======================================================================== The Secunia Weekly Advisory Summary 2006-08-03 - 2006-08-10 This week: 99 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: 60%* of the users of our weekly summary value real-time and filtered advisories - a solution Secunia provides businesses today through our commercial products. We would therefore like to bring your attention upon our commercial products that will enable you to get real-time and filtered advisories on vulnerabilities. Please click on the links below: The Secunia Security Manager Product: http://secunia.com/security_manager/?menu=prod Request An Account: https://ca.secunia.com/?page=requestaccount&f=wsum Or send a mail to: sales@private Or by phone: +45 7020 5144 Stay Secure, Secunia *: According to our recent survey. ======================================================================== 2) This Week in Brief: Microsoft has released their monthly security bulletins for August, which fixes several vulnerabilities in various Microsoft products. Several of the vulnerabilities fixed have the potential of being exploited on a broader scale. All users of Microsoft products are advised to visit Windows Update immediately and apply all available patches. Additional details can be found in the referenced Secunia advisories listed below. References: http://secunia.com/SA21396 http://secunia.com/SA21408 http://secunia.com/SA21040 http://secunia.com/SA21415 http://secunia.com/SA20748 http://secunia.com/SA21417 http://secunia.com/SA20825 http://secunia.com/SA20906 http://secunia.com/SA21401 http://secunia.com/SA20384 http://secunia.com/SA21394 http://secunia.com/SA21388 -- VIRUS ALERTS: During the past week Secunia collected 178 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA20748] Microsoft Windows Hyperlink Object Library Vulnerabilities 2. [SA21394] Windows DNS Resolution Code Execution Vulnerabilities 3. [SA21360] vBulletin Cross-Site Scripting and Script Insertion 4. [SA20153] Microsoft Word Malformed Object Pointer Vulnerability 5. [SA21253] Mac OS X Security Update Fixes Multiple Vulnerabilities 6. [SA21374] Clam AntiVirus pefromupx() Buffer Overflow Vulnerability 7. [SA21377] Microsoft Windows WMF File Handling Denial of Service 8. [SA21417] Microsoft Windows Two Vulnerabilities 9. [SA21345] DHCP "supersede_lease()" DHCPOFFER Denial of Service 10. [SA21388] Windows Server Service Buffer Overflow Vulnerability ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA21408] Microsoft Visual Basic for Applications Buffer Overflow [SA21417] Microsoft Windows Two Vulnerabilities [SA21401] Microsoft Management Console Cross-Site Scripting [SA21396] Internet Explorer Multiple Vulnerabilities [SA21394] Windows DNS Resolution Code Execution Vulnerabilities [SA21431] CLUB-Nuke [XP] SQL Injection Vulnerabilities [SA21418] OpenMPT Buffer Overflow Vulnerabilities [SA21411] Novell GroupWise WebAccess Multiple Vulnerabilities [SA21397] YenerTurk Haber Script "id" SQL Injection Vulnerability [SA21348] Lhaz LZH File Handling Buffer Overflow Vulnerabilities [SA21388] Windows Server Service Buffer Overflow Vulnerability [SA21415] Windows Kernel Privilege Escalation Vulnerability [SA21377] Microsoft Windows WMF File Handling Denial of Service UNIX/Linux: [SA21457] SUSE update for clamav [SA21433] Mandriva update for clamav [SA21422] AlsaPlayer Multiple Buffer Overflow Vulnerabilities [SA21419] Ubuntu update for libwmf [SA21405] Gentoo update for x11vnc [SA21393] x11vnc Authentication Bypass Vulnerability [SA21384] DConnect Daemon Multiple Vulnerabilities [SA21368] Gentoo update for clamav [SA21361] Gentoo update for mozilla-firefox [SA21358] Gentoo update for mozilla-thunderbird [SA21349] Gentoo update for libvncserver [SA21343] Gentoo update for seamonkey [SA21437] Mandriva update for ncompress [SA21434] Debian update for ncompress [SA21427] ncompress "decompress()" Buffer Overflow Vulnerability [SA21416] Gentoo update for dumb [SA21392] Mandriva update for libtiff [SA21385] rPath update for freetype [SA21378] Gentoo update for gnupg [SA21370] Gentoo update for tiff [SA21365] Gentoo updates for webmin/usermin [SA21362] Gentoo update for pike [SA21352] Debian update for freeciv [SA21351] Debian update for gnupg2 [SA21350] Gentoo update for courier [SA21346] Trustix updates for multiple packages [SA21453] Sun Solaris "drain_squeue()" Denial of Service [SA21406] Debian update for chmlib [SA21400] Debian update for mantis [SA21399] Red Hat update for apache [SA21369] Linux Kernel Ext3 Invalid Inode Number Denial of Service [SA21363] Debian update for dhcp [SA21345] DHCP "supersede_lease()" DHCPOFFER Denial of Service [SA21456] rPath update for krb5 [SA21441] Mandriva update for krb5 [SA21439] Debian update for krb5 [SA21436] Heimdal setuid Security Issue [SA21428] LessTif "DEBUG_FILE" Privilege Escalation Vulnerability [SA21423] Red Hat update for krb5 [SA21402] Kerberos V5 setuid Security Issue [SA21398] Sun Ray Server Software utxconfig Privilege Escalation [SA21382] rPath update for mysql [SA21366] Gentoo update for mysql [SA21341] Debian update for cfs Other: [SA21372] Linksys WRT54G Configuration Manipulation and Request Forgery Cross Platform: [SA21460] See-Commerce "path" File Inclusion Vulnerability [SA21432] Comet WebFileManager "Language" File Inclusion Vulnerability [SA21430] hitweb "REP_INC" File Inclusion Vulnerability [SA21414] SAPID Shop "root_path" File Inclusion Vulnerability [SA21413] SAPID Gallery "root_path" File Inclusion Vulnerabilities [SA21412] docpile:we "INIT_PATH" File Inclusion Vulnerabilities [SA21410] SAPID CMS "root_path" File Inclusion Vulnerability [SA21407] phNNTP "file_newsportal" File Inclusion Vulnerability [SA21395] NEWSolved Lite "abs_path" File Inclusion Vulnerability [SA21391] Visual Events Calendar "cfg_dir" File Inclusion Vulnerability [SA21389] Joomla JD-Wiki Component File Inclusion Vulnerability [SA21386] phpCodeCabinet "BEAUT_PATH" File Inclusion Vulnerability [SA21375] Torbstoff News "pfad" File Inclusion Vulnerability [SA21374] Clam AntiVirus pefromupx() Buffer Overflow Vulnerability [SA21373] phpAutoMembersArea "installed_config_file" File Inclusion [SA21371] PHP Simple Shop "abs_path" File Inclusion Vulnerability [SA21359] ME Download System File Inclusion Vulnerabilities [SA21353] ZoneX Publishers Gold Edition "phpbb_root_path" File Inclusion [SA21342] sendcard Multiple Vulnerabilities [SA21451] PHPMyRing "idsite" SQL Injection Vulnerability [SA21435] Drupal Bibliography Module Cross-Site Scripting and SQL Injection [SA21429] Simple one-file guestbook Authentication Bypass [SA21409] XennoBB profile.php SQL Injection Vulnerabilities [SA21380] Drupal Jobsearch Module SQL Injection Vulnerability [SA21379] The Address Book Reloaded Login SQL Injection Vulnerabilities [SA21376] myBloggie SQL Injection and Table Prefix Disclosure [SA21367] Festalon HES File Handling Heap Corruption Vulnerability [SA21364] The Address Book Login SQL Injection Vulnerabilities [SA21360] vBulletin Cross-Site Scripting and Script Insertion [SA21357] GästeChaos Script Insertion and SQL Injection Vulnerabilities [SA21356] CounterChaos "Referer" HTTP Header SQL Injection [SA21355] GeheimChaos Multiple SQL Injection Vulnerabilities [SA21347] Netious CMS SQL Injection and Session Hijacking [SA21438] MojoGallery "admin.cgi" Cross-Site Scripting Vulnerabilities [SA21390] Simplog "keyw" Cross-Site Scripting Vulnerability [SA21387] DeluxeBB pm.php Authentication Bypass Vulnerability [SA21383] CakePHP error.php Cross-Site Scripting Vulnerability [SA21381] Drupal Recipe Module Script Insertion Vulnerability [SA21344] toendaCMS "s" Cross-Site Scripting Vulnerability [SA21421] ColdFusion AdminAPI Authentication Bypass [SA21403] PHP "sscanf()" Code Execution Safe Mode Bypass ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA21408] Microsoft Visual Basic for Applications Buffer Overflow Critical: Extremely critical Where: From remote Impact: System access Released: 2006-08-08 A vulnerability has been reported in Microsoft Visual Basic for Applications, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/21408/ -- [SA21417] Microsoft Windows Two Vulnerabilities Critical: Highly critical Where: From remote Impact: Privilege escalation, System access Released: 2006-08-08 Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21417/ -- [SA21401] Microsoft Management Console Cross-Site Scripting Critical: Highly critical Where: From remote Impact: Cross Site Scripting, System access Released: 2006-08-08 A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/21401/ -- [SA21396] Internet Explorer Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Exposure of sensitive information, System access Released: 2006-08-08 Multiple vulnerabilities have been reported in Internet Explorer, which can be exploited by malicious people to gain knowledge of certain information or compromise a user's system. Full Advisory: http://secunia.com/advisories/21396/ -- [SA21394] Windows DNS Resolution Code Execution Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-08-08 Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21394/ -- [SA21431] CLUB-Nuke [XP] SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-08-09 ASIANEAGLE has reported two vulnerabilities in CLUB-Nuke [XP], which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/21431/ -- [SA21418] OpenMPT Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-08-09 Luigi Auriemma has reported some vulnerabilities in OpenMPT, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/21418/ -- [SA21411] Novell GroupWise WebAccess Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-08-08 Some vulnerabilities have been reported in Novell GroupWise, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks. Full Advisory: http://secunia.com/advisories/21411/ -- [SA21397] YenerTurk Haber Script "id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-08-08 ASIANEAGLE has reported a vulnerability in YenerTurk Haber Script, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/21397/ -- [SA21348] Lhaz LZH File Handling Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From remote Impact: System access Released: 2006-08-07 Tan Chew Keong has reported two vulnerabilities in Lhaz, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/21348/ -- [SA21388] Windows Server Service Buffer Overflow Vulnerability Critical: Moderately critical Where: From local network Impact: System access Released: 2006-08-08 A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21388/ -- [SA21415] Windows Kernel Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-08-08 A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/21415/ -- [SA21377] Microsoft Windows WMF File Handling Denial of Service Critical: Not critical Where: From remote Impact: DoS Released: 2006-08-07 cyanid-E has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21377/ UNIX/Linux:-- [SA21457] SUSE update for clamav Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-08-10 SUSE has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21457/ -- [SA21433] Mandriva update for clamav Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-08-09 Mandriva has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21433/ -- [SA21422] AlsaPlayer Multiple Buffer Overflow Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-08-10 Luigi Auriemma has reported some vulnerabilities in AlsaPlayer, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/21422/ -- [SA21419] Ubuntu update for libwmf Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-08-09 Ubuntu has issued an update for libwmf. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/21419/ -- [SA21405] Gentoo update for x11vnc Critical: Highly critical Where: From remote Impact: Security Bypass Released: 2006-08-08 Gentoo has issued an update for x11vnc. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/21405/ -- [SA21393] x11vnc Authentication Bypass Vulnerability Critical: Highly critical Where: From remote Impact: Security Bypass Released: 2006-08-08 A vulnerability has been reported in x11vnc, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/21393/ -- [SA21384] DConnect Daemon Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-08-07 Luigi Auriemma has reported some vulnerabilities in DConnect Daemon, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21384/ -- [SA21368] Gentoo update for clamav Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-08-08 Gentoo has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21368/ -- [SA21361] Gentoo update for mozilla-firefox Critical: Highly critical Where: From remote Impact: Cross Site Scripting, DoS, System access Released: 2006-08-04 Gentoo has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. Full Advisory: http://secunia.com/advisories/21361/ -- [SA21358] Gentoo update for mozilla-thunderbird Critical: Highly critical Where: From remote Impact: Cross Site Scripting, DoS, System access Released: 2006-08-04 Gentoo has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. Full Advisory: http://secunia.com/advisories/21358/ -- [SA21349] Gentoo update for libvncserver Critical: Highly critical Where: From remote Impact: Security Bypass Released: 2006-08-04 Gentoo has issued an update for libvncserver. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/21349/ -- [SA21343] Gentoo update for seamonkey Critical: Highly critical Where: From remote Impact: Cross Site Scripting, DoS, System access Released: 2006-08-04 Gentoo has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. Full Advisory: http://secunia.com/advisories/21343/ -- [SA21437] Mandriva update for ncompress Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-08-10 Mandriva has issued an update for ncompress. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/21437/ -- [SA21434] Debian update for ncompress Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-08-10 Debian has issued an update for ncompress. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/21434/ -- [SA21427] ncompress "decompress()" Buffer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-08-10 Tavis Ormandy has reported a vulnerability in ncompress, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/21427/ -- [SA21416] Gentoo update for dumb Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-08-09 Gentoo has issued an update for dumb. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/21416/ -- [SA21392] Mandriva update for libtiff Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-08-08 Mandriva has issued an update for libtiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21392/ -- [SA21385] rPath update for freetype Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-08-08 rPath has issued an update for freetype. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise applications using the library. Full Advisory: http://secunia.com/advisories/21385/ -- [SA21378] Gentoo update for gnupg Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-08-07 Gentoo has issued an update for gnupg. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21378/ -- [SA21370] Gentoo update for tiff Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-08-07 Gentoo has issued an update for tiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21370/ -- [SA21365] Gentoo updates for webmin/usermin Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2006-08-07 Gentoo has issued updates for webmin and usermin. These fix a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/21365/ -- [SA21362] Gentoo update for pike Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-08-07 Gentoo has issued an update for pike. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/21362/ -- [SA21352] Debian update for freeciv Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-08-04 Debian has issued an update for freeciv. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21352/ -- [SA21351] Debian update for gnupg2 Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-08-04 Debian has issued an update for gnupg2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21351/ -- [SA21350] Gentoo update for courier Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-08-04 Gentoo has issued an update for courier. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21350/ -- [SA21346] Trustix updates for multiple packages Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-08-04 Trustix has issued updates for multiple packages. These fix some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21346/ -- [SA21453] Sun Solaris "drain_squeue()" Denial of Service Critical: Less critical Where: From remote Impact: DoS Released: 2006-08-10 A vulnerability has been reported in Sun Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21453/ -- [SA21406] Debian update for chmlib Critical: Less critical Where: From remote Impact: System access Released: 2006-08-08 Debian has issued an update for chmlib. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/21406/ -- [SA21400] Debian update for mantis Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-08-08 Debian has issued an update for mantis. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/21400/ -- [SA21399] Red Hat update for apache Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-08-09 Red Hat has issued an update for apache. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/21399/ -- [SA21369] Linux Kernel Ext3 Invalid Inode Number Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2006-08-07 James McKenzie has reported a vulnerability in Linux Kernel, which can be exploited by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21369/ -- [SA21363] Debian update for dhcp Critical: Less critical Where: From local network Impact: DoS Released: 2006-08-04 Debian has issued an update for dhcp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21363/ -- [SA21345] DHCP "supersede_lease()" DHCPOFFER Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2006-08-04 A vulnerability has been reported in ISC DHCP, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21345/ -- [SA21456] rPath update for krb5 Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-08-10 rPath has issued an update for krb5. This fixes a security issue, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/21456/ -- [SA21441] Mandriva update for krb5 Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-08-10 Mandriva has issued an update for krb5. This fixes a security issue, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/21441/ -- [SA21439] Debian update for krb5 Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-08-09 Debian has issued an update for krb5. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/21439/ -- [SA21436] Heimdal setuid Security Issue Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-08-09 A security issue has been reported in Heimdal, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/21436/ -- [SA21428] LessTif "DEBUG_FILE" Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-08-09 Karol Wiesek has reported a vulnerability in LessTif, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/21428/ -- [SA21423] Red Hat update for krb5 Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-08-09 Red Hat has issued an update for krb5. This fixes a security issue, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/21423/ -- [SA21402] Kerberos V5 setuid Security Issue Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-08-09 A security issue has been reported in Kerberos, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/21402/ -- [SA21398] Sun Ray Server Software utxconfig Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-08-09 A vulnerability has been reported in Sun Ray Server Software, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/21398/ -- [SA21382] rPath update for mysql Critical: Not critical Where: From local network Impact: Security Bypass Released: 2006-08-08 rPath has issued an update for mysql. This fixes a vulnerability, which can be exploited by malicious users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/21382/ -- [SA21366] Gentoo update for mysql Critical: Not critical Where: From local network Impact: DoS Released: 2006-08-07 Gentoo has issued an update for mysql. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21366/ -- [SA21341] Debian update for cfs Critical: Not critical Where: Local system Impact: DoS Released: 2006-08-04 Debian has issued an update for cfs. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/21341/ Other:-- [SA21372] Linksys WRT54G Configuration Manipulation and Request Forgery Critical: Less critical Where: From remote Impact: Hijacking, Manipulation of data Released: 2006-08-07 Ginsu Rabbit has reported a vulnerability and a security issue in Linksys WRT54G, which can be exploited by malicious people to conduct cross-site request forgery attacks and manipulate the configuration. Full Advisory: http://secunia.com/advisories/21372/ Cross Platform:-- [SA21460] See-Commerce "path" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-08-10 Drago84 has reported a vulnerability in See-Commerce, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21460/ -- [SA21432] Comet WebFileManager "Language" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-08-09 Philipp Niedziela has discovered a vulnerability in Comet WebFileManager, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21432/ -- [SA21430] hitweb "REP_INC" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-08-10 Drago84 has reported a vulnerability in hitweb, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21430/ -- [SA21414] SAPID Shop "root_path" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-08-08 Kacper has discovered a vulnerability in SAPID Shop, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21414/ -- [SA21413] SAPID Gallery "root_path" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-08-08 Kacper has discovered some vulnerabilities in SAPID Gallery, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21413/ -- [SA21412] docpile:we "INIT_PATH" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-08-09 Some vulnerabilities have been discovered in docpile:we, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21412/ -- [SA21410] SAPID CMS "root_path" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-08-08 Simo64 has discovered some vulnerabilities in SAPID CMS, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21410/ -- [SA21407] phNNTP "file_newsportal" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-08-09 Tr_ZiNDaN has reported a vulnerability in phNNTP, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21407/ -- [SA21395] NEWSolved Lite "abs_path" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-08-08 Philipp Niedziela has discovered a vulnerability in NEWSolved Lite, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21395/ -- [SA21391] Visual Events Calendar "cfg_dir" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-08-08 x0r0n has discovered a vulnerability in Visual Events Calendar, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21391/ -- [SA21389] Joomla JD-Wiki Component File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-08-08 jank0 has reported a vulnerability in the JD-Wiki component for Joomla, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21389/ -- [SA21386] phpCodeCabinet "BEAUT_PATH" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-08-07 Minion has discovered a vulnerability in phpCodeCabinet, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21386/ -- [SA21375] Torbstoff News "pfad" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-08-07 SHiKaA has discovered a vulnerability in Torbstoff News, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21375/ -- [SA21374] Clam AntiVirus pefromupx() Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-08-07 Damian Put has discovered a vulnerability in Clam AntiVirus, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21374/ -- [SA21373] phpAutoMembersArea "installed_config_file" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2006-08-07 Philipp Niedziela has reported a vulnerability in phpAutoMembersArea, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21373/ -- [SA21371] PHP Simple Shop "abs_path" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-08-07 Ahmad Maulana has reported a vulnerability in PHP Simple Shop, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21371/ -- [SA21359] ME Download System File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-08-04 Some vulnerabilities have been discovered in ME Download System, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21359/ -- [SA21353] ZoneX Publishers Gold Edition "phpbb_root_path" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2006-08-04 x0r0n has discovered a vulnerability in ZoneX Publishers Gold Edition, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/21353/ -- [SA21342] sendcard Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Security Bypass, Exposure of sensitive information, System access Released: 2006-08-04 rgod has reported some vulnerabilities in sendcard, which can be exploited by malicious users to disclose certain sensitive information, and by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/21342/ -- [SA21451] PHPMyRing "idsite" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-08-10 Simo64 has reported a vulnerability in PHPMyRing, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/21451/ -- [SA21435] Drupal Bibliography Module Cross-Site Scripting and SQL Injection Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Manipulation of data Released: 2006-08-09 Some vulnerabilities have been reported in the Bibliography module for Drupal, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/21435/ -- [SA21429] Simple one-file guestbook Authentication Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data Released: 2006-08-09 Omnipresent has discovered a vulnerability in Simple one-file guestbook, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/21429/ -- [SA21409] XennoBB profile.php SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-08-08 Chris Boulton has discovered some vulnerabilities in XennoBB, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/21409/ -- [SA21380] Drupal Jobsearch Module SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-08-08 A vulnerability has been reported in the Jobsearch Module for Drupal, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/21380/ -- [SA21379] The Address Book Reloaded Login SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data Released: 2006-08-07 Two vulnerabilities have been reported in The Address Book Reloaded, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/21379/ -- [SA21376] myBloggie SQL Injection and Table Prefix Disclosure Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of system information Released: 2006-08-07 rgod has discovered some vulnerabilities and a weakness in myBloggie, which can be exploited by malicious people to disclose system information and conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/21376/ -- [SA21367] Festalon HES File Handling Heap Corruption Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-08-07 Luigi Auriemma has reported a vulnerability in Festalon, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/21367/ -- [SA21364] The Address Book Login SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data Released: 2006-08-07 Two vulnerabilities have been discovered in The Address Book, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/21364/ -- [SA21360] vBulletin Cross-Site Scripting and Script Insertion Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-08-04 Some vulnerabilities have been reported in vBulletin, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks. Full Advisory: http://secunia.com/advisories/21360/ -- [SA21357] GästeChaos Script Insertion and SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2006-08-04 Tamriel has discovered some vulnerabilities in GästeChaos, which can be exploited by malicious people to conduct script insertion and SQL injection attacks. Full Advisory: http://secunia.com/advisories/21357/ -- [SA21356] CounterChaos "Referer" HTTP Header SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-08-04 Tamriel has discovered a vulnerability in CounterChaos, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/21356/ -- [SA21355] GeheimChaos Multiple SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-08-04 Tamriel has discovered some vulnerabilities in GeheimChaos, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/21355/ -- [SA21347] Netious CMS SQL Injection and Session Hijacking Critical: Moderately critical Where: From remote Impact: Hijacking, Security Bypass, Manipulation of data Released: 2006-08-07 Jacek Wlodarczyk has discovered two vulnerabilities in Netious CMS, which can be exploited by malicious people to hijack user sessions and conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/21347/ -- [SA21438] MojoGallery "admin.cgi" Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-08-09 tugra and alp_eren have reported some vulnerabilities in MojoGallery, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/21438/ -- [SA21390] Simplog "keyw" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-08-08 HeLiOsZ has discovered a vulnerability in Simplog, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/21390/ -- [SA21387] DeluxeBB pm.php Authentication Bypass Vulnerability Critical: Less critical Where: From remote Impact: Security Bypass, Exposure of sensitive information Released: 2006-08-08 Attila Gerendi has discovered a vulnerability in DeluxeBB, which can be exploited by malicious people to bypass certain security restrictions and disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/21387/ -- [SA21383] CakePHP error.php Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-08-07 A vulnerability has been reported in CakePHP, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/21383/ -- [SA21381] Drupal Recipe Module Script Insertion Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-08-08 A vulnerability has been reported in the Recipe Module for Drupal, which can be exploited by malicious users to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/21381/ -- [SA21344] toendaCMS "s" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-08-04 David Vieira-Kurz has discovered a vulnerability in toendaCMS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/21344/ -- [SA21421] ColdFusion AdminAPI Authentication Bypass Critical: Less critical Where: Local system Impact: Security Bypass Released: 2006-08-09 A security issue has been reported in ColdFusion, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/21421/ -- [SA21403] PHP "sscanf()" Code Execution Safe Mode Bypass Critical: Less critical Where: Local system Impact: Security Bypass Released: 2006-08-08 Heintz has discovered a vulnerability in PHP, which potentially can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/21403/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _________________________________ Visit the InfoSec News store! http://www.shopinfosecnews.org
This archive was generated by hypermail 2.1.3 : Thu Aug 10 2006 - 23:08:16 PDT