======================================================================== The Secunia Weekly Advisory Summary 2006-05-25 - 2006-06-01 This week: 102 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: The Secunia staff is spending hours every day to assure you the best and most reliable source for vulnerability information. Every single vulnerability report is being validated and verified before a Secunia advisory is written. Secunia validates and verifies vulnerability reports in many different ways e.g. by downloading the software and performing comprehensive tests, by reviewing source code, or by validating the credibility of the source from which the vulnerability report was issued. As a result, Secunia's database is the most correct and complete source for recent vulnerability information available on the Internet. Secunia Online Vulnerability Database: http://secunia.com/ ======================================================================== 2) This Week in Brief: eEye Digital Security has reported a vulnerability in Symantec Client Security and Symantec AntiVirus Corporate Edition, which can be exploited by malicious people to compromise a user's system. Users of Symantec products are advised to view the referenced Secunia advisory for additional details and information about patches. Reference: http://secunia.com/SA20318 -- VIRUS ALERTS: Secunia has not issued any virus alerts during the week. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA20153] Microsoft Word Malformed Object Code Execution Vulnerability 2. [SA19762] Internet Explorer "object" Tag Memory Corruption Vulnerability 3. [SA20107] RealVNC Password Authentication Bypass Vulnerability 4. [SA19738] Internet Explorer "mhtml:" Redirection Disclosure of Sensitive Information 5. [SA20261] Cisco VPN Client Privilege Escalation Vulnerability 6. [SA19521] Internet Explorer Window Loading Race Condition Address Bar Spoofing 7. [SA18680] Microsoft Internet Explorer "createTextRange()" Code Execution 8. [SA20288] Novell Netware abend.log User Credentials Disclosure 9. [SA15601] Mozilla / Mozilla Firefox Frame Injection Vulnerability 10. [SA20300] Basic Analysis and Security Engine "BASE_path" File Inclusion ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA20361] wodSFTP ActiveX Component Arbitrary File Access Vulnerability [SA20318] Symantec Client Security / AntiVirus Unspecified Code Execution [SA20407] F-Secure Products Web Console Buffer Overflow Vulnerability [SA20357] Enigma Haber Multiple SQL Injection Vulnerabilities [SA20355] AspSitem SQL Injection and Private Message Disclosure [SA20348] Nukedit "groupid" Parameter Administrator Register Vulnerability [SA20347] Hitachi HITSENSER3 SQL Injection Vulnerability [SA20335] My Web Server Long URL Denial of Service [SA20317] Mini-NUKE SQL Injection Vulnerabilities [SA20309] qjForum member.asp SQL Injection Vulnerability [SA20294] NewsCMSLite Admin Logon Bypass Vulnerability [SA20360] ASPBB "search" Parameter Cross-Site Scripting Vulnerability [SA20319] Omegasoft Insel "WCE" Parameter Cross-Site Scripting [SA20342] Jiwa Financials Information Disclosure Vulnerability UNIX/Linux: [SA20313] Ubuntu update for nagios [SA20281] Mandriva update for mpg123 [SA20398] SUSE update for kernel [SA20374] 4nForum "tid" Parameter SQL Injection Vulnerability [SA20345] Gentoo update for libtiff [SA20344] Gentoo update for cherrypy [SA20339] Mandriva update for dia [SA20338] Debian update for kernel-source-2.4.17 [SA20326] Debian update for libextractor [SA20323] Open-Xchange Default Account Password [SA20314] Ubuntu update for postgresql [SA20284] Pre News Manager Multiple SQL Injection Vulnerabilities [SA20381] UnixWare update for MySQL [SA20283] Debian update for awstats [SA20396] SUSE update for rug [SA20389] FreeBSD ypserv Inoperative Access Controls Security Issue [SA20333] Debian update for mysql-dfsg [SA20302] OpenOBEX ircp File Overwrite Vulnerability [SA20390] FreeBSD SMBFS chroot Directory Traversal Vulnerability [SA20388] SUSE update for vixie-cron [SA20380] Vixie Cron "do_command.c" setuid Security Issue [SA20370] Shadow "useradd.c" Insecure Mailbox File Permissions [SA20368] Debian update for motor [SA20332] Avaya PDS Software Distributor Privilege Escalation [SA20329] Motor ktools VGETSTRING Buffer Overflow Vulnerability [SA20325] AIX lsmcode Unspecified Privilege Escalation Vulnerability [SA20312] SUSE update for foomatic-filters [SA20369] xine-lib HTTP Response Heap Corruption Weakness [SA20330] Debian update for tiff [SA20315] Debian update for dovecot [SA20308] Dovecot "LIST" Command Directory Traversal Weakness [SA20349] Linux Kernel SMP "/proc" Race Condition Denial of Service [SA20337] PHP "curl_init()" Safe Mode Bypass Weakness Other: [SA20378] Secure Elements Class 5 AVR Multiple Vulnerabilities [SA20343] D-Link Airspot DSA-3100 Gateway "uname" Cross-Site Scripting [SA20288] Novell Netware abend.log User Credentials Disclosure [SA20377] Secure Elements Class 5 AVR Message Encryption Security Issue Cross Platform: [SA20404] METAjour "system_path" Parameter File Inclusion Vulnerabilities [SA20399] Ottoman "default_path" File Inclusion Vulnerabilities [SA20373] phpMyDesktop|arcade Local File Inclusion and Script Insertion [SA20364] IBM DCE Two Kerberos Vulnerabilities [SA20358] F@cile Interactive Web Multiple Vulnerabilities [SA20356] tinyBB SQL Injection and File Inclusion Vulnerabilities [SA20354] phpBB Activity Mod Plus Module "phpbb_root_path" File Inclusion [SA20353] UBB.threads Cross-Site Scripting and File Inclusion [SA20350] phpBB Blend Portal System Module "phpbb_root_path" File Inclusion [SA20346] Fastpublish CMS "config[fsBase]" File Inclusion Vulnerabilities [SA20331] Hot Open Tickets "CLASS_PATH" Parameter File Inclusion [SA20310] Plume CMS "/manager/frontinc/prepend.php" File Inclusion [SA20301] open-medium.CMS "404.php" File Inclusion Vulnerability [SA20300] Basic Analysis and Security Engine "BASE_path" File Inclusion [SA20299] ActionApps "GLOBALS[AA_INC_PATH]" File Inclusion [SA20298] DoceboLMS "lang" Parameter File Inclusion Vulnerabilities [SA20292] Back-End CMS "_PSL[classdir]" File Inclusion Vulnerability [SA20375] pppBLOG "files[0]" Parameter Disclosure of Sensitive Information [SA20367] WebCalendar "includedir" Parameter Arbitrary Setting File Loading [SA20366] WikiNi Script Insertion Vulnerabilities [SA20359] phpBB Nivisec Hacks List Module Local File Inclusion [SA20352] Eggblog posts.php SQL Injection Vulnerability [SA20351] aMule Information Disclosure Vulnerability [SA20316] Geeklog Multiple Vulnerabilities and Weaknesses [SA20307] Seditio "Referer" HTTP Header Script Insertion Vulnerability [SA20304] ByteHoard File Copy and Script Insertion Vulnerabilities [SA20303] MailManager PostgreSQL Encoding-Based SQL Injection [SA20297] V-webmail "CONFIG[pear_dir]" File Inclusion Vulnerability [SA20295] Pre Shopping Mall SQL Injection Vulnerabilities [SA20290] ChatPat Script Insertion and SQL Injection Vulnerabilities [SA20287] iFdate Cross-Site Scripting and Script Insertion Vulnerabilities [SA20286] Realty Pro One Cross-Site Scripting and SQL Injection [SA20363] XiTi Tracking Script "xiti.js" Cross-Site Scripting Vulnerabilities [SA20341] Open Searchable Image Catalogue SQL Injection Vulnerabilities [SA20340] DGNews "upprocess.php" File Upload Vulnerability [SA20336] Photoalbum B&W "index.php" Cross-Site Scripting Vulnerabilities [SA20334] TikiWiki Multiple Cross-Site Scripting Vulnerabilities [SA20327] Achievo "atkselector" Parameter SQL Injection Vulnerability [SA20324] Vacation Rental Script "obj" Parameter Cross-Site Scripting [SA20322] Pretty Guestbook "pagina" Cross-Site Scripting Vulnerability [SA20321] Smile Guestbook "pagina" Cross-Site Scripting Vulnerability [SA20320] Morris Guestbook "pagina" Cross-Site Scripting Vulnerability [SA20311] php-residence Multiple Script Insertion Vulnerabilities [SA20306] PHPSimpleChoose Cross-Site Scripting Vulnerability [SA20305] PHP-AGTC membership system "useremail" Script Insertion [SA20296] CMS Mundo "searchstring" Cross-Site Scripting Vulnerability [SA20293] phpESP ADOdb Cross-Site Scripting Vulnerabilities [SA20291] AZ Photo Album Script Pro Cross-Site Scripting Vulnerability [SA20289] Elite-Board "search" Parameter Cross-Site Scripting Vulnerability [SA20285] Assetman Unspecified Script Insertion Vulnerabilities [SA20282] iFlance Multiple Cross-Site Scripting Vulnerabilities ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA20361] wodSFTP ActiveX Component Arbitrary File Access Vulnerability Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2006-05-31 Will Dormann has reported a vulnerability in WeOnlyDo wodSFTP, which can be exploited by malicious people to disclose sensitive information and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/20361/ -- [SA20318] Symantec Client Security / AntiVirus Unspecified Code Execution Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-29 eEye Digital Security has reported a vulnerability in Symantec Client Security and Symantec AntiVirus Corporate Edition, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/20318/ -- [SA20407] F-Secure Products Web Console Buffer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-06-01 A vulnerability has been reported in F-Secure Anti-Virus for Microsoft Exchange and F-Secure Internet Gatekeeper, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20407/ -- [SA20357] Enigma Haber Multiple SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-05-29 Mustafa Can Bjorn has reported some vulnerabilities in Enigma Haber, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20357/ -- [SA20355] AspSitem SQL Injection and Private Message Disclosure Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2006-05-29 Mustafa Can Bjorn has reported two vulnerabilities in AspSitem, which can be exploited by malicious users to disclose sensitive information or malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20355/ -- [SA20348] Nukedit "groupid" Parameter Administrator Register Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2006-05-30 FarhadKey has discovered a vulnerability in Nukedit, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20348/ -- [SA20347] Hitachi HITSENSER3 SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-05-31 A vulnerability has been reported in Hitachi HITSENSER3, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20347/ -- [SA20335] My Web Server Long URL Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-05-29 s3rv3r_hack3r has discovered a vulnerability in My Web Server, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20335/ -- [SA20317] Mini-NUKE SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-05-29 Mustafa Can Bjorn has reported some vulnerabilities in Mini-NUKE, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20317/ -- [SA20309] qjForum member.asp SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-05-29 ajann has reported a vulnerability in qjForum, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20309/ -- [SA20294] NewsCMSLite Admin Logon Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2006-05-26 FarhadKey has discovered a vulnerability in NewsCMSLite, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20294/ -- [SA20360] ASPBB "search" Parameter Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-29 Mustafa Can Bjorn has reported a vulnerability in ASPBB, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20360/ -- [SA20319] Omegasoft Insel "WCE" Parameter Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-31 MC.Iglo has reported a vulnerability in Omegasoft Insel, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20319/ -- [SA20342] Jiwa Financials Information Disclosure Vulnerability Critical: Less critical Where: From local network Impact: Exposure of sensitive information Released: 2006-05-30 Robert Passlow has reported a vulnerability in Jiwa Financials, which can be exploited by malicious users to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/20342/ UNIX/Linux:-- [SA20313] Ubuntu update for nagios Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-05-30 Ubuntu has issued an update for nagios. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20313/ -- [SA20281] Mandriva update for mpg123 Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-29 Mandriva has issued an update for mpg123. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/20281/ -- [SA20398] SUSE update for kernel Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of system information, Exposure of sensitive information, DoS Released: 2006-06-01 SUSE has issued an update for the kernel. This fixes some vulnerabilities and weaknesses, which can be exploited by malicious, local users to bypass certain security restrictions, gain knowledge of potentially sensitive information and to cause a DoS (Denial of Service), and by malicious people to disclose certain system information, potentially to bypass certain security restrictions and to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20398/ -- [SA20374] 4nForum "tid" Parameter SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-05-31 CrAzY CrAcKeR has reported a vulnerability in 4nForum, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20374/ -- [SA20345] Gentoo update for libtiff Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-05-31 Gentoo has issued an update for libtiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/20345/ -- [SA20344] Gentoo update for cherrypy Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2006-05-31 Gentoo has issued an update for cherrypy. This fixes a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/20344/ -- [SA20339] Mandriva update for dia Critical: Moderately critical Where: From remote Impact: System access Released: 2006-05-31 Mandriva has issued an update for dia. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/20339/ -- [SA20338] Debian update for kernel-source-2.4.17 Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, Privilege escalation, DoS, System access Released: 2006-05-31 Debian has issued an update for kernel-source-2.4.17. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain knowledge of sensitive information, cause a DoS (Denial of Service), gain escalated privileges, and by malicious people to cause a DoS, and disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/20338/ -- [SA20326] Debian update for libextractor Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-05-29 Debian has issued an update for libextractor. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application that uses the library. Full Advisory: http://secunia.com/advisories/20326/ -- [SA20323] Open-Xchange Default Account Password Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2006-05-29 Cemil Degirmenci has reported a security issue in Open-Xchange, which potentially can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20323/ -- [SA20314] Ubuntu update for postgresql Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-05-30 Ubuntu has issued an update for postgresql. This fixes two vulnerabilities, which potentially can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20314/ -- [SA20284] Pre News Manager Multiple SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2006-05-26 luny has reported some vulnerabilities in Pre News Manager, which can be exploited by malicious people to conduct cross-site scripting attacks and SQL injection attacks. Full Advisory: http://secunia.com/advisories/20284/ -- [SA20381] UnixWare update for MySQL Critical: Moderately critical Where: From local network Impact: System access Released: 2006-06-01 SCO has issued an update for MySQL. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20381/ -- [SA20283] Debian update for awstats Critical: Less critical Where: From remote Impact: Security Bypass, System access Released: 2006-05-26 Debian has issued an update for awstats. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20283/ -- [SA20396] SUSE update for rug Critical: Less critical Where: From local network Impact: Security Bypass, Exposure of sensitive information Released: 2006-06-01 SUSE has issued an update for rug. This fixes a security issue and a weakness, which can be exploited by malicious, local users to disclose certain sensitive information and potentially by malicious people to bypass security restrictions. Full Advisory: http://secunia.com/advisories/20396/ -- [SA20389] FreeBSD ypserv Inoperative Access Controls Security Issue Critical: Less critical Where: From local network Impact: Security Bypass Released: 2006-06-01 A security issue has been reported in FreeBSD, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20389/ -- [SA20333] Debian update for mysql-dfsg Critical: Less critical Where: From local network Impact: Security Bypass, Exposure of sensitive information, System access Released: 2006-05-29 Debian has issued an update for mysql-dfsg. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions, disclose potentially sensitive information, and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20333/ -- [SA20302] OpenOBEX ircp File Overwrite Vulnerability Critical: Less critical Where: From local network Impact: Manipulation of data Released: 2006-05-26 Jeroen van Wolffelaar has reported a vulnerability in Open OBEX, which can be exploited by malicious people to manipulate certain data on a user's system. Full Advisory: http://secunia.com/advisories/20302/ -- [SA20390] FreeBSD SMBFS chroot Directory Traversal Vulnerability Critical: Less critical Where: Local system Impact: Security Bypass Released: 2006-06-01 A vulnerability has been reported in FreeBSD, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20390/ -- [SA20388] SUSE update for vixie-cron Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-06-01 SUSE has issued an update for vixie-cron. This fixes a security issue, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/20388/ -- [SA20380] Vixie Cron "do_command.c" setuid Security Issue Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-06-01 Roman Veretelnikov has reported a security issue in Vixie Cron, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/20380/ -- [SA20370] Shadow "useradd.c" Insecure Mailbox File Permissions Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-05-31 A security issue has been reported in Shadow, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/20370/ -- [SA20368] Debian update for motor Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-05-31 Debian has issued an update for motor. This fixes a vulnerability, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/20368/ -- [SA20332] Avaya PDS Software Distributor Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-05-29 Avaya has acknowledged a vulnerability in Avaya Predictive Dialing System (PDS), which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/20332/ -- [SA20329] Motor ktools VGETSTRING Buffer Overflow Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-05-31 A vulnerability has been reported in Motor, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/20329/ -- [SA20325] AIX lsmcode Unspecified Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-05-29 A vulnerability has been reported in AIX, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/20325/ -- [SA20312] SUSE update for foomatic-filters Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-05-30 SUSE has issued an update for foomatic-filters. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/20312/ -- [SA20369] xine-lib HTTP Response Heap Corruption Weakness Critical: Not critical Where: From remote Impact: DoS Released: 2006-05-31 Federico L. Bossi Bonin has discovered a weakness in xine-lib, which can be exploited by malicious people to crash certain applications on a user's system. Full Advisory: http://secunia.com/advisories/20369/ -- [SA20330] Debian update for tiff Critical: Not critical Where: From remote Impact: DoS Released: 2006-05-29 Debian has issued an update for tiff. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20330/ -- [SA20315] Debian update for dovecot Critical: Not critical Where: From remote Impact: Exposure of sensitive information Released: 2006-05-29 Debian has issued an update for dovecot. This fixes a weakness, which can be exploited by malicious users to gain knowledge of potentially sensitive information. Full Advisory: http://secunia.com/advisories/20315/ -- [SA20308] Dovecot "LIST" Command Directory Traversal Weakness Critical: Not critical Where: From remote Impact: Exposure of sensitive information Released: 2006-05-29 A weakness has been reported in Dovecot, which can be exploited by malicious users to gain knowledge of potentially sensitive information. Full Advisory: http://secunia.com/advisories/20308/ -- [SA20349] Linux Kernel SMP "/proc" Race Condition Denial of Service Critical: Not critical Where: Local system Impact: DoS Released: 2006-05-31 Tony Griffiths has reported a vulnerability in the Linux Kernel, which can be exploited malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20349/ -- [SA20337] PHP "curl_init()" Safe Mode Bypass Weakness Critical: Not critical Where: Local system Impact: Security Bypass Released: 2006-05-30 Maksymilian Arciemowicz has discovered a weakness in PHP, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20337/ Other:-- [SA20378] Secure Elements Class 5 AVR Multiple Vulnerabilities Critical: Moderately critical Where: From local network Impact: Security Bypass, Spoofing, Exposure of system information, Exposure of sensitive information, DoS, System access Released: 2006-05-31 Multiple vulnerabilities and security issues have been reported in Secure Elements Class 5 AVR, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, spoof the contents of messages, cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20378/ -- [SA20343] D-Link Airspot DSA-3100 Gateway "uname" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-29 jaime.blasco has reported a vulnerability in D-Link Airspot DSA-3100 Gateway, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20343/ -- [SA20288] Novell Netware abend.log User Credentials Disclosure Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2006-05-26 A security issue has been reported in Novell Netware, which can be exploited by malicious, local users to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/20288/ -- [SA20377] Secure Elements Class 5 AVR Message Encryption Security Issue Critical: Not critical Where: From local network Impact: Exposure of sensitive information Released: 2006-05-31 A security issue has been reported in Secure Elements Class 5 AVR, which potentially can be exploited by malicious people to disclose certain sensitive information. Full Advisory: http://secunia.com/advisories/20377/ Cross Platform:-- [SA20404] METAjour "system_path" Parameter File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-06-01 Kacper has discovered some vulnerabilities in METAjour, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20404/ -- [SA20399] Ottoman "default_path" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-06-01 Kacper has discovered some vulnerabilities in Ottoman, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20399/ -- [SA20373] phpMyDesktop|arcade Local File Inclusion and Script Insertion Critical: Highly critical Where: From remote Impact: Exposure of sensitive information, System access, Cross Site Scripting Released: 2006-05-31 darkgod has discovered two vulnerabilities in phpMyDesktop|arcade, which can be exploited by malicious people to conduct script insertion attacks, disclose sensitive information, and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20373/ -- [SA20364] IBM DCE Two Kerberos Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-06-01 IBM has acknowledged two vulnerabilities in IBM DCE, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20364/ -- [SA20358] F@cile Interactive Web Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Cross Site Scripting, System access Released: 2006-05-29 Mustafa Can Bjorn has reported some vulnerabilities in F@cile Interactive Web, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20358/ -- [SA20356] tinyBB SQL Injection and File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: Manipulation of data, System access Released: 2006-05-29 Mustafa Can Bjorn has discovered some vulnerabilities in tinyBB, which can be exploited by malicious people to conduct SQL injection attacks and to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20356/ -- [SA20354] phpBB Activity Mod Plus Module "phpbb_root_path" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-30 Mustafa Can Bjorn has reported a vulnerability in the Activity Mod Plus module for phpBB, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20354/ -- [SA20353] UBB.threads Cross-Site Scripting and File Inclusion Critical: Highly critical Where: From remote Impact: Cross Site Scripting, System access Released: 2006-05-30 Mustafa Can Bjorn has discovered some vulnerabilities in UBB.threads, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20353/ -- [SA20350] phpBB Blend Portal System Module "phpbb_root_path" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-30 Mustafa Can Bjorn has reported a vulnerability in the Blend Portal System module for phpBB, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20350/ -- [SA20346] Fastpublish CMS "config[fsBase]" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-30 Kacper has reported some vulnerabilities in Fastpublish CMS, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20346/ -- [SA20331] Hot Open Tickets "CLASS_PATH" Parameter File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-29 Kacper has discovered a vulnerability in Hot Open Tickets, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20331/ -- [SA20310] Plume CMS "/manager/frontinc/prepend.php" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-29 beford has discovered a vulnerability in Plume CMS, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20310/ -- [SA20301] open-medium.CMS "404.php" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-26 Kacper has discovered a vulnerability in the open-medium.CMS, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20301/ -- [SA20300] Basic Analysis and Security Engine "BASE_path" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-26 str0ke has discovered some vulnerabilities in Basic Analysis and Security Engine, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20300/ -- [SA20299] ActionApps "GLOBALS[AA_INC_PATH]" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-26 Kacper has discovered some vulnerabilities in ActionApps, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20299/ -- [SA20298] DoceboLMS "lang" Parameter File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-26 beford has discovered some vulnerabilities in DoceboLMS, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20298/ -- [SA20292] Back-End CMS "_PSL[classdir]" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-26 Kacper has discovered a vulnerability in Back-End CMS, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20292/ -- [SA20375] pppBLOG "files[0]" Parameter Disclosure of Sensitive Information Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2006-06-01 rgod has discovered a vulnerability in pppBLOG, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/20375/ -- [SA20367] WebCalendar "includedir" Parameter Arbitrary Setting File Loading Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of sensitive information Released: 2006-05-31 socsam has discovered a vulnerability in WebCalendar, which can be exploited by malicious people to bypass certain security restrictions and disclose sensitive information. Full Advisory: http://secunia.com/advisories/20367/ -- [SA20366] WikiNi Script Insertion Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-30 Raphael Huck has discovered some vulnerabilities in WikiNi, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/20366/ -- [SA20359] phpBB Nivisec Hacks List Module Local File Inclusion Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2006-05-29 Mustafa Can Bjorn has discovered a vulnerability in the Nivisec Hacks List module for phpBB, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/20359/ -- [SA20352] Eggblog posts.php SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-05-29 Mustafa Can Bjorn has discovered a vulnerability in Eggblog, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20352/ -- [SA20351] aMule Information Disclosure Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2006-05-29 A vulnerability has been reported in aMule, which can be exploited by malicious people and by malicious users to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/20351/ -- [SA20316] Geeklog Multiple Vulnerabilities and Weaknesses Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data, Exposure of system information Released: 2006-05-30 trueend5 has reported some vulnerabilities and weaknesses in Geeklog, which can be exploited by malicious people to disclose system information, and conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/20316/ -- [SA20307] Seditio "Referer" HTTP Header Script Insertion Vulnerability Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-29 Yunus Emre Yilmaz has discovered a vulnerability in Seditio, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/20307/ -- [SA20304] ByteHoard File Copy and Script Insertion Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2006-05-29 Nomenumbra has discovered two vulnerabilities in ByteHoard, which can be exploited by malicious people to manipulate sensitive information and conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/20304/ -- [SA20303] MailManager PostgreSQL Encoding-Based SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-05-26 A vulnerability has been reported in MailManager, which potentially can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20303/ -- [SA20297] V-webmail "CONFIG[pear_dir]" File Inclusion Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2006-05-26 beford has discovered a vulnerability in V-webmail, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20297/ -- [SA20295] Pre Shopping Mall SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-05-26 luny has reported some vulnerabilities in Pre Shopping Mall, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20295/ -- [SA20290] ChatPat Script Insertion and SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2006-05-26 luny has reported two vulnerabilities in ChatPat, which can be exploited by malicious people to conduct script insertion and SQL injection attacks. Full Advisory: http://secunia.com/advisories/20290/ -- [SA20287] iFdate Cross-Site Scripting and Script Insertion Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-26 luny has reported some vulnerabilities in iFdate, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks. Full Advisory: http://secunia.com/advisories/20287/ -- [SA20286] Realty Pro One Cross-Site Scripting and SQL Injection Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2006-05-26 luny has reported some vulnerabilities in Realty Pro One, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/20286/ -- [SA20363] XiTi Tracking Script "xiti.js" Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-31 Yannick Daffaud has reported two vulnerabilities in the XiTi Tracking Script, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20363/ -- [SA20341] Open Searchable Image Catalogue SQL Injection Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2006-05-31 Nenad Jovanovic has discovered some vulnerabilities in Open Searchable Image Catalogue, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20341/ -- [SA20340] DGNews "upprocess.php" File Upload Vulnerability Critical: Less critical Where: From remote Impact: System access Released: 2006-05-30 r0t has discovered a vulnerability in DGNews, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20340/ -- [SA20336] Photoalbum B&W "index.php" Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-30 black-code and sweet-devil have discovered some vulnerabilities in Photoalbum B&W, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20336/ -- [SA20334] TikiWiki Multiple Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-29 Blwood has discovered some vulnerabilities in TikiWiki, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20334/ -- [SA20327] Achievo "atkselector" Parameter SQL Injection Vulnerability Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2006-05-30 Christian Nancy has reported a vulnerability in Achievo, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20327/ -- [SA20324] Vacation Rental Script "obj" Parameter Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-29 luny has discovered a vulnerability in Vacation Rental Script, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20324/ -- [SA20322] Pretty Guestbook "pagina" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-29 luny has discovered a vulnerability in Pretty Guestbook, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20322/ -- [SA20321] Smile Guestbook "pagina" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-29 luny has discovered a vulnerability in Smile Guestbook, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20321/ -- [SA20320] Morris Guestbook "pagina" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-29 luny has discovered a vulnerability in Morris Guestbook, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20320/ -- [SA20311] php-residence Multiple Script Insertion Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-29 Nomenumbra has reported some vulnerabilities in php-residence, which can be exploited by malicious users to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/20311/ -- [SA20306] PHPSimpleChoose Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-29 luny has discovered a vulnerability in PHPSimpleChoose, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20306/ -- [SA20305] PHP-AGTC membership system "useremail" Script Insertion Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-29 Nomenumbra has discovered a vulnerability in PHP-AGTC membership system, which can be exploited by malicious users to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/20305/ -- [SA20296] CMS Mundo "searchstring" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-26 luny has reported a vulnerability in CMS Mundo, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20296/ -- [SA20293] phpESP ADOdb Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-29 Some vulnerabilities have been reported in phpESP, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20293/ -- [SA20291] AZ Photo Album Script Pro Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-26 luny has reported a vulnerability in AZ Photo Album Script Pro, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20291/ -- [SA20289] Elite-Board "search" Parameter Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-26 luny has reported a vulnerability in Elite-Board, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20289/ -- [SA20285] Assetman Unspecified Script Insertion Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-29 Nomenumbra has reported some vulnerabilities in Assetman, which can be exploited by malicious users to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/20285/ -- [SA20282] iFlance Multiple Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-26 luny has reported some vulnerabilities in iFlance, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20282/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _________________________________ Attend the Black Hat Briefings and Training, Las Vegas July 29 - August 3 2,500+ international security experts from 40 nations, 10 tracks, no vendor pitches. www.blackhat.com
This archive was generated by hypermail 2.1.3 : Thu Jun 01 2006 - 22:49:35 PDT