities in Centrex IP
Client Manager, which can be exploited by malicious, local users to
cause a DoS (Denial of Service) and gain escalated privileges, and by
malicious people to cause a DoS (Denial of Service) or compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/17223/

 --

[SA17240] MailSite Express Attachment Upload Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-10-18

Soroush dalili has discovered a vulnerability in MailSite Express,
which can be exploited by malicious users to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/17240/

 --

[SA17214] IBM TotalStorage SAN Volume Controller PuTTY Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-10-17

IBM has acknowledged a vulnerability in TotalStorage SAN Volume
Controller, which can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/17214/

 --

[SA17219] Comersus Power Pack Premium Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-10-17

Lostmon has reported a vulnerability in BackOffice Plus included in
Comersus Power Pack Premium, which can be exploited by malicious people
to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/17219/

 --

[SA17196] Typsoft FTP Server Denial of Service Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2005-10-14

Donnie Werner has discovered a vulnerability in Typsoft FTP, which can
be exploited by malicious users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/17196/

 --

[SA17188] Kaspersky Anti-Virus Engine Malformed Archives Virus
Detection Bypass

Critical:    Not critical
Where:       From remote
Impact:      Security Bypass
Released:    2005-10-13

fRoGGz has reported a weakness in Kaspersky Anti-Virus scan engine,
which can be exploited by malware to bypass certain scanning
functionality.

Full Advisory:
http://secunia.com/advisories/17188/

 --

[SA17186] AVG Anti-Virus Engine Malformed ARJ Archive Virus Detection
Bypass

Critical:    Not critical
Where:       From remote
Impact:      Security Bypass
Released:    2005-10-13

fRoGGz has discovered a weakness in AVG Anti-Virus scan engine, which
can be exploited by malware to bypass certain scanning functionality.

Full Advisory:
http://secunia.com/advisories/17186/


UNIX/Linux:--

[SA17248] Fedora update for lynx

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-10-18

Fedora has issued an update for lynx. This fixes a vulnerability, which
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/17248/

 --

[SA17238] Gentoo update for lynx

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-10-18

Gentoo has issued an update for lynx. This fixes a vulnerability, which
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/17238/

 --

[SA17235] Sun Solaris Multiple Mozilla Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Spoofing, System access
Released:    2005-10-17

Sun Microsystems has acknowledged some vulnerabilities in Solaris,
which can be exploited by malicious people to spoof the contents of web
sites or to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/17235/

 --

[SA17231] Red Hat update for lynx

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-10-17

Red Hat has issued an update for lynx. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/17231/

 --

[SA17230] Ubuntu update for lynx

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-10-17

Ubuntu has issued an update for lynx. This fixes a vulnerability, which
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/17230/

 --

[SA17220] Snort Back Orifice Pre-Processor Buffer Overflow
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-10-18

Neel Mehta has reported a vulnerability in Snort, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/17220/

 --

[SA17216] Lynx "HTrjis()" NNTP Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-10-17

Ulf Harnhammar has reported a vulnerability in Lynx, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/17216/

 --

[SA17212] Fedora update for koffice

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-10-17

Fedora has issue an update for koffice. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/17212/

 --

[SA17190] Gentoo update for koffice/kword

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-10-14

Gentoo has issued updates for koffice and kword. These fix a
vulnerability, which can be exploited by malicious people to compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/17190/

 --

[SA17257] Avaya Products BFD Integer Overflow Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-10-19

Avaya has acknowledged a vulnerability in various products, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/17257/

 --

[SA17256] Red Hat update for netpbm

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2005-10-19

Red Hat has issued an update for netpbm. This fixes a vulnerability,
which potentially can be exploited by malicious people to cause a DoS
(Denial of Service) or compromise a user's system.

Full Advisory:
http://secunia.com/advisories/17256/

 --

[SA17252] Avaya Intuity LX Two Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2005-10-19

Avaya has acknowledged a security issue and a vulnerability in Intuity
LX, which potentially can be exploited by malicious people to cause a
DoS (Denial of Service) and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/17252/

 --

[SA17247] Fedora update for wget

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-10-18

Fedora has issued an update for wget. This fixes a vulnerability, which
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/17247/

 --

[SA17236] Sun Solaris Network Security Services (NSS) Security Tools
Zlib Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2005-10-17

Sun Microsystems has acknowledged a vulnerability in Solaris and Sun
Java Enterprise System, which potentially can be exploited by malicious
people to cause a DoS (Denial of Service) or compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/17236/

 --

[SA17234] Gentoo update for phpmyadmin

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2005-10-18

Gentoo has issued an update for phpmyadmin. This fixes a vulnerability,
which can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/17234/

 --

[SA17233] Red Hat update for openldap / nss_ldap

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information
Released:    2005-10-17

Red Hat has issued updates for openldap / nss_ldap. This fixes two
security issues and a vulnerability, which can be exploit by malicious
people to gain knowledge of sensitive information or bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/17233/

 --

[SA17228] Fedora update for curl

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-10-19

Fedora has issued an update for curl. This fixes a vulnerability, which
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/17228/

 --

[SA17222] Ubuntu update for netpbm

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2005-10-19

Ubuntu has issued an update for netpbm. This fixes a vulnerability,
which potentially can be exploited by malicious people to cause a DoS
(Denial of Service) or compromise a user's system.

Full Advisory:
http://secunia.com/advisories/17222/

 --

[SA17221] NetPBM "pnmtopng" Stack Corruption Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2005-10-19

Bastien Nocera has reported a vulnerability in NetPBM, which
potentially can be exploited by malicious people to cause a DoS (Denial
of Service) or compromise a user's system.

Full Advisory:
http://secunia.com/advisories/17221/

 --

[SA17215] SUSE Updates for Multiple Packages

Critical:    Moderately critical
Where:       From remote
Impact:      Privilege escalation, DoS, System access
Released:    2005-10-17

SUSE has issued updates for multiple packages. These fix various
vulnerabilities, which can be exploited by malicious, local users to
perform certain actions on a vulnerable system with escalated
privileges, by malicious users to cause a DoS (Denial of Service), and
by malicious people to potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/17215/

 --

[SA17213] Fedora update for abiword

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-10-17

Fedora has issued an update for abiword. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/17213/

 --

[SA17208] Ubuntu update for libcurl2/libcurl3

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-10-17

Ubuntu has issued an update for libcurl2/libcurl3. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/17208/

 --

[SA17206] Red Hat update for xloadimage

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-10-19

Red Hat has issued an update for xloadimage. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/17206/

 --

[SA17203] Mandrake update for curl

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-10-14

Mandriva has issued an update for curl. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/17203/

 --

[SA17200] Ubuntu update for abiword

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-10-14

Ubuntu has issued an update for abiword. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/17200/

 --

[SA17199] AbiWord RTF Importer Buffer Overflow Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-10-14

Chris Evans has reported some vulnerabilities in Abiword, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/17199/

 --

[SA17193] cURL/libcURL NTLM Username Handling Buffer Overflow
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-10-14

A vulnerability has been reported in cURL/libcURL, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/17193/

 --

[SA17192] wget NTLM Username Handling Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-10-14

A vulnerability has been reported in wget, which can be exploited by
malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/17192/

 --

[SA17244] SUSE update for OpenWBEM

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2005-10-18

SUSE has issued an update for OpenWBEM. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/17244/

 --

[SA17245] Ubuntu update for openssh-server

Critical:    Less critical
Where:       From remote
Impact:      Privilege escalation
Released:    2005-10-18

Ubuntu has issued an update for openssh-server. This fixes a security
issue, which can be exploited malicious users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/17245/

 --

[SA17210] Fedora update for openssl/openssl096b/openssl097a

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2005-10-17

Fedora has issued updates for openssl/openssl096b/openssl097a. These
fix a vulnerability, which potentially can be exploited by malicious
people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/17210/

 --

[SA17191] Slackware update for openssl

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2005-10-14

Slackware has issued an update for openssl. This fixes a vulnerability,
which potentially can be exploited by malicious people to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/17191/

 --

[SA17189] Ubuntu update for openssl

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2005-10-14

Ubuntu has issued an update for openssl. This fixes a vulnerability,
which potentially can be exploited by malicious people to bypass
certain security restrictions.

Full Advisory:
http://secunia.com/advisories/17189/

 --

[SA17217] Avaya Modular Messaging ucd-snmp Denial of Service
Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2005-10-19

Avaya has acknowledged a vulnerability in Avaya Modular Messaging,
which can be exploited by malicious users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/17217/

 --

[SA17258] Avaya CMS Solaris X11 Pixmap Creation Integer Overflow
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-10-19

Avaya has acknowledged a vulnerability in CMS, which potentially can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/17258/

 --

[SA17249] Avaya CMS / IR Solaris UFS File System Denial of Service

Critical:    Less critical
Where:       Local system
Impact:      DoS
Released:    2005-10-19

Avaya has acknowledged a vulnerability in CMS and IR, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/17249/

 --

[SA17246] Avaya CMS / IR Solaris Xsun and Xprt Privilege Escalation
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-10-19

Avaya has acknowledged a vulnerability in CMS and IR, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/17246/

 --

[SA17241] Gentoo update for spe

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-10-17

Gentoo has issued an update for SPE. This fixes a security issue, which
can be exploited by malicious, local users to perform certain actions on
a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/17241/

 --

[SA17232] Gentoo update for perl / qt-unixodbc / cmake

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-10-17

Gentoo has issued updates for perl / qt-unixodbc / cmake. This fixes a
vulnerability, which can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/17232/

 --

[SA17226] Linux Kernel Console Keyboard Mapping Shell Command
Injection

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-10-17

Rudolf Polzer has reported a vulnerability in the Linux Kernel, which
potentially can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/17226/

 --

[SA17224] Stani's Python Editor Insecure Default File Permissions

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-10-17

Bryan Ostergaard has reported a security issue in Stani's Python Editor
(SPE), which can be exploited by malicious, local users to perform
certain actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/17224/

 --

[SA17211] Fedora update for texinfo

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-10-17

Fedora has issued an update for texinfo. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/17211/

 --

[SA17209] Flexbackup Insecure Temporary File Creation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-10-17

Eric Romang has reported a vulnerability in Flexbackup, which can be
exploited by malicious, local users to perform certain actions on a
vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/17209/

 --

[SA17207] Ubuntu update for graphviz

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-10-17

Ubuntu has issued an update for graphviz. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/17207/

 --

[SA17202] AIX LSCFG Insecure Temporary File Handling Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-10-14

A vulnerability has been reported in AIX, which potentially can be
exploited by malicious, local users to perform certain actions on a
vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/17202/

 --

[SA17194] XMail Command Line Buffer Overflow Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-10-14

A vulnerability has been reported in XMail, which can be exploited by
malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/17194/

 --

[SA17187] Debian update for hylafax

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-10-13

Debian has issued an update for hylafax. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/17187/

 --

[SA17242] YIFF Sound Systems Arbitrary File Playback Weakness

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2005-10-19

Javier Fernandez-Sanguino Pena has discovered a weakness in YIFF Sound
Systems, which can be exploited by malicious, local users to bypass
certain security restrictions.

Full Advisory:
http://secunia.com/advisories/17242/

 --

[SA17229] Ubuntu update for php

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2005-10-17

Ubuntu has issued an update for php. This fixes a security issue, which
can be exploited by malicious, local users to access certain files
outside the "open_basedir" root.

Full Advisory:
http://secunia.com/advisories/17229/

 --

[SA17198] Sun Solaris SCTP Denial of Service Weaknesses

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2005-10-14

Some weaknesses have been reported in Solaris, which potentially can be
exploited by malicious, local users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/17198/

 --

[SA17195] HP-UX Unspecified Denial of Service Weakness

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2005-10-14

A weakness has been reported in HP-UX, which can be exploited by
malicious, local users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/17195/


Other:--

[SA17255] Nortel Threat Protection System Back Orifice Pre-Processor
Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-10-19

Nortel Networks has acknowledged a vulnerability in two Threat
Protection System products, which can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/17255/


Cross Platform:--

[SA17237] e107 "a_name" SQL Injection Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data, System access
Released:    2005-10-19

rgod has reported a vulnerability in e107, which can be exploited by
malicious people to conduct SQL injection attacks and compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/17237/

 --

[SA17201] W-Agora Local File Inclusion and File Upload Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2005-10-17

rgod has discovered some vulnerabilities in W-Agora, which can be
exploited by malicious people to disclose sensitive information and
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/17201/

 --

[SA17250] Oracle Products 85 Unspecified Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, Cross Site Scripting, Manipulation of data,
System access
Released:    2005-10-19

85 vulnerabilities have been reported in various Oracle products. Some
have an unknown impact, and others can be exploited to conduct PL/SQL
injection attacks, cross-site scripting attacks, or potentially to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/17250/

 --

[SA17243] Xerver Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of system information,
Exposure of sensitive information
Released:    2005-10-19

Ziv Kamir has reported some vulnerabilities in Xerver, which can be
exploited by malicious people to conduct cross-site scripting attacks,
and disclose system and sensitive information.

Full Advisory:
http://secunia.com/advisories/17243/

 --

[SA17227] PunBB "old_searches" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2005-10-17

Devil_box has reported a vulnerability in PunBB, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/17227/

 --

[SA17225] Network Security Services (NSS) Library Zlib Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2005-10-17

A vulnerability has been reported in Network Security Services (NSS),
which potentially can be exploited by malicious people to cause a DoS
(Denial of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/17225/

 --

[SA17205] Gallery "g2_itemId" Disclosure of Sensitive Information

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2005-10-17

A vulnerability has been reported in Gallery, which can be exploited by
malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/17205/

 --

[SA17253] ManageEngine NetFlow Analyzer "grDisp" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-10-19

"Why" has discovered a vulnerability in ManageEngine NetFlow Analyzer,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/17253/

 --

[SA17197] BitDefender Anti-Virus Engine Malformed Archives Virus
Detection Bypass

Critical:    Not critical
Where:       From remote
Impact:      Security Bypass
Released:    2005-10-14

fRoGGz has reported a weakness in BitDefender Anti-Virus scan engine,
which can be exploited by malware to bypass certain scanning
functionality.

Full Advisory:
http://secunia.com/advisories/17197/

 --

[SA17204] iTunes Shared Music Potential Denial of Service

Critical:    Not critical
Where:       From local network
Impact:      DoS
Released:    2005-10-17

Seth Fogie has reported a security issue in iTunes, which potentially
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/17204/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45




_________________________________________
InfoSec News v2.0 - Coming Soon! 
http://www.infosecnews.org 



This archive was generated by hypermail 2.1.3 : Fri Oct 21 2005 - 13:22:53 PDT