[ISN] Secunia Weekly Summary - Issue: 2006-29

From: InfoSec News (alerts@private)
Date: Fri Jul 21 2006 - 02:42:23 PDT


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2006-07-13 - 2006-07-20                        

                       This week: 82 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

The Secunia staff is spending hours every day to assure you the best
and most reliable source for vulnerability information. Every single 
vulnerability report is being validated and verified before a Secunia
advisory is written.

Secunia validates and verifies vulnerability reports in many different
ways e.g. by downloading the software and performing comprehensive
tests, by reviewing source code, or by validating the credibility of
the source from which the vulnerability report was issued.

As a result, Secunia's database is the most correct and complete source
for recent vulnerability information available on the Internet.

Secunia Online Vulnerability Database:
http://secunia.com/

========================================================================
2) This Week in Brief:

Two vulnerabilities have been reported in Microsoft PowerPoint, which
can be exploited by malicious people to compromise a user's system.

NOTE: One of the vulnerabilities are currently being exploited in the
wild.

Further information can be found in the referenced Secunia advisories.

References:
http://secunia.com/SA21040
http://secunia.com/SA21061

 --

Some vulnerabilities have been reported in Wireshark (formerly
Ethereal), which can be exploited by malicious people to cause a DoS
(Denial of Service) or compromise a vulnerable system.
 
The vendor has released an updated version.

Reference:
http://secunia.com/SA21078

 --

Ryan Smith has reported a vulnerability in WinRAR, which can be
exploited by malicious people to compromise a user's system.

Successful exploitation allows execution of arbitrary code with the
user's privileges.

Reference:
http://secunia.com/SA21080

 --

Multiple vulnerabilities have been reported in various Oracle products.
Some have an unknown impact and others can be exploited to conduct SQL
injection attacks or compromise a vulnerable system.

Further details about affected products and the vulnerabilities fixed
can be found in the referenced Secunia advisory below.

Reference:
http://secunia.com/SA21111

 --

VIRUS ALERTS:

During the past week Secunia collected 165 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA21040] Microsoft PowerPoint Unspecified Code Execution
              Vulnerability
2.  [SA20153] Microsoft Word Malformed Object Pointer Vulnerability
3.  [SA20748] Microsoft Windows Hyperlink Object Library Buffer
              Overflow
4.  [SA21037] McAfee ePolicy Orchestrator Directory Traversal
              Vulnerability
5.  [SA21028] Cisco Router Web Setup Insecure Default Cisco IOS
              Configuration
6.  [SA21059] Joomla Joomlaboard Component "sbp" File Inclusion
              Vulnerability
7.  [SA21044] Mambo / Joomla perForms "mosConfig_absolute_path" File
              Inclusion
8.  [SA21041] Linux Kernel "/proc" Race Condition Privilege Escalation
9.  [SA21061] Microsoft PowerPoint Memory Corruption Vulnerability
10. [SA21053] Joomla com_hashcash Component File Inclusion
              Vulnerability

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA21040] Microsoft PowerPoint Unspecified Code Execution
Vulnerability
[SA21061] Microsoft PowerPoint Memory Corruption Vulnerability
[SA21127] Quick 'n Easy FTP Server "LIST" Command Buffer Overflow
[SA21108] FileCOPA FTP Server "LIST" Command Buffer Overflow
[SA21080] WinRAR LHA Archive Processing Buffer Overflow
[SA21058] Winlpd Long Request Buffer Overflow Vulnerability
[SA21113] Symantec pcAnywhere CIF Files Privilege Escalation
[SA21089] Outpost Firewall Pro Privilege Escalation Vulnerability
[SA21088] Lavasoft Personal Firewall Privilege Escalation
Vulnerability
[SA21076] Citrix MetaFrame Insecure Default Registry Key Permissions
[SA21096] Lotus Notes Deleted Mail Recipient Security Issue
[SA21095] Outpost Firewall Pro FILTNT.SYS Denial of Service
[SA21060] Kerio Personal Firewall Engine Denial of Service

UNIX/Linux:
[SA21121] rPath update for tshark / wireshark
[SA21107] Mandriva update for wireshark
[SA21090] FlushCMS "class_path" File Inclusion Vulnerability
[SA21078] Wireshark Multiple Protocol Dissector Vulnerabilities
[SA21064] Red Hat update for libwmf
[SA21132] Sun Solaris Event Port API Denial of Service Vulnerability
[SA21124] Debian update for mutt
[SA21106] Mandriva update for libtunepimp
[SA21105] Mandriva update for webmin
[SA21104] Mandriva update for gimp
[SA21069] Red Hat update for gimp
[SA21063] Red Hat update for GnuPG
[SA21050] Mandriva update for php
[SA21045] Mandriva update for kernel
[SA21042] F-Secure Messaging Security Gateway Sendmail Vulnerability
[SA21062] Red Hat update for freetype
[SA21109] Sun Solaris Kernel Patches Denial of Service Vulnerability
[SA21100] Gnu GCC fastjar Directory Traversal Vulnerability
[SA21112] HP Tru64 UNIX ypserv Denial of Service Vulnerability
[SA21086] Debian update for samba
[SA21071] Asterisk IAX2 Call Request Flooding Denial of Service
[SA21048] Solaris "libICE" Denial of Service Vulnerability
[SA21047] Sun Solaris ypserv Denial of Service Vulnerability
[SA21046] Slackware update for samba
[SA21120] VMware vmware-config.pl Insecure SSL Key File Permissions
[SA21119] Mandriva update for kernel
[SA21087] Debian update for rssh
[SA21073] Ubuntu update for kernel
[SA21065] Rocks mount-loop / umount-loop Privilege Escalation
[SA21057] rPath update for kernel
[SA21041] Linux Kernel "/proc" Race Condition Privilege Escalation
[SA21133] Sun Solaris Kernel Debugger Local Denial of Service
[SA21131] Sun Solaris "/net" Mount Point Local Denial of Service

Other:
[SA21081] D-Link Routers UPnP M-SEARCH Request Buffer Overflow
[SA21067] OpenVMS Unspecified Local Denial of Service

Cross Platform:
[SA21117] toendaCMS connector.php File Upload Vulnerability
[SA21111] Oracle Products Multiple Vulnerabilities
[SA21083] phpBB Mail2Forum Module "m2f_root_path" File Inclusion
[SA21082] Mambo VideoDB Component File Inclusion Vulnerability
[SA21079] Mambo-SMF Forum Component File Inclusion Vulnerability
[SA21077] Mambo LoudMouth Component File Inclusion Vulnerability
[SA21074] PHP Event Calendar "path_to_calendar" File Inclusion
[SA21068] Joomla PollXT Component File Inclusion Vulnerability
[SA21059] Joomla Joomlaboard Component "sbp" File Inclusion
Vulnerability
[SA21056] BosClassifieds Classified Ads System "insPath" File
Inclusion
[SA21055] Mambo SiteMap Component File Inclusion Vulnerability
[SA21053] Joomla com_hashcash Component File Inclusion Vulnerability
[SA21044] Mambo / Joomla perForms "mosConfig_absolute_path" File
Inclusion
[SA21116] DeluxeBB Multiple Vulnerabilities
[SA21115] PHP-Post auto-login Security Bypass Vulnerability
[SA21110] hwdeGUEST new_entry.php Script Insertion Vulnerabilities
[SA21103] osDate "txtcomment" Script Insertion Vulnerability
[SA21102] Professional Home Page Tools Guestbook SQL Injection
[SA21101] Eskolar CMS Multiple SQL Injection Vulnerabilities
[SA21093] Armagetron Advanced Denial of Service Vulnerabilities
[SA21092] DUMB "it_read_envelope()" Function Buffer Overflow
[SA21091] UFO2000 Multiple Vulnerabilities
[SA21084] Photo-Gallery "id" SQL Injection Vulnerability
[SA21072] Invision Power Board "CLIENT_IP" SQL Injection Vulnerability
[SA21070] MyBB "CLIENT-IP" SQL Injection Vulnerability
[SA21066] boastMachine Multiple Vulnerabilities
[SA21052] OrbitMATRIX Cross-Site Scripting and SQL Injection
[SA21051] FlatNuke File Upload Vulnerability
[SA21043] Phorum Cross-Site Scripting and Local File Inclusion
[SA21114] WebScarab Cross-Site Scripting Vulnerability
[SA21094] Geeklog Comment Handling Cross-Site Scripting
[SA21085] Zoho Virtual Office Script Insertion Vulnerability
[SA21054] Photocycle "phpage" Cross-Site Scripting Vulnerability
[SA21049] Hyper Estraier Cross-Site Request Forgery Vulnerability

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA21040] Microsoft PowerPoint Unspecified Code Execution
Vulnerability

Critical:    Extremely critical
Where:       From remote
Impact:      System access
Released:    2006-07-14

A vulnerability has been reported in Microsoft PowerPoint, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21040/

 --

[SA21061] Microsoft PowerPoint Memory Corruption Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-07-18

naveed has discovered a vulnerability in Microsoft PowerPoint, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/21061/

 --

[SA21127] Quick 'n Easy FTP Server "LIST" Command Buffer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-07-19

h07 has reported a vulnerability in Quick 'n Easy FTP Server, which
potentially can be exploited by malicious users to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/21127/

 --

[SA21108] FileCOPA FTP Server "LIST" Command Buffer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-07-19

Appsec.ch has reported a vulnerability in FileCOPA, which potentially
can be exploited by malicious users to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21108/

 --

[SA21080] WinRAR LHA Archive Processing Buffer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-07-19

Ryan Smith has reported a vulnerability in WinRAR, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21080/

 --

[SA21058] Winlpd Long Request Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2006-07-17

Pablo Isola has discovered a vulnerability in Winlpd, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21058/

 --

[SA21113] Symantec pcAnywhere CIF Files Privilege Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-07-19

Zee has reported a security issue in Symantec pcAnywhere, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/21113/

 --

[SA21089] Outpost Firewall Pro Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-07-18

Ben Goulding has discovered a vulnerability in Outpost Firewall Pro,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/21089/

 --

[SA21088] Lavasoft Personal Firewall Privilege Escalation
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-07-18

Ben Goulding has discovered a vulnerability in Lavasoft Personal
Firewall, which can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/21088/

 --

[SA21076] Citrix MetaFrame Insecure Default Registry Key Permissions

Critical:    Less critical
Where:       Local system
Impact:      Manipulation of data, Privilege escalation
Released:    2006-07-19

A security issue has been reported in Citrix MetaFrame, which can be
exploited by malicious, local users to manipulate certain sensitive
data.

Full Advisory:
http://secunia.com/advisories/21076/

 --

[SA21096] Lotus Notes Deleted Mail Recipient Security Issue

Critical:    Not critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-07-17

A security issue has been reported in Lotus Notes, which may expose
potentially sensitive information to certain people.

Full Advisory:
http://secunia.com/advisories/21096/

 --

[SA21095] Outpost Firewall Pro FILTNT.SYS Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-07-18

Bipin Gautam has reported a vulnerability in Outpost Firewall Pro,
which can be exploited by malicious, local users to cause a DoS (Denial
of Service).

Full Advisory:
http://secunia.com/advisories/21095/

 --

[SA21060] Kerio Personal Firewall Engine Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-07-17

David Matousek has discovered a vulnerability in Kerio Personal
Firewall, which can be exploited by malicious, local users to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21060/


UNIX/Linux:--

[SA21121] rPath update for tshark / wireshark

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-07-20

rPath has issued updates for tshark and wireshark. These fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21121/

 --

[SA21107] Mandriva update for wireshark

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-07-19

Mandriva has issued an update for wireshark. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21107/

 --

[SA21090] FlushCMS "class_path" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-07-17

igi has reported a vulnerability in FlushCMS, which can be exploited by
malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21090/

 --

[SA21078] Wireshark Multiple Protocol Dissector Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-07-18

Some vulnerabilities have been reported in Wireshark, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21078/

 --

[SA21064] Red Hat update for libwmf

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-07-18

Red Hat has issued an update for libwmf. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise an
application using the vulnerable library.

Full Advisory:
http://secunia.com/advisories/21064/

 --

[SA21132] Sun Solaris Event Port API Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-07-20

Some vulnerabilities have been reported in Solaris, which potentially
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/21132/

 --

[SA21124] Debian update for mutt

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-07-20

Debian has issued an update for mutt. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of Service)
and potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21124/

 --

[SA21106] Mandriva update for libtunepimp

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-07-19

Mandriva has issued an update for libtunepimp. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21106/

 --

[SA21105] Mandriva update for webmin

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2006-07-19

Mandriva has issued an update for webmin. This fixes a vulnerability,
which can be exploited by malicious people to disclose potentially
sensitive information.

Full Advisory:
http://secunia.com/advisories/21105/

 --

[SA21104] Mandriva update for gimp

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-07-19

Mandriva has issued an update for Gimp. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21104/

 --

[SA21069] Red Hat update for gimp

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-07-18

Red Hat has issued an update for gimp. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21069/

 --

[SA21063] Red Hat update for GnuPG

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-07-18

Red Hat has issued an update for GnuPG. This fixes a vulnerability,
which potentially can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/21063/

 --

[SA21050] Mandriva update for php

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2006-07-14

Mandriva has issued an update for php. This fixes some vulnerabilities,
which potentially can be exploited by malicious, local users to bypass
certain security restrictions or by malicious people to cause a DoS
(Denial of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21050/

 --

[SA21045] Mandriva update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of system information, DoS
Released:    2006-07-17

Mandriva has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
disclose potentially sensitive information, cause a DoS (Denial of
Service), or bypass certain security restrictions, and by malicious
people to cause a DoS.

Full Advisory:
http://secunia.com/advisories/21045/

 --

[SA21042] F-Secure Messaging Security Gateway Sendmail Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-07-14

F-Secure has acknowledged a vulnerability in F-Secure Messaging
Security Gateway, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21042/

 --

[SA21062] Red Hat update for freetype

Critical:    Moderately critical
Where:       Local system
Impact:      DoS, System access
Released:    2006-07-18

Red Hat has issued an update for freetype. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise applications using
the library.

Full Advisory:
http://secunia.com/advisories/21062/

 --

[SA21109] Sun Solaris Kernel Patches Denial of Service Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2006-07-19

A vulnerability has been reported in Sun Solaris, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/21109/

 --

[SA21100] Gnu GCC fastjar Directory Traversal Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2006-07-19

A vulnerability has been reported in Gnu GCC, which potentially can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21100/

 --

[SA21112] HP Tru64 UNIX ypserv Denial of Service Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2006-07-19

HP has acknowledged a vulnerability in HP Tru64 Unix, which can be
exploited by malicious people to cause a DoS (Denial of Service) on a
vulnerable NIS server.

Full Advisory:
http://secunia.com/advisories/21112/

 --

[SA21086] Debian update for samba

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2006-07-17

Debian has issued an update for samba. This fixes a vulnerability,
which can be exploited by malicious users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/21086/

 --

[SA21071] Asterisk IAX2 Call Request Flooding Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2006-07-17

ISS X-Force has reported a vulnerability in Asterisk, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21071/

 --

[SA21048] Solaris "libICE" Denial of Service Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2006-07-14

A vulnerability has been reported in Solaris, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21048/

 --

[SA21047] Sun Solaris ypserv Denial of Service Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2006-07-14

A vulnerability has been reported in Solaris, which may be exploited by
malicious users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21047/

 --

[SA21046] Slackware update for samba

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2006-07-17

Slackware has issued an update for samba. This fixes a vulnerability,
which can be exploited by malicious users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/21046/

 --

[SA21120] VMware vmware-config.pl Insecure SSL Key File Permissions

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2006-07-19

A security issue has been reported in VMware, which potentially can be
exploited by malicious, local users to gain knowledge of sensitive
information.

Full Advisory:
http://secunia.com/advisories/21120/

 --

[SA21119] Mandriva update for kernel

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-07-19

Mandriva has issued an update for the kernel. This fixes a
vulnerability, which can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/21119/

 --

[SA21087] Debian update for rssh

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-07-17

Debian has issued an update for rssh. This fixes a vulnerability, which
can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/21087/

 --

[SA21073] Ubuntu update for kernel

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-07-18

Ubuntu has issued an update for the kernel. This fixes a vulnerability,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/21073/

 --

[SA21065] Rocks mount-loop / umount-loop Privilege Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-07-17

Xavier de Leon has reported two vulnerabilities in Rocks, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/21065/

 --

[SA21057] rPath update for kernel

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation, DoS
Released:    2006-07-18

rPath has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service) or gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/21057/

 --

[SA21041] Linux Kernel "/proc" Race Condition Privilege Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-07-17

A vulnerability has been reported in the Linux kernel, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/21041/

 --

[SA21133] Sun Solaris Kernel Debugger Local Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-07-20

A vulnerability has been reported in Solaris, which can be exploited by
malicious, local users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21133/

 --

[SA21131] Sun Solaris "/net" Mount Point Local Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-07-20

A vulnerability has been reported in Solaris, which can be exploited by
malicious, local users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21131/


Other:--

[SA21081] D-Link Routers UPnP M-SEARCH Request Buffer Overflow

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2006-07-17

eEye Digital Security has reported a vulnerability in various D-Link
routers, which can be exploited by malicious people to compromise a
vulnerable network device.

Full Advisory:
http://secunia.com/advisories/21081/

 --

[SA21067] OpenVMS Unspecified Local Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-07-17

A vulnerability has been reported in OpenVMS, which can be exploited by
malicious, local users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21067/


Cross Platform:--

[SA21117] toendaCMS connector.php File Upload Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-07-19

rgod has discovered a vulnerability in toendaCMS, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21117/

 --

[SA21111] Oracle Products Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Unknown, Manipulation of data, System access
Released:    2006-07-19

Multiple vulnerabilities have been reported in various Oracle products.
Some have an unknown impact and others can be exploited to conduct SQL
injection attacks or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21111/

 --

[SA21083] phpBB Mail2Forum Module "m2f_root_path" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-07-18

OLiBekaS has reported a vulnerability in the Mail2Forum module for
phpBB, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/21083/

 --

[SA21082] Mambo VideoDB Component File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-07-18

h4ntu has reported a vulnerability in the VideoDB component for Mambo,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/21082/

 --

[SA21079] Mambo-SMF Forum Component File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-07-18

ASIANEAGLE has reported a vulnerability in the Mambo-SMF Forum
component, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/21079/

 --

[SA21077] Mambo LoudMouth Component File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-07-18

h4ntu has reported a vulnerability in the LoudMouth component for
Mambo, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/21077/

 --

[SA21074] PHP Event Calendar "path_to_calendar" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-07-18

Solpot has reported a vulnerability in PHP Event Calendar, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21074/

 --

[SA21068] Joomla PollXT Component File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-07-18

vitux has reported a vulnerability in the PollXT component for Joomla,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/21068/

 --

[SA21059] Joomla Joomlaboard Component "sbp" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-07-14

A vulnerability has been reported in the Joomlaboard component for
Joomla, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/21059/

 --

[SA21056] BosClassifieds Classified Ads System "insPath" File
Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-07-14

MazaGi has reported some vulnerabilities in BosClassifieds Classified
Ads System, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/21056/

 --

[SA21055] Mambo SiteMap Component File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-07-14

Ahmad Maulana has discovered a vulnerability in the SiteMap component
for Mambo, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/21055/

 --

[SA21053] Joomla com_hashcash Component File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-07-14

Ahmad Maulana has discovered a vulnerability in the com_hashcash
component for Joomla, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21053/

 --

[SA21044] Mambo / Joomla perForms "mosConfig_absolute_path" File
Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-07-14

endeneu has reported a vulnerability in the perForms Mambo / Joomla
component, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/21044/

 --

[SA21116] DeluxeBB Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Spoofing, Manipulation of data
Released:    2006-07-19

Jessica Hope and Th3 M0ths have discovered some vulnerabilities and a
weakness in DeluxeBB, which can be exploited by malicious people to
conduct phishing, cross-site scripting, and SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/21116/

 --

[SA21115] PHP-Post auto-login Security Bypass Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-07-19

FarhadKey has reported a vulnerability in PHP Post, which can be
exploited by malicious users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/21115/

 --

[SA21110] hwdeGUEST new_entry.php Script Insertion Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-07-19

Tamriel has discovered some vulnerabilities in hwdeGUEST, which can be
exploited by malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/21110/

 --

[SA21103] osDate "txtcomment" Script Insertion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-07-19

binaryloc has discovered a vulnerability in osDate, which can be
exploited by malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/21103/

 --

[SA21102] Professional Home Page Tools Guestbook SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-07-19

Artemis has reported some vulnerabilities in Professional Home Page
Tools Guestbook, which can be exploited by malicious people to conduct
SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/21102/

 --

[SA21101] Eskolar CMS Multiple SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-07-19

Jacek Wlodarczyk has discovered some vulnerabilities in Eskolar CMS,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/21101/

 --

[SA21093] Armagetron Advanced Denial of Service Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-07-17

Luigi Auriemma has reported two vulnerabilities in Armagetron Advanced,
which can be exploited by malicious  people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/21093/

 --

[SA21092] DUMB "it_read_envelope()" Function Buffer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-07-17

Luigi Auriemma has reported a vulnerability in DUMB, which potentially
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21092/

 --

[SA21091] UFO2000 Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, DoS, System access
Released:    2006-07-17

Luigi Auriemma has reported multiple vulnerabilities in UFO2000, which
can be exploited by malicious people to conduct SQL injection attacks,
cause a DoS (Denial of Service), or potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/21091/

 --

[SA21084] Photo-Gallery "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-07-17

C.B.B.L. has discovered a vulnerability in Photo Gallery, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/21084/

 --

[SA21072] Invision Power Board "CLIENT_IP" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-07-18

1dt.w0lf has reported a vulnerability in Invision Power Board, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/21072/

 --

[SA21070] MyBB "CLIENT-IP" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-07-17

rgod has reported a vulnerability in MyBB, which can be exploited by
malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/21070/

 --

[SA21066] boastMachine Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Hijacking, Cross Site Scripting, Manipulation of data,
Exposure of sensitive information
Released:    2006-07-18

DarkFig has discovered some vulnerabilities in boastMachine, which can
be exploited by malicious people to conduct cross-site scripting and
cross-site request forgery attacks or gain knowledge of sensitive
information and by malicious users to conduct SQL injection attacks or
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21066/

 --

[SA21052] OrbitMATRIX Cross-Site Scripting and SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2006-07-14

Luny has reported some vulnerabilities in OrbitMATRIX, which may be
exploited by malicious people to conduct cross-site scripting or SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/21052/

 --

[SA21051] FlatNuke File Upload Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-07-14

rgod has discovered a vulnerability in FlatNuke, which can be exploited
by malicious users to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21051/

 --

[SA21043] Phorum Cross-Site Scripting and Local File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of sensitive information,
System access
Released:    2006-07-14

Some vulnerabilities have been discovered in Phorum, which can be
exploited by malicious people to conduct cross-site scripting attacks,
disclose sensitive information, and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/21043/

 --

[SA21114] WebScarab Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-07-19

Moritz Naumann has reported a vulnerability in WebScarab, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/21114/

 --

[SA21094] Geeklog Comment Handling Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-07-19

A vulnerability has been reported in Geeklog, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/21094/

 --

[SA21085] Zoho Virtual Office Script Insertion Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-07-18

ss_team has reported a vulnerability in Zoho Virtual Office, which can
be exploited by malicious users to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/21085/

 --

[SA21054] Photocycle "phpage" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-07-14

Luny has reported a vulnerability in Photocycle, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/21054/

 --

[SA21049] Hyper Estraier Cross-Site Request Forgery Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Hijacking
Released:    2006-07-17

A vulnerability has been reported in Hyper Estraier, which can be
exploited by malicious people to conduct cross-site request forgery
attacks.

Full Advisory:
http://secunia.com/advisories/21049/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45



_________________________________
Attend the Black Hat Briefings and
Training, Las Vegas July 29 - August 3
2,500+ international security experts from 40 nations,
10 tracks, no vendor pitches.
www.blackhat.com



This archive was generated by hypermail 2.1.3 : Fri Jul 21 2006 - 02:55:11 PDT