======================================================================== The Secunia Weekly Advisory Summary 2006-07-13 - 2006-07-20 This week: 82 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: The Secunia staff is spending hours every day to assure you the best and most reliable source for vulnerability information. Every single vulnerability report is being validated and verified before a Secunia advisory is written. Secunia validates and verifies vulnerability reports in many different ways e.g. by downloading the software and performing comprehensive tests, by reviewing source code, or by validating the credibility of the source from which the vulnerability report was issued. As a result, Secunia's database is the most correct and complete source for recent vulnerability information available on the Internet. Secunia Online Vulnerability Database: http://secunia.com/ ======================================================================== 2) This Week in Brief: Two vulnerabilities have been reported in Microsoft PowerPoint, which can be exploited by malicious people to compromise a user's system. NOTE: One of the vulnerabilities are currently being exploited in the wild. Further information can be found in the referenced Secunia advisories. References: http://secunia.com/SA21040 http://secunia.com/SA21061 -- Some vulnerabilities have been reported in Wireshark (formerly Ethereal), which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. The vendor has released an updated version. Reference: http://secunia.com/SA21078 -- Ryan Smith has reported a vulnerability in WinRAR, which can be exploited by malicious people to compromise a user's system. Successful exploitation allows execution of arbitrary code with the user's privileges. Reference: http://secunia.com/SA21080 -- Multiple vulnerabilities have been reported in various Oracle products. Some have an unknown impact and others can be exploited to conduct SQL injection attacks or compromise a vulnerable system. Further details about affected products and the vulnerabilities fixed can be found in the referenced Secunia advisory below. Reference: http://secunia.com/SA21111 -- VIRUS ALERTS: During the past week Secunia collected 165 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA21040] Microsoft PowerPoint Unspecified Code Execution Vulnerability 2. [SA20153] Microsoft Word Malformed Object Pointer Vulnerability 3. [SA20748] Microsoft Windows Hyperlink Object Library Buffer Overflow 4. [SA21037] McAfee ePolicy Orchestrator Directory Traversal Vulnerability 5. [SA21028] Cisco Router Web Setup Insecure Default Cisco IOS Configuration 6. [SA21059] Joomla Joomlaboard Component "sbp" File Inclusion Vulnerability 7. [SA21044] Mambo / Joomla perForms "mosConfig_absolute_path" File Inclusion 8. [SA21041] Linux Kernel "/proc" Race Condition Privilege Escalation 9. [SA21061] Microsoft PowerPoint Memory Corruption Vulnerability 10. [SA21053] Joomla com_hashcash Component File Inclusion Vulnerability ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA21040] Microsoft PowerPoint Unspecified Code Execution Vulnerability [SA21061] Microsoft PowerPoint Memory Corruption Vulnerability [SA21127] Quick 'n Easy FTP Server "LIST" Command Buffer Overflow [SA21108] FileCOPA FTP Server "LIST" Command Buffer Overflow [SA21080] WinRAR LHA Archive Processing Buffer Overflow [SA21058] Winlpd Long Request Buffer Overflow Vulnerability [SA21113] Symantec pcAnywhere CIF Files Privilege Escalation [SA21089] Outpost Firewall Pro Privilege Escalation Vulnerability [SA21088] Lavasoft Personal Firewall Privilege Escalation Vulnerability [SA21076] Citrix MetaFrame Insecure Default Registry Key Permissions [SA21096] Lotus Notes Deleted Mail Recipient Security Issue [SA21095] Outpost Firewall Pro FILTNT.SYS Denial of Service [SA21060] Kerio Personal Firewall Engine Denial of Service UNIX/Linux: [SA21121] rPath update for tshark / wireshark [SA21107] Mandriva update for wireshark [SA21090] FlushCMS "class_path" File Inclusion Vulnerability [SA21078] Wireshark Multiple Protocol Dissector Vulnerabilities [SA21064] Red Hat update for libwmf [SA21132] Sun Solaris Event Port API Denial of Service Vulnerability [SA21124] Debian update for mutt [SA21106] Mandriva update for libtunepimp [SA21105] Mandriva update for webmin [SA21104] Mandriva update for gimp [SA21069] Red Hat update for gimp [SA21063] Red Hat update for GnuPG [SA21050] Mandriva update for php [SA21045] Mandriva update for kernel [SA21042] F-Secure Messaging Security Gateway Sendmail Vulnerability [SA21062] Red Hat update for freetype [SA21109] Sun Solaris Kernel Patches Denial of Service Vulnerability [SA21100] Gnu GCC fastjar Directory Traversal Vulnerability [SA21112] HP Tru64 UNIX ypserv Denial of Service Vulnerability [SA21086] Debian update for samba [SA21071] Asterisk IAX2 Call Request Flooding Denial of Service [SA21048] Solaris "libICE" Denial of Service Vulnerability [SA21047] Sun Solaris ypserv Denial of Service Vulnerability [SA21046] Slackware update for samba [SA21120] VMware vmware-config.pl Insecure SSL Key File Permissions [SA21119] Mandriva update for kernel [SA21087] Debian update for rssh [SA21073] Ubuntu update for kernel [SA21065] Rocks mount-loop / umount-loop Privilege Escalation [SA21057] rPath update for kernel [SA21041] Linux Kernel "/proc" Race Condition Privilege Escalation [SA21133] Sun Solaris Kernel Debugger Local Denial of Service [SA21131] Sun Solaris "/net" Mount Point Local Denial of Service Other: [SA21081] D-Link Routers UPnP M-SEARCH Request Buffer Overflow [SA21067] OpenVMS Unspecified Local Denial of Service Cross Platform: [SA21117] toendaCMS connector.php File Upload Vulnerability [SA21111] Oracle Products Multiple Vulnerabilities [SA21083] phpBB Mail2Forum Module "m2f_root_path" File Inclusion [SA21082] Mambo VideoDB Component File Inclusion Vulnerability [SA21079] Mambo-SMF Forum Component File Inclusion Vulnerability [SA21077] Mambo LoudMouth Component File Inclusion Vulnerability [SA21074] PHP Event Calendar "path_to_calendar" File Inclusion [SA21068] Joomla PollXT Component File Inclusion Vulnerability [SA21059] Joomla Joomlaboard Component "sbp" File Inclusion Vulnerability [SA21056] BosClassifieds Classified Ads System "insPath" File Inclusion [SA21055] Mambo SiteMap Component File Inclusion Vulnerability [SA21053] Joomla com_hashcash Component File Inclusion Vulnerability [SA21044] Mambo / Joomla perForms "mosConfig_absolute_path" File Inclusion [SA21116] DeluxeBB Multiple Vulnerabilities [SA21115] PHP-Post auto-login Security Bypass Vulnerability [SA21110] hwdeGUEST new_entry.php Script Insertion Vulnerabilities [SA21103] osDate "txtcomment" Script Insertion Vulnerability [SA21102] Professional Home Page Tools Guestbook SQL Injection [SA21101] Eskolar CMS Multiple SQL Injection Vulnerabilities [SA21093] Armagetron Advanced Denial of Service Vulnerabilities [SA21092] DUMB "it_read_envelope()" Function Buffer Overflow [SA21091] UFO2000 Multiple Vulnerabilities [SA21084] Photo-Gallery "id" SQL Injection Vulnerability [SA21072] Invision Power Board "CLIENT_IP" SQL Injection Vulnerability [SA21070] MyBB "CLIENT-IP" SQL Injection Vulnerability [SA21066] boastMachine Multiple Vulnerabilities [SA21052] OrbitMATRIX Cross-Site Scripting and SQL Injection [SA21051] FlatNuke File Upload Vulnerability [SA21043] Phorum Cross-Site Scripting and Local File Inclusion [SA21114] WebScarab Cross-Site Scripting Vulnerability [SA21094] Geeklog Comment Handling Cross-Site Scripting [SA21085] Zoho Virtual Office Script Insertion Vulnerability [SA21054] Photocycle "phpage" Cross-Site Scripting Vulnerability [SA21049] Hyper Estraier Cross-Site Request Forgery Vulnerability ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA21040] Microsoft PowerPoint Unspecified Code Execution Vulnerability Critical: Extremely critical Where: From remote Impact: System access Released: 2006-07-14 A vulnerability has been reported in Microsoft PowerPoint, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/21040/ -- [SA21061] Microsoft PowerPoint Memory Corruption Vulnerability Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-07-18 naveed has discovered a vulnerability in Microsoft PowerPoint, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/21061/ -- [SA21127] Quick 'n Easy FTP Server "LIST" Command Buffer Overflow Critical: Moderately critical Where: From remote Impact: System access Released: 2006-07-19 h07 has reported a vulnerability in Quick 'n Easy FTP Server, which potentially can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21127/ -- [SA21108] FileCOPA FTP Server "LIST" Command Buffer Overflow Critical: Moderately critical Where: From remote Impact: System access Released: 2006-07-19 Appsec.ch has reported a vulnerability in FileCOPA, which potentially can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21108/ -- [SA21080] WinRAR LHA Archive Processing Buffer Overflow Critical: Moderately critical Where: From remote Impact: System access Released: 2006-07-19 Ryan Smith has reported a vulnerability in WinRAR, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/21080/ -- [SA21058] Winlpd Long Request Buffer Overflow Vulnerability Critical: Moderately critical Where: From local network Impact: System access Released: 2006-07-17 Pablo Isola has discovered a vulnerability in Winlpd, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21058/ -- [SA21113] Symantec pcAnywhere CIF Files Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-07-19 Zee has reported a security issue in Symantec pcAnywhere, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/21113/ -- [SA21089] Outpost Firewall Pro Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-07-18 Ben Goulding has discovered a vulnerability in Outpost Firewall Pro, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/21089/ -- [SA21088] Lavasoft Personal Firewall Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-07-18 Ben Goulding has discovered a vulnerability in Lavasoft Personal Firewall, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/21088/ -- [SA21076] Citrix MetaFrame Insecure Default Registry Key Permissions Critical: Less critical Where: Local system Impact: Manipulation of data, Privilege escalation Released: 2006-07-19 A security issue has been reported in Citrix MetaFrame, which can be exploited by malicious, local users to manipulate certain sensitive data. Full Advisory: http://secunia.com/advisories/21076/ -- [SA21096] Lotus Notes Deleted Mail Recipient Security Issue Critical: Not critical Where: From remote Impact: Exposure of sensitive information Released: 2006-07-17 A security issue has been reported in Lotus Notes, which may expose potentially sensitive information to certain people. Full Advisory: http://secunia.com/advisories/21096/ -- [SA21095] Outpost Firewall Pro FILTNT.SYS Denial of Service Critical: Not critical Where: Local system Impact: DoS Released: 2006-07-18 Bipin Gautam has reported a vulnerability in Outpost Firewall Pro, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21095/ -- [SA21060] Kerio Personal Firewall Engine Denial of Service Critical: Not critical Where: Local system Impact: DoS Released: 2006-07-17 David Matousek has discovered a vulnerability in Kerio Personal Firewall, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21060/ UNIX/Linux:-- [SA21121] rPath update for tshark / wireshark Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-07-20 rPath has issued updates for tshark and wireshark. These fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21121/ -- [SA21107] Mandriva update for wireshark Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-07-19 Mandriva has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21107/ -- [SA21090] FlushCMS "class_path" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-07-17 igi has reported a vulnerability in FlushCMS, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21090/ -- [SA21078] Wireshark Multiple Protocol Dissector Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-07-18 Some vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21078/ -- [SA21064] Red Hat update for libwmf Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-07-18 Red Hat has issued an update for libwmf. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the vulnerable library. Full Advisory: http://secunia.com/advisories/21064/ -- [SA21132] Sun Solaris Event Port API Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-07-20 Some vulnerabilities have been reported in Solaris, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21132/ -- [SA21124] Debian update for mutt Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-07-20 Debian has issued an update for mutt. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/21124/ -- [SA21106] Mandriva update for libtunepimp Critical: Moderately critical Where: From remote Impact: System access Released: 2006-07-19 Mandriva has issued an update for libtunepimp. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/21106/ -- [SA21105] Mandriva update for webmin Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2006-07-19 Mandriva has issued an update for webmin. This fixes a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/21105/ -- [SA21104] Mandriva update for gimp Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-07-19 Mandriva has issued an update for Gimp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/21104/ -- [SA21069] Red Hat update for gimp Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-07-18 Red Hat has issued an update for gimp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/21069/ -- [SA21063] Red Hat update for GnuPG Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-07-18 Red Hat has issued an update for GnuPG. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21063/ -- [SA21050] Mandriva update for php Critical: Moderately critical Where: From remote Impact: Security Bypass, DoS, System access Released: 2006-07-14 Mandriva has issued an update for php. This fixes some vulnerabilities, which potentially can be exploited by malicious, local users to bypass certain security restrictions or by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21050/ -- [SA21045] Mandriva update for kernel Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of system information, DoS Released: 2006-07-17 Mandriva has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information, cause a DoS (Denial of Service), or bypass certain security restrictions, and by malicious people to cause a DoS. Full Advisory: http://secunia.com/advisories/21045/ -- [SA21042] F-Secure Messaging Security Gateway Sendmail Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-07-14 F-Secure has acknowledged a vulnerability in F-Secure Messaging Security Gateway, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21042/ -- [SA21062] Red Hat update for freetype Critical: Moderately critical Where: Local system Impact: DoS, System access Released: 2006-07-18 Red Hat has issued an update for freetype. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise applications using the library. Full Advisory: http://secunia.com/advisories/21062/ -- [SA21109] Sun Solaris Kernel Patches Denial of Service Vulnerability Critical: Less critical Where: From remote Impact: DoS Released: 2006-07-19 A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21109/ -- [SA21100] Gnu GCC fastjar Directory Traversal Vulnerability Critical: Less critical Where: From remote Impact: System access Released: 2006-07-19 A vulnerability has been reported in Gnu GCC, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/21100/ -- [SA21112] HP Tru64 UNIX ypserv Denial of Service Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2006-07-19 HP has acknowledged a vulnerability in HP Tru64 Unix, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable NIS server. Full Advisory: http://secunia.com/advisories/21112/ -- [SA21086] Debian update for samba Critical: Less critical Where: From local network Impact: DoS Released: 2006-07-17 Debian has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21086/ -- [SA21071] Asterisk IAX2 Call Request Flooding Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2006-07-17 ISS X-Force has reported a vulnerability in Asterisk, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21071/ -- [SA21048] Solaris "libICE" Denial of Service Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2006-07-14 A vulnerability has been reported in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21048/ -- [SA21047] Sun Solaris ypserv Denial of Service Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2006-07-14 A vulnerability has been reported in Solaris, which may be exploited by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21047/ -- [SA21046] Slackware update for samba Critical: Less critical Where: From local network Impact: DoS Released: 2006-07-17 Slackware has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21046/ -- [SA21120] VMware vmware-config.pl Insecure SSL Key File Permissions Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2006-07-19 A security issue has been reported in VMware, which potentially can be exploited by malicious, local users to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/21120/ -- [SA21119] Mandriva update for kernel Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-07-19 Mandriva has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/21119/ -- [SA21087] Debian update for rssh Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-07-17 Debian has issued an update for rssh. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/21087/ -- [SA21073] Ubuntu update for kernel Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-07-18 Ubuntu has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/21073/ -- [SA21065] Rocks mount-loop / umount-loop Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-07-17 Xavier de Leon has reported two vulnerabilities in Rocks, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/21065/ -- [SA21057] rPath update for kernel Critical: Less critical Where: Local system Impact: Privilege escalation, DoS Released: 2006-07-18 rPath has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. Full Advisory: http://secunia.com/advisories/21057/ -- [SA21041] Linux Kernel "/proc" Race Condition Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-07-17 A vulnerability has been reported in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/21041/ -- [SA21133] Sun Solaris Kernel Debugger Local Denial of Service Critical: Not critical Where: Local system Impact: DoS Released: 2006-07-20 A vulnerability has been reported in Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21133/ -- [SA21131] Sun Solaris "/net" Mount Point Local Denial of Service Critical: Not critical Where: Local system Impact: DoS Released: 2006-07-20 A vulnerability has been reported in Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21131/ Other:-- [SA21081] D-Link Routers UPnP M-SEARCH Request Buffer Overflow Critical: Moderately critical Where: From local network Impact: System access Released: 2006-07-17 eEye Digital Security has reported a vulnerability in various D-Link routers, which can be exploited by malicious people to compromise a vulnerable network device. Full Advisory: http://secunia.com/advisories/21081/ -- [SA21067] OpenVMS Unspecified Local Denial of Service Critical: Not critical Where: Local system Impact: DoS Released: 2006-07-17 A vulnerability has been reported in OpenVMS, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21067/ Cross Platform:-- [SA21117] toendaCMS connector.php File Upload Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-07-19 rgod has discovered a vulnerability in toendaCMS, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21117/ -- [SA21111] Oracle Products Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Unknown, Manipulation of data, System access Released: 2006-07-19 Multiple vulnerabilities have been reported in various Oracle products. Some have an unknown impact and others can be exploited to conduct SQL injection attacks or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21111/ -- [SA21083] phpBB Mail2Forum Module "m2f_root_path" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2006-07-18 OLiBekaS has reported a vulnerability in the Mail2Forum module for phpBB, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21083/ -- [SA21082] Mambo VideoDB Component File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-07-18 h4ntu has reported a vulnerability in the VideoDB component for Mambo, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21082/ -- [SA21079] Mambo-SMF Forum Component File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-07-18 ASIANEAGLE has reported a vulnerability in the Mambo-SMF Forum component, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21079/ -- [SA21077] Mambo LoudMouth Component File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-07-18 h4ntu has reported a vulnerability in the LoudMouth component for Mambo, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21077/ -- [SA21074] PHP Event Calendar "path_to_calendar" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2006-07-18 Solpot has reported a vulnerability in PHP Event Calendar, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21074/ -- [SA21068] Joomla PollXT Component File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-07-18 vitux has reported a vulnerability in the PollXT component for Joomla, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21068/ -- [SA21059] Joomla Joomlaboard Component "sbp" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-07-14 A vulnerability has been reported in the Joomlaboard component for Joomla, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21059/ -- [SA21056] BosClassifieds Classified Ads System "insPath" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2006-07-14 MazaGi has reported some vulnerabilities in BosClassifieds Classified Ads System, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21056/ -- [SA21055] Mambo SiteMap Component File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-07-14 Ahmad Maulana has discovered a vulnerability in the SiteMap component for Mambo, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21055/ -- [SA21053] Joomla com_hashcash Component File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-07-14 Ahmad Maulana has discovered a vulnerability in the com_hashcash component for Joomla, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21053/ -- [SA21044] Mambo / Joomla perForms "mosConfig_absolute_path" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2006-07-14 endeneu has reported a vulnerability in the perForms Mambo / Joomla component, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21044/ -- [SA21116] DeluxeBB Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Spoofing, Manipulation of data Released: 2006-07-19 Jessica Hope and Th3 M0ths have discovered some vulnerabilities and a weakness in DeluxeBB, which can be exploited by malicious people to conduct phishing, cross-site scripting, and SQL injection attacks. Full Advisory: http://secunia.com/advisories/21116/ -- [SA21115] PHP-Post auto-login Security Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2006-07-19 FarhadKey has reported a vulnerability in PHP Post, which can be exploited by malicious users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/21115/ -- [SA21110] hwdeGUEST new_entry.php Script Insertion Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-07-19 Tamriel has discovered some vulnerabilities in hwdeGUEST, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/21110/ -- [SA21103] osDate "txtcomment" Script Insertion Vulnerability Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-07-19 binaryloc has discovered a vulnerability in osDate, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/21103/ -- [SA21102] Professional Home Page Tools Guestbook SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-07-19 Artemis has reported some vulnerabilities in Professional Home Page Tools Guestbook, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/21102/ -- [SA21101] Eskolar CMS Multiple SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-07-19 Jacek Wlodarczyk has discovered some vulnerabilities in Eskolar CMS, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/21101/ -- [SA21093] Armagetron Advanced Denial of Service Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-07-17 Luigi Auriemma has reported two vulnerabilities in Armagetron Advanced, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21093/ -- [SA21092] DUMB "it_read_envelope()" Function Buffer Overflow Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-07-17 Luigi Auriemma has reported a vulnerability in DUMB, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/21092/ -- [SA21091] UFO2000 Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data, DoS, System access Released: 2006-07-17 Luigi Auriemma has reported multiple vulnerabilities in UFO2000, which can be exploited by malicious people to conduct SQL injection attacks, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21091/ -- [SA21084] Photo-Gallery "id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-07-17 C.B.B.L. has discovered a vulnerability in Photo Gallery, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/21084/ -- [SA21072] Invision Power Board "CLIENT_IP" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-07-18 1dt.w0lf has reported a vulnerability in Invision Power Board, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/21072/ -- [SA21070] MyBB "CLIENT-IP" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-07-17 rgod has reported a vulnerability in MyBB, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/21070/ -- [SA21066] boastMachine Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Hijacking, Cross Site Scripting, Manipulation of data, Exposure of sensitive information Released: 2006-07-18 DarkFig has discovered some vulnerabilities in boastMachine, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks or gain knowledge of sensitive information and by malicious users to conduct SQL injection attacks or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21066/ -- [SA21052] OrbitMATRIX Cross-Site Scripting and SQL Injection Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2006-07-14 Luny has reported some vulnerabilities in OrbitMATRIX, which may be exploited by malicious people to conduct cross-site scripting or SQL injection attacks. Full Advisory: http://secunia.com/advisories/21052/ -- [SA21051] FlatNuke File Upload Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2006-07-14 rgod has discovered a vulnerability in FlatNuke, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21051/ -- [SA21043] Phorum Cross-Site Scripting and Local File Inclusion Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Exposure of sensitive information, System access Released: 2006-07-14 Some vulnerabilities have been discovered in Phorum, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21043/ -- [SA21114] WebScarab Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-07-19 Moritz Naumann has reported a vulnerability in WebScarab, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/21114/ -- [SA21094] Geeklog Comment Handling Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-07-19 A vulnerability has been reported in Geeklog, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/21094/ -- [SA21085] Zoho Virtual Office Script Insertion Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-07-18 ss_team has reported a vulnerability in Zoho Virtual Office, which can be exploited by malicious users to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/21085/ -- [SA21054] Photocycle "phpage" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-07-14 Luny has reported a vulnerability in Photocycle, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/21054/ -- [SA21049] Hyper Estraier Cross-Site Request Forgery Vulnerability Critical: Less critical Where: From remote Impact: Hijacking Released: 2006-07-17 A vulnerability has been reported in Hyper Estraier, which can be exploited by malicious people to conduct cross-site request forgery attacks. Full Advisory: http://secunia.com/advisories/21049/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _________________________________ Attend the Black Hat Briefings and Training, Las Vegas July 29 - August 3 2,500+ international security experts from 40 nations, 10 tracks, no vendor pitches. www.blackhat.com
This archive was generated by hypermail 2.1.3 : Fri Jul 21 2006 - 02:55:11 PDT