======================================================================== The Secunia Weekly Advisory Summary 2006-01-12 - 2006-01-19 This week : 92 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: The Secunia staff is spending hours every day to assure you the best and most reliable source for vulnerability information. Every single vulnerability report is being validated and verified before a Secunia advisory is written. Secunia validates and verifies vulnerability reports in many different ways e.g. by downloading the software and performing comprehensive tests, by reviewing source code, or by validating the credibility of the source from which the vulnerability report was issued. As a result, Secunia's database is the most correct and complete source for recent vulnerability information available on the Internet. Secunia Online Vulnerability Database: http://secunia.com/ ======================================================================== 2) This Week in Brief: 82 vulnerabilities and security issues have been reported in various Oracle products. Some have an unknown impact, and others can be exploited to gain knowledge of certain information, overwrite arbitrary files, and to conduct SQL injection attacks. Additional details about the vulnerabilities can be found in the referenced Secunia advisory below. Reference: http://secunia.com/SA18493 -- A vulnerability has been reported in AOL, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. Fixes are available from the vendor, please refer to the referenced Secunia advisory for details. Reference: http://secunia.com/SA18521 VIRUS ALERTS: Secunia has not issued any virus alerts during the week. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA18255] Microsoft Windows WMF "SETABORTPROC" Arbitrary Code Execution 2. [SA18368] Microsoft Outlook / Exchange TNEF Decoding Arbitrary Code Execution Vulnerability 3. [SA15546] Microsoft Internet Explorer "window()" Arbitrary Code Execution Vulnerability 4. [SA18521] AOL You've Got Pictures ActiveX Control Buffer Overflow 5. [SA18131] Symantec AntiVirus RAR Archive Decompression Buffer Overflow 6. [SA18370] QuickTime Multiple Image/Media File Handling Vulnerabilities 7. [SA18493] Oracle Products Multiple Vulnerabilities and Security Issues 8. [SA15907] Mozilla Thunderbird Attachment Spoofing Vulnerability 9. [SA15601] Mozilla / Mozilla Firefox Frame Injection Vulnerability 10. [SA11762] Opera Browser Favicon Displaying Address Bar Spoofing Vulnerability ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA18521] AOL You've Got Pictures ActiveX Control Buffer Overflow [SA18522] BitComet Client URI Handling Buffer Overflow Vulnerability [SA18508] Farmers WIFE FTP Directory Traversal Vulnerability [SA18488] SimpleBlog Script Insertion and SQL Injection Vulnerabilities [SA18439] Mini-NUKE SQL Injection and Unauthenticated Password Change [SA18492] Helm Web Hosting Control Panel "txtEmailAddress" Cross-Site Scripting [SA18466] AmbiCom Blue Neighbors Object Push Service Buffer Overflow [SA18443] FogBugz "dest" Cross-Site Scripting Vulnerability [SA18531] CA DM Deployment Common Component Denial of Service [SA18494] Cisco CallManager Connection Handling Denial of Service [SA18437] Toshiba Bluetooth Stack File Upload Directory Traversal Vulnerability UNIX/Linux: [SA18517] SGI Advanced Linux Environment Multiple Updates [SA18503] SUSE update for multiple packages [SA18484] Novell Open Enterprise Server Remote Manager Buffer Overflow [SA18478] Mandriva update for clamav [SA18463] Trustix update for multiple packages [SA18453] Gentoo update for clamav [SA18435] Gentoo update for sun-jdk/sun-jre-bin/blackdown-jdk/blackdown-jre [SA18520] Fedora update for kdegraphics [SA18509] OpenServer update for gdk-pixbuf [SA18507] Avaya PDS HP-UX SecureShell Denial of Service Vulnerability [SA18496] Debian update for albatross [SA18491] Avaya Products xloadimage NIFF Image Handling Buffer Overflow [SA18489] Mandriva update for hylafax [SA18482] Linux Kernel Multiple Denial of Service Vulnerabilities [SA18481] Debian update for mantis [SA18457] Albatross Arbitrary Command Execution Vulnerability [SA18456] Ubuntu update for mailman [SA18452] Gentoo update for blender [SA18451] Gentoo update for wine [SA18449] Mailman Dates Denial of Service Vulnerability [SA18448] Fedora update for tetex [SA18436] Debian update for gpdf [SA18525] CMU SNMP snmptrapd Format String Vulnerability [SA18495] EMC NetWorker Denial of Service and Buffer Overflow Vulnerabilities [SA18526] Red Hat update for apache [SA18510] Red Hat update for kernel [SA18472] Widexl Download Tracker "ID" Parameter Cross-Site Scripting [SA18468] Faq-O-Matic Cross-Site Scripting Vulnerabilities [SA18530] Debian update for antiword [SA18527] Ubuntu update for kernel [SA18502] Avaya Products util-linux / mount Security Issue and Vulnerability [SA18498] Sun Solaris lpsched Unspecified Vulnerability [SA18497] Serial Line Sniffer "HOME" Environment Variable Buffer Overflow [SA18487] Linux Kernel dm-crypt Driver Information Disclosure [SA18476] Debian update for tuxpaint [SA18475] Tux Paint Insecure Temporary File Creation Vulnerability [SA18474] Ubuntu update for tuxpaint [SA18438] Kolab Server Secure SMTP Message Logging Security Issue [SA18433] Debian update for fetchmail [SA18458] grsecurity RBAC Admin Role Dropping Security Issue Other: [SA18483] Intracom JetSpeed ADSL Modem Information Disclosure [SA18528] Cisco IOS CDP Status Page Script Insertion Vulnerability [SA18514] ACT WLAN Phone P202S Multiple Security Issues [SA18505] Clipcomm CWP-100/CP-100E Debug Service Unauthenticated Access [SA18490] Cisco IOS Stack Group Bidding Protocol Denial of Service [SA18479] Cisco IP Phones SYN Flood Device Reload Vulnerability [SA18461] Linksys BEFVP41 IP Option Length Denial of Service [SA18512] MPN HP-180W Wireless IP Phone Information Disclosure [SA18511] ZyXEL P-2000W_v2 VoIP Wi-Fi Phone Information Disclosure Cross Platform: [SA18450] Light Weight Calendar "date" PHP Code Execution Vulnerability [SA18432] ACal "ACalAuthenticate" Authentication Bypass Vulnerability [SA18518] phpXplorer "sShare" Local File Inclusion Vulnerability [SA18513] Joomla! Multiple Unspecified Vulnerabilities [SA18504] geoBlog "cat" Parameter SQL Injection Vulnerability [SA18499] WB News "name" Script Insertion Vulnerability [SA18493] Oracle Products Multiple Vulnerabilities and Security Issues [SA18485] Apache Geronimo Web-Access-Log Viewer Script Insertion [SA18471] WP-Stats WordPress Plug-in "author" SQL Injection Vulnerability [SA18467] BlogPHP "username" SQL Injection Vulnerability [SA18465] Trac HTML WikiProcessor Script Insertion Vulnerability [SA18464] Bit 5 Blog Script Insertion and SQL Injection Vulnerabilities [SA18460] WhiteAlbum "dir" SQL Injection Vulnerability [SA18459] PDFdirectory SQL Injection Vulnerabilities [SA18455] 123 Flash Chat Server Username Directory Traversal Vulnerability [SA18446] Fortinet Products ISAKMP IKE Message Processing Vulnerabilities [SA18444] PHP Toolkit for PayPal Payment Bypass and Exposure of Transactions [SA18442] microBlog "month" and "year" SQL Injection Vulnerabilities [SA18441] TankLogger "tank_id" SQL Injection Vulnerability [SA18440] wordcircle Script Insertion and SQL Injection Vulnerabilities [SA18486] Dual DHCP DNS Server DHCP Options Buffer Overflow [SA18519] CubeCart Cross-Site Scripting Vulnerabilities [SA18477] Ultimate Auction Cross-Site Scripting Vulnerabilities [SA18473] RedKernel Referrer Tracker "rkrt_stats.php" Cross-Site Scripting [SA18470] GTP iCommerce Cross-Site Scripting Vulnerabilities [SA18469] Netbula Anyboard "tK" Cross-Site Scripting Vulnerability [SA18462] Benders Calendar Multiple SQL Injection Vulnerabilities [SA18454] SMBCMS Site Search Cross-Site Scripting Vulnerability [SA18447] H-Sphere "login" Cross-Site Scripting Vulnerability [SA18445] Interspire TrackPoint NX "username" Cross-Site Scripting Vulnerability [SA18434] Mantis Multiple Cross-Site Scripting Vulnerabilities [SA18506] Avaya gdb Integer Overflow and Insecure Initialisation File Handling ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA18521] AOL You've Got Pictures ActiveX Control Buffer Overflow Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-01-17 A vulnerability has been reported in AOL, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/18521/ -- [SA18522] BitComet Client URI Handling Buffer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2006-01-19 Dejun Meng has reported a vulnerability in BitComet Client, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/18522/ -- [SA18508] Farmers WIFE FTP Directory Traversal Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data, System access Released: 2006-01-17 Knud Erik Højgaard has discovered a vulnerability in Farmers WIFE, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18508/ -- [SA18488] SimpleBlog Script Insertion and SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2006-01-16 Zinho has discovered two vulnerabilities in SimpleBlog, which can be exploited by malicious people to conduct script insertion and SQL injection attacks. Full Advisory: http://secunia.com/advisories/18488/ -- [SA18439] Mini-NUKE SQL Injection and Unauthenticated Password Change Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data Released: 2006-01-13 Mustafa Can Bjorn has reported a vulnerability and a security issue in Mini-NUKE, which can be exploited by malicious people to bypass certain security restrictions and conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/18439/ -- [SA18492] Helm Web Hosting Control Panel "txtEmailAddress" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-01-16 M.Neset KABAKLI has reported a vulnerability in Helm Web Hosting Control Panel, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18492/ -- [SA18466] AmbiCom Blue Neighbors Object Push Service Buffer Overflow Critical: Less critical Where: From remote Impact: DoS, System access Released: 2006-01-16 Kevin Finisterre has reported a vulnerability in AmbiCom Blue Neighbors, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18466/ -- [SA18443] FogBugz "dest" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-01-13 M.Neset KABAKLI has reported a vulnerability in FogBugz, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18443/ -- [SA18531] CA DM Deployment Common Component Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2006-01-18 Two vulnerabilities have been reported in various CA products, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18531/ -- [SA18494] Cisco CallManager Connection Handling Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2006-01-19 Some vulnerabilities has been reported in Cisco CallManager, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18494/ -- [SA18437] Toshiba Bluetooth Stack File Upload Directory Traversal Vulnerability Critical: Less critical Where: From local network Impact: Security Bypass Released: 2006-01-13 Kevin Finisterre has reported a vulnerability in Toshiba Bluetooth Stack, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/18437/ UNIX/Linux:-- [SA18517] SGI Advanced Linux Environment Multiple Updates Critical: Highly critical Where: From remote Impact: Cross Site Scripting, Privilege escalation, DoS, System access Released: 2006-01-19 SGI has issued a patch for SGI Advanced Linux Environment. This fixes some vulnerabilities, where the most critical ones can be exploited by malicious people to cause a DoS (Denial of Service), conduct cross-site scripting attacks, and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18517/ -- [SA18503] SUSE update for multiple packages Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-01-16 SUSE has issued updates for multiple packages. These fix various vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable or a user's system. Full Advisory: http://secunia.com/advisories/18503/ -- [SA18484] Novell Open Enterprise Server Remote Manager Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2006-01-16 A vulnerability has been reported in Novell Open Enterprise Server Remote Manager, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18484/ -- [SA18478] Mandriva update for clamav Critical: Highly critical Where: From remote Impact: System access Released: 2006-01-17 Mandriva has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18478/ -- [SA18463] Trustix update for multiple packages Critical: Highly critical Where: From remote Impact: System access, DoS, Privilege escalation Released: 2006-01-16 Trustix has issued updates for multiple packages. These fix some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges, and by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18463/ -- [SA18453] Gentoo update for clamav Critical: Highly critical Where: From remote Impact: System access Released: 2006-01-13 Gentoo has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18453/ -- [SA18435] Gentoo update for sun-jdk/sun-jre-bin/blackdown-jdk/blackdown-jre Critical: Highly critical Where: From remote Impact: System access Released: 2006-01-16 Gentoo has issued updates for sun-jdk, sun-jre-bin, blackdown-jdk, and blackdown-jre. These fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/18435/ -- [SA18520] Fedora update for kdegraphics Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-01-17 Fedora has issued an update for kdegraphics. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/18520/ -- [SA18509] OpenServer update for gdk-pixbuf Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-01-16 SCO has issued an update for gdk-pixbuf. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/18509/ -- [SA18507] Avaya PDS HP-UX SecureShell Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: Privilege escalation, DoS Released: 2006-01-18 Avaya has acknowledged a security issue and a vulnerability in Predictive Dialer System (PDS), which can be exploited by malicious people to cause a DoS (Denial of Service) or by malicious users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/18507/ -- [SA18496] Debian update for albatross Critical: Moderately critical Where: From remote Impact: System access Released: 2006-01-16 Debian has issued an update for albatross. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18496/ -- [SA18491] Avaya Products xloadimage NIFF Image Handling Buffer Overflow Critical: Moderately critical Where: From remote Impact: System access Released: 2006-01-17 Avaya has acknowledged a vulnerability in various products, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/18491/ -- [SA18489] Mandriva update for hylafax Critical: Moderately critical Where: From remote Impact: Security Bypass, System access Released: 2006-01-17 Mandrake has issued an update for hylafax. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18489/ -- [SA18482] Linux Kernel Multiple Denial of Service Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-01-16 Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18482/ -- [SA18481] Debian update for mantis Critical: Moderately critical Where: From remote Impact: Unknown, Cross Site Scripting, Manipulation of data, Exposure of sensitive information Released: 2006-01-18 Debian has issued an update for mantis. This fixes some vulnerabilities, where some have unknown impacts and others potentially can be exploited by malicious people to conduct cross-site scripting, HTTP response splitting, and SQL injection attacks, and disclose sensitive information. Full Advisory: http://secunia.com/advisories/18481/ -- [SA18457] Albatross Arbitrary Command Execution Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2006-01-16 A vulnerability has been reported in Albatross, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18457/ -- [SA18456] Ubuntu update for mailman Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-01-16 Ubuntu has issued an update for mailman. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18456/ -- [SA18452] Gentoo update for blender Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-01-13 Gentoo has issued an update for blender. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/18452/ -- [SA18451] Gentoo update for wine Critical: Moderately critical Where: From remote Impact: System access Released: 2006-01-13 Gentoo has issued an update for wine. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/18451/ -- [SA18449] Mailman Dates Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-01-16 A vulnerability has been reported in Mailman, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18449/ -- [SA18448] Fedora update for tetex Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-01-13 Fedora has issued an update for tetex. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/18448/ -- [SA18436] Debian update for gpdf Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-01-13 Debian has issued an update for gpdf. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/18436/ -- [SA18525] CMU SNMP snmptrapd Format String Vulnerability Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2006-01-17 Seregorn has reported a vulnerability in CMU SNMP, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18525/ -- [SA18495] EMC NetWorker Denial of Service and Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2006-01-17 Jo Goossens has reported some vulnerabilities in EMC NetWorker, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18495/ -- [SA18526] Red Hat update for apache Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-01-17 Red Hat has issued an update for apache. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18526/ -- [SA18510] Red Hat update for kernel Critical: Less critical Where: From remote Impact: Exposure of sensitive information, DoS Released: 2006-01-17 Red Hat has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited malicious, local users to cause a DoS (Denial of Service) and gain knowledge of potentially sensitive information, and by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18510/ -- [SA18472] Widexl Download Tracker "ID" Parameter Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-01-16 Preddy has reported a vulnerability in Widexl Download Tracker, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18472/ -- [SA18468] Faq-O-Matic Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-01-16 Preddy has reported some vulnerabilities in Faq-O-Matic, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18468/ -- [SA18530] Debian update for antiword Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-01-18 Debian has issued an update for antiword. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/18530/ -- [SA18527] Ubuntu update for kernel Critical: Less critical Where: Local system Impact: Exposure of sensitive information, DoS Released: 2006-01-18 Ubuntu has issued an update for the kernel. This fixes some vulnerabilities, which potentially can be exploited by malicious, local users to gain knowledge of potentially sensitive information and cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18527/ -- [SA18502] Avaya Products util-linux / mount Security Issue and Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-01-17 Avaya has acknowledged a security issue and a vulnerability in various products, which potentially can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/18502/ -- [SA18498] Sun Solaris lpsched Unspecified Vulnerability Critical: Less critical Where: Local system Impact: Security Bypass Released: 2006-01-16 A vulnerability has been reported in lpsched, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/18498/ -- [SA18497] Serial Line Sniffer "HOME" Environment Variable Buffer Overflow Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-01-16 Sintigan has discovered a vulnerability in Serial Line Sniffer (slsnif), which potentially can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/18497/ -- [SA18487] Linux Kernel dm-crypt Driver Information Disclosure Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2006-01-17 Stefan Rompf has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/18487/ -- [SA18476] Debian update for tuxpaint Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-01-16 Debian has issued an update for tuxpaint. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/18476/ -- [SA18475] Tux Paint Insecure Temporary File Creation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-01-16 Javier Fernandez-Sanguino Pena has reported a vulnerability in Tux Paint (tuxpaint), which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/18475/ -- [SA18474] Ubuntu update for tuxpaint Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-01-16 Ubuntu has issued an update for tuxpaint. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/18474/ -- [SA18438] Kolab Server Secure SMTP Message Logging Security Issue Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2006-01-13 A security issue has been reported in Kolab Server, which potentially can be exploited by malicious, local users to disclose certain sensitive information. Full Advisory: http://secunia.com/advisories/18438/ -- [SA18433] Debian update for fetchmail Critical: Not critical Where: From remote Impact: DoS Released: 2006-01-13 Debian has issued an update for fetchmail. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18433/ -- [SA18458] grsecurity RBAC Admin Role Dropping Security Issue Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2006-01-16 A security issue has been reported in grsecurity, which can cause certain services to run with escalated privileges. Full Advisory: http://secunia.com/advisories/18458/ Other:-- [SA18483] Intracom JetSpeed ADSL Modem Information Disclosure Critical: Less critical Where: From remote Impact: Exposure of sensitive information Released: 2006-01-16 Dinos has reported a security issue in Intracom JetSpeed ADSL Modem, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/18483/ -- [SA18528] Cisco IOS CDP Status Page Script Insertion Vulnerability Critical: Less critical Where: From local network Impact: Cross Site Scripting Released: 2006-01-18 Digitalmunitions.com has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/18528/ -- [SA18514] ACT WLAN Phone P202S Multiple Security Issues Critical: Less critical Where: From local network Impact: Unknown, Security Bypass, Exposure of system information, DoS Released: 2006-01-17 Shawn Merdinger has reported some security issues in ACT WLAN Phone P202S, which can be exploited by malicious people to potentially disclose system information, potentially cause a DoS (Denial of Service), and bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/18514/ -- [SA18505] Clipcomm CWP-100/CP-100E Debug Service Unauthenticated Access Critical: Less critical Where: From local network Impact: Hijacking, Security Bypass, Manipulation of data, Exposure of system information Released: 2006-01-18 Shawn Merdinger has reported a security issue in Clipcomm CWP-100 and Clipcomm CP-100E, which can be exploited by malicious people to disclose system information, manipulate certain information, and bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/18505/ -- [SA18490] Cisco IOS Stack Group Bidding Protocol Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2006-01-19 A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18490/ -- [SA18479] Cisco IP Phones SYN Flood Device Reload Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2006-01-16 A vulnerability has been reported in Cisco 7940 and 7960 IP Phones, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18479/ -- [SA18461] Linksys BEFVP41 IP Option Length Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2006-01-18 Paul has reported a vulnerability in Linksys BEFVP41, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18461/ -- [SA18512] MPN HP-180W Wireless IP Phone Information Disclosure Critical: Not critical Where: From local network Impact: Exposure of system information, DoS Released: 2006-01-17 Shawn Merdinger has reported a weakness in MPN HP-180W Wireless IP Phone, which can be exploited by malicious people to disclose system information and potentially cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18512/ -- [SA18511] ZyXEL P-2000W_v2 VoIP Wi-Fi Phone Information Disclosure Critical: Not critical Where: From local network Impact: Exposure of system information, DoS Released: 2006-01-17 Shawn Merdinger has reported a weakness in ZyXEL P-2000W_v2 VoIP Wi-Fi Phone, which can be exploited by malicious people to disclose system information and potentially cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18511/ Cross Platform:-- [SA18450] Light Weight Calendar "date" PHP Code Execution Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-01-13 Aliaksandr Hartsuyeu has reported a vulnerability in Light Weight Calendar, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18450/ -- [SA18432] ACal "ACalAuthenticate" Authentication Bypass Vulnerability Critical: Highly critical Where: From remote Impact: Security Bypass, System access Released: 2006-01-12 Aliaksandr Hartsuyeu has discovered a vulnerability in ACal, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18432/ -- [SA18518] phpXplorer "sShare" Local File Inclusion Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2006-01-17 Oriol Torrent Santiago has discovered a vulnerability in phpXplorer, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/18518/ -- [SA18513] Joomla! Multiple Unspecified Vulnerabilities Critical: Moderately critical Where: From remote Impact: Unknown Released: 2006-01-18 Multiple vulnerabilities with unknown impacts have been reported in Joomla!. Full Advisory: http://secunia.com/advisories/18513/ -- [SA18504] geoBlog "cat" Parameter SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2006-01-16 Aliaksandr Hartsuyeu has discovered a vulnerability in geoBlog, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/18504/ -- [SA18499] WB News "name" Script Insertion Vulnerability Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-01-18 DragoN has discovered a vulnerability in WB News, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/18499/ -- [SA18493] Oracle Products Multiple Vulnerabilities and Security Issues Critical: Moderately critical Where: From remote Impact: Unknown, Manipulation of data, Exposure of system information, Exposure of sensitive information Released: 2006-01-18 82 vulnerabilities and security issues have been reported in various Oracle products. Some have an unknown impact, and others can be exploited to gain knowledge of certain information, overwrite arbitrary files, and to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/18493/ -- [SA18485] Apache Geronimo Web-Access-Log Viewer Script Insertion Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-01-16 Oliver Karow has reported a vulnerability in Apache Geronimo, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/18485/ -- [SA18471] WP-Stats WordPress Plug-in "author" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-01-16 Preddy has discovered a vulnerability in WP-Stats, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/18471/ -- [SA18467] BlogPHP "username" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data Released: 2006-01-17 Aliaksandr Hartsuyeu has reported a vulnerability in BlogPHP, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/18467/ -- [SA18465] Trac HTML WikiProcessor Script Insertion Vulnerability Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-01-17 A vulnerability has been reported in Trac, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/18465/ -- [SA18464] Bit 5 Blog Script Insertion and SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Manipulation of data Released: 2006-01-16 Aliaksandr Hartsuyeu has reported some vulnerabilities in Bit 5 Blog, which can be exploited by malicious people to conduct script insertion and SQL injection attacks. Full Advisory: http://secunia.com/advisories/18464/ -- [SA18460] WhiteAlbum "dir" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-01-18 Liz0ziM has discovered a vulnerability in WhiteAlbum, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/18460/ -- [SA18459] PDFdirectory SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-01-17 Some vulnerabilities have been reported in PDFdirectory, which potentially can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/18459/ -- [SA18455] 123 Flash Chat Server Username Directory Traversal Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2006-01-16 Jesus Olmos Gonzalez has reported a vulnerability in 123 Flash Chat (123FlashChat) Server, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/18455/ -- [SA18446] Fortinet Products ISAKMP IKE Message Processing Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-01-13 Some vulnerabilities have been reported in Fortinet Products, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18446/ -- [SA18444] PHP Toolkit for PayPal Payment Bypass and Exposure of Transactions Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of sensitive information Released: 2006-01-13 .cens has reported two security issues in PHP Toolkit for PayPal, which can be exploited by malicious people to bypass certain security restrictions and disclose sensitive information. Full Advisory: http://secunia.com/advisories/18444/ -- [SA18442] microBlog "month" and "year" SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-01-18 Aliaksandr Hartsuyeu has discovered two vulnerabilities in microBlog, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/18442/ -- [SA18441] TankLogger "tank_id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-01-13 Aliaksandr Hartsuyeu has discovered a vulnerability in TankLogger, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/18441/ -- [SA18440] wordcircle Script Insertion and SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Manipulation of data Released: 2006-01-13 Aliaksandr Hartsuyeu has discovered two vulnerabilities in wordcircle, which can be exploited by malicious people to conduct script insertion and SQL injection attacks. Full Advisory: http://secunia.com/advisories/18440/ -- [SA18486] Dual DHCP DNS Server DHCP Options Buffer Overflow Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2006-01-18 Luigi Auriemma has reported a vulnerability in Dual DHCP DNS Server, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18486/ -- [SA18519] CubeCart Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-01-17 Lostmon has discovered some vulnerabilities in CubeCart, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18519/ -- [SA18477] Ultimate Auction Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-01-16 Querkopf has reported two vulnerabilities in Ultimate Auction, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18477/ -- [SA18473] RedKernel Referrer Tracker "rkrt_stats.php" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-01-16 Preddy has discovered a vulnerability in RedKernel Referrer Tracker, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18473/ -- [SA18470] GTP iCommerce Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-01-16 Preddy has reported two vulnerabilities in GTP iCommerce, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18470/ -- [SA18469] Netbula Anyboard "tK" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-01-16 Preddy has reported a vulnerability in Netbula Anyboard, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18469/ -- [SA18462] Benders Calendar Multiple SQL Injection Vulnerabilities Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2006-01-16 Aliaksandr Hartsuyeu has discovered some vulnerabilities in Benders Calendar, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/18462/ -- [SA18454] SMBCMS Site Search Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-01-17 $um$id has reported a vulnerability in SMBCMS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18454/ -- [SA18447] H-Sphere "login" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-01-13 M.Neset KABAKLI has reported a vulnerability in H-Sphere, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18447/ -- [SA18445] Interspire TrackPoint NX "username" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-01-13 M.Neset KABAKLI has reported a vulnerability in Interspire TrackPoint NX, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18445/ -- [SA18434] Mantis Multiple Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-01-17 Some vulnerabilities have been reported in Mantis, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18434/ -- [SA18506] Avaya gdb Integer Overflow and Insecure Initialisation File Handling Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-01-18 Avaya has acknowledged two vulnerabilities in various products, which potentially can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/18506/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _________________________________ InfoSec News v2.0 - Coming Soon! http://www.infosecnews.org
This archive was generated by hypermail 2.1.3 : Thu Jan 19 2006 - 22:32:46 PST