======================================================================== The Secunia Weekly Advisory Summary 2005-10-20 - 2005-10-27 This week : 47 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: The Secunia staff is spending hours every day to assure you the best and most reliable source for vulnerability information. Every single vulnerability report is being validated and verified before a Secunia advisory is written. Secunia validates and verifies vulnerability reports in many different ways e.g. by downloading the software and performing comprehensive tests, by reviewing source code, or by validating the credibility of the source from which the vulnerability report was issued. As a result, Secunia's database is the most correct and complete source for recent vulnerability information available on the Internet. Secunia Online Vulnerability Database: http://secunia.com/ ======================================================================== 2) This Week in Brief: Some vulnerabilities have been reported in Skype, which can be exploited by malicious people to cause a DoS or to compromise a user's system. All users of Skype are advised to update to the latest version. Reference: http://secunia.com/SA17305 -- A security issue has been reported in Symantec Discovery, which potentially can be exploited by malicious people to gain access to, or to manipulate certain information. The vendor has released updated versions. Please see the referenced Secunia advisory for additional details. Reference: http://secunia.com/SA17302 VIRUS ALERTS: Secunia has not issued any virus alerts during the week. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA17305] Skype Multiple Buffer Overflow Vulnerabilities 2. [SA11762] Opera Browser Favicon Displaying Address Bar Spoofing Vulnerability 3. [SA17250] Oracle Products 85 Unspecified Vulnerabilities 4. [SA17220] Snort Back Orifice Pre-Processor Buffer Overflow Vulnerability 5. [SA15601] Mozilla / Mozilla Firefox Frame Injection Vulnerability 6. [SA16560] Windows Registry Editor Utility String Concealment Weakness 7. [SA12758] Microsoft Word Document Parsing Buffer Overflow Vulnerabilities 8. [SA17281] RSA Authentication Agent for Web "Redirect" Buffer Overflow 9. [SA17284] Debian update for mozilla-thunderbird 10. [SA17254] Ethereal Multiple Protocol Dissector and PCRE Vulnerabilities ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA17301] eBASEweb Unspecified SQL Injection Vulnerability UNIX/Linux: [SA17284] Debian update for mozilla-thunderbird [SA17335] SGI Advanced Linux Environment Multiple Updates [SA17332] Debian update for koffice [SA17327] Red Hat update for ethereal [SA17305] Skype Multiple Buffer Overflow Vulnerabilities [SA17288] Trustix update for multiple packages [SA17286] Fedora update for ethereal [SA17339] Debian update for libgda2 [SA17325] CHM Lib Buffer Overflow Vulnerability [SA17323] GNOME-DB libgda Logging Functions Format String Vulnerabilities [SA17320] SUSE update for curl/wget [SA17317] F.E.A.R. Lithtech Engine UDP Datagram Denial of Service [SA17313] HP Oracle for Openview Multiple Vulnerabilities [SA17309] Gentoo update for zope [SA17298] Gentoo update for phpmyadmin [SA17297] Gentoo update for curl [SA17285] Mandriva update for ruby [SA17321] Network Appliance Data ONTAP iSCSI Authentication Bypass [SA17331] RSA ACE/Agent for Web "image" Cross-Site Scripting Vulnerability [SA17314] Basic Analysis and Security Engine SQL Injection Vulnerability [SA17287] Fedora update for squid [SA17322] Debian update for sudo [SA17318] Sudo Environment Cleaning Privilege Escalation Vulnerability [SA17299] mgdiff Patch Viewer Insecure Temporary File Creation [SA17293] Fetchmail "fetchmailconf" Password Disclosure Vulnerability [SA17290] SUSE update for permissions Other: Cross Platform: [SA17328] PHP iCalendar "phpicalendar" File Inclusion Vulnerability [SA17330] Snoopy "_httpsrequest()" Shell Command Injection Vulnerability [SA17324] TClanPortal "id" SQL Injection Vulnerability [SA17315] PHP-Nuke SQL Injection Vulnerabilities [SA17312] PHP-Fusion "news_body" Script Insertion Vulnerability [SA17310] archilles Newsworld "data" Exposure of Sensitive Information [SA17308] SaphpLesson "forumid" SQL Injection Vulnerability [SA17307] ar-blog Script Insertion and Authentication Bypass Vulnerabilities [SA17306] Zomplog Cross-Site Scripting and SQL Injection Vulnerabilities [SA17304] Nuked-Klan Script Insertion and SQL Injection Vulnerabilities [SA17303] MWChat "Username" SQL Injection Vulnerability [SA17300] Xoops Multiple Script Insertion Vulnerabilities [SA17292] AL-Caricatier "cookie_username" Authentication Bypass Vulnerability [SA17291] FlatNuke Cross-Site Scripting and Disclosure of Sensitive Information [SA17289] phpMyAdmin Local File Inclusion and Cross-Site Scripting [SA17302] Symantec Discovery Database Accounts Null Password [SA17319] IBM HTTP Server HTTP Request Smuggling Vulnerability [SA17316] Flyspray Cross-Site Scripting Vulnerabilities [SA17295] phpBB Avatar Script Insertion Vulnerability [SA17283] Chipmunk Directory "entryID" Cross-Site Scripting Vulnerability ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA17301] eBASEweb Unspecified SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-10-24 A vulnerability has been reported in eBASEweb, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17301/ UNIX/Linux:-- [SA17284] Debian update for mozilla-thunderbird Critical: Extremely critical Where: From remote Impact: Security Bypass, Spoofing, Manipulation of data, System access Released: 2005-10-21 Debian has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, manipulate certain data, bypass certain security restrictions, and compromise a user's system. Full Advisory: http://secunia.com/advisories/17284/ -- [SA17335] SGI Advanced Linux Environment Multiple Updates Critical: Highly critical Where: From remote Impact: Security Bypass, Exposure of sensitive information, Privilege escalation, System access Released: 2005-10-26 SGI has issued a patch for SGI Advanced Linux Environment. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to gain knowledge of sensitive information, bypass certain security restrictions and compromise a user's system. Full Advisory: http://secunia.com/advisories/17335/ -- [SA17332] Debian update for koffice Critical: Highly critical Where: From remote Impact: System access Released: 2005-10-26 Debian has issue an update for koffice. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17332/ -- [SA17327] Red Hat update for ethereal Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2005-10-26 Red Hat has issued an update for ethereal. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17327/ -- [SA17305] Skype Multiple Buffer Overflow Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2005-10-25 Some vulnerabilities have been reported in Skype, which can be exploited by malicious people to cause a DoS or to compromise a user's system. Full Advisory: http://secunia.com/advisories/17305/ -- [SA17288] Trustix update for multiple packages Critical: Highly critical Where: From remote Impact: Unknown, Security Bypass, Cross Site Scripting, Manipulation of data, Privilege escalation, DoS, System access Released: 2005-10-24 Trustix has issued updates for multiple packages. These fix some vulnerabilities, where the most critical ones can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17288/ -- [SA17286] Fedora update for ethereal Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2005-10-21 Fedora has issued an update for ethereal. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17286/ -- [SA17339] Debian update for libgda2 Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-26 Debian has issued an update for libgda2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17339/ -- [SA17325] CHM Lib Buffer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-26 Sven Tantau has reported a vulnerability in CHM Lib (chmlib), which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17325/ -- [SA17323] GNOME-DB libgda Logging Functions Format String Vulnerabilities Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-26 Steve Kemp has reported two vulnerabilities in GNOME-DB libgda, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17323/ -- [SA17320] SUSE update for curl/wget Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-25 SUSE has issued updates for curl and wget. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17320/ -- [SA17317] F.E.A.R. Lithtech Engine UDP Datagram Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2005-10-24 Luigi Auriemma has reported a vulnerability in F.E.A.R. (First Encounter Assault and Recon), which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/17317/ -- [SA17313] HP Oracle for Openview Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Unknown, Cross Site Scripting, Manipulation of data, System access Released: 2005-10-25 HP has acknowledged some vulnerabilities in HP OfO (Oracle for Openview), which can be exploited with unknown impact, to conduct PL/SQL injection attacks, cross-site scripting attacks, or potentially to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17313/ -- [SA17309] Gentoo update for zope Critical: Moderately critical Where: From remote Impact: Unknown Released: 2005-10-25 Gentoo has issued an update for zope. This fixes a vulnerability with an unknown impact. Full Advisory: http://secunia.com/advisories/17309/ -- [SA17298] Gentoo update for phpmyadmin Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Exposure of sensitive information Released: 2005-10-25 Gentoo has issued an update for phpmyadmin. This fixes two vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information. Full Advisory: http://secunia.com/advisories/17298/ -- [SA17297] Gentoo update for curl Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-24 Gentoo has issued an update for curl. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17297/ -- [SA17285] Mandriva update for ruby Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2005-10-21 Mandriva has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/17285/ -- [SA17321] Network Appliance Data ONTAP iSCSI Authentication Bypass Critical: Moderately critical Where: From local network Impact: Security Bypass Released: 2005-10-25 Thomas H. Ptacek has reported a vulnerability in Network Appliance Data ONTAP, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/17321/ -- [SA17331] RSA ACE/Agent for Web "image" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-10-26 SEC Consult has reported a vulnerability in RSA ACE/Agent for Web, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17331/ -- [SA17314] Basic Analysis and Security Engine SQL Injection Vulnerability Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2005-10-25 Remco Verhoef has discovered a vulnerability in Basic Analysis and Security Engine (BASE), which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17314/ -- [SA17287] Fedora update for squid Critical: Less critical Where: From remote Impact: DoS Released: 2005-10-21 Fedora has issued an update for squid. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/17287/ -- [SA17322] Debian update for sudo Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-10-26 Debian has issued an update for sudo. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/17322/ -- [SA17318] Sudo Environment Cleaning Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-10-25 Tavis Ormandy has reported a vulnerability in Sudo, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/17318/ -- [SA17299] mgdiff Patch Viewer Insecure Temporary File Creation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-10-24 Javier Fernandez-Sanguino Pena has reported a vulnerability in mgdiff Patch Viewer, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/17299/ -- [SA17293] Fetchmail "fetchmailconf" Password Disclosure Vulnerability Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2005-10-24 A vulnerability has been reported in Fetchmail, which can be exploited by malicious, local users to gain knowledge of certain sensitive information. Full Advisory: http://secunia.com/advisories/17293/ -- [SA17290] SUSE update for permissions Critical: Less critical Where: Local system Impact: Security Bypass Released: 2005-10-24 SUSE has issued an update for permissions. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/17290/ Other: Cross Platform:-- [SA17328] PHP iCalendar "phpicalendar" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2005-10-26 Francesco "aScii" Ongaro has discovered a vulnerability in PHP iCalendar, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17328/ -- [SA17330] Snoopy "_httpsrequest()" Shell Command Injection Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2005-10-26 Daniel Fabian has discovered a vulnerability in Snoopy, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17330/ -- [SA17324] TClanPortal "id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-10-25 Abducter has discovered a vulnerability in TClanPortal, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17324/ -- [SA17315] PHP-Nuke SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-10-25 rgod has discovered some vulnerabilities in PHP-Nuke, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17315/ -- [SA17312] PHP-Fusion "news_body" Script Insertion Vulnerability Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2005-10-25 peanut has discovered a vulnerability in PHP-Fusion, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/17312/ -- [SA17310] archilles Newsworld "data" Exposure of Sensitive Information Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of system information, Exposure of sensitive information Released: 2005-10-25 Christoph "Chb" Burchert has discovered a security issue in archilles Newsworld, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/17310/ -- [SA17308] SaphpLesson "forumid" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-10-25 aLMaSTeR has reported a vulnerability in SaphpLesson, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17308/ -- [SA17307] ar-blog Script Insertion and Authentication Bypass Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting Released: 2005-10-25 _MoHaJaLi_ has reported two vulnerabilities in ar-blog, which can be exploited by malicious people to conduct script insertion attacks and bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/17307/ -- [SA17306] Zomplog Cross-Site Scripting and SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2005-10-24 BiPi_HaCk has discovered some vulnerabilities in Zomplog, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/17306/ -- [SA17304] Nuked-Klan Script Insertion and SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2005-10-25 papipsycho has reported some vulnerabilities in Nuked-Klan, which can be exploited by malicious people to conduct script insertion and SQL injection attacks. Full Advisory: http://secunia.com/advisories/17304/ -- [SA17303] MWChat "Username" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-10-24 rgod has reported a vulnerability in MWChat, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17303/ -- [SA17300] Xoops Multiple Script Insertion Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2005-10-25 Keigo Yamazaki has reported some vulnerabilities in Xoops, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/17300/ -- [SA17292] AL-Caricatier "cookie_username" Authentication Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2005-10-24 God Of Death has discovered a vulnerability in AL-Caricatier, which can be exploited by malicious people to bypass certain security protections. Full Advisory: http://secunia.com/advisories/17292/ -- [SA17291] FlatNuke Cross-Site Scripting and Disclosure of Sensitive Information Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Exposure of sensitive information Released: 2005-10-24 Abducter has discovered some vulnerabilities in FlatNuke, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information. Full Advisory: http://secunia.com/advisories/17291/ -- [SA17289] phpMyAdmin Local File Inclusion and Cross-Site Scripting Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Exposure of sensitive information Released: 2005-10-24 Two vulnerabilities have been reported in phpMyAdmin, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information. Full Advisory: http://secunia.com/advisories/17289/ -- [SA17302] Symantec Discovery Database Accounts Null Password Critical: Moderately critical Where: From local network Impact: Manipulation of data, Exposure of sensitive information Released: 2005-10-25 A security issue has been reported in Symantec Discovery, which potentially can be exploited by malicious people to gain access to, or to manipulate certain information. Full Advisory: http://secunia.com/advisories/17302/ -- [SA17319] IBM HTTP Server HTTP Request Smuggling Vulnerability Critical: Less critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Manipulation of data Released: 2005-10-25 IBM has acknowledged a vulnerability in IBM HTTP server, which can be exploited by malicious people to conduct HTTP request smuggling attacks. Full Advisory: http://secunia.com/advisories/17319/ -- [SA17316] Flyspray Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-10-26 Lostmon has reported some vulnerabilities in Flyspray, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17316/ -- [SA17295] phpBB Avatar Script Insertion Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-10-24 K-Gen has discovered a vulnerability in phpBB, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/17295/ -- [SA17283] Chipmunk Directory "entryID" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-10-21 trueend5 has discovered a vulnerability in Chipmunk Directory, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17283/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _________________________________________ InfoSec News v2.0 - Coming Soon! http://www.infosecnews.org
This archive was generated by hypermail 2.1.3 : Fri Oct 28 2005 - 00:05:20 PDT