[ISN] Secunia Weekly Summary - Issue: 2006-38

From: InfoSec News (alerts@private)
Date: Thu Sep 21 2006 - 22:15:15 PDT


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2006-09-14 - 2006-09-21                        

                       This week: 82 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Secunia Corporate Website has been Released

Learn more about what Secunia can offer you and your company, see and
download detailed product descriptions, and view comprehensive flash
presentations of both our products and corporate profile.

Visit the Secunia Corporate Website:
http://corporate.secunia.com/


Secunia Vulnerability and Advisory Portal has been Updated

Our publicly available Vulnerability and Advisory Portal
secunia.com has been updated with improved accessibility and usability,
enhanced features, and improved search capabilities along with
availability of extensive product reports.

Over the years, the Secunia brand has become synonymous with credible,
accurate, and reliable vulnerability intelligence and our services
are used by more than 5 million unique users every year at secunia.com.

Visit the Secunia Vulnerability and Advisory Portal:
http://secunia.com/

========================================================================
2) This Week in Brief:

A new vulnerability has been identified in Internet Explorer.

The vulnerability is caused due to a boundary error in the Microsoft
Vector Graphics Rendering(VML) library (vgx.dll) when processing
certain content in Vector Markup Language (VML) documents and can be
exploited to compromise a vulnerable system.

Additional details about the vulnerability can be found in the
referenced Secunia advisory below.

Reference:
http://secunia.com/SA2189

 --

VIRUS ALERTS:

During the past week Secunia collected 199 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA21910] Internet Explorer daxctle.ocx "KeyFrame()" Method
              Vulnerability
2.  [SA21906] Mozilla Firefox Multiple Vulnerabilities
3.  [SA21989] Microsoft Vector Graphics Rendering Library Buffer
              Overflow
4.  [SA21982] Opera SSL RSA Signature Forgery Vulnerability
5.  [SA21893] Apple QuickTime Multiple Vulnerabilities
6.  [SA21884] Symantec Products Alert Notification Two Vulnerabilities
7.  [SA21978] Microsoft PowerPoint Unspecified Code Execution
              Vulnerability
8.  [SA21938] Symantec Norton Personal Firewall Denial of Service
9.  [SA21950] rPath updates for firefox and thunderbird
10. [SA20153] Microsoft Word Malformed Object Pointer Vulnerability

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA21989] Microsoft Vector Graphics Rendering Library Buffer Overflow
[SA21978] Microsoft PowerPoint Unspecified Code Execution
Vulnerability
[SA21959] Easy Address Book Web Server Format String Vulnerability
[SA22013] ECardPro "keyword" SQL Injection Vulnerability
[SA22008] Tekman Portal "uye_id" Parameter SQL Injection Vulnerability
[SA22006] EShoppingPro "order" Parameter SQL Injection Vulnerability
[SA21998] MailEnable SPF Lookup Denial of Service
[SA21987] Charon Cart "ProductID" Parameter SQL Injection
[SA21980] ClickBlog Login SQL Injection Vulnerabilities
[SA21977] Techno Dreams FAQ Manager Package "key" SQL Injection
[SA21976] Techno Dreams Articles & Papers Package "key" SQL Injection
[SA21960] HaberX "id" SQL Injection Vulnerability
[SA22051] DotNetNuke "error" Parameter Cross-Site Scripting
Vulnerability
[SA21995] FeedDemon Atom Feed Script Insertion Vulnerabilities
[SA21994] RssReader Feed Script Insertion Vulnerabilities
[SA21963] SharpReader Feed Script Insertion Vulnerabilities

UNIX/Linux:
[SA22036] SGI Advanced Linux Environment Multiple Updates
[SA22018] Debian update for alsaplayer
[SA22043] Mandriva update for gzip
[SA22034] Debian update for gzip
[SA22033] Slackware update for gzip
[SA22020] Gentoo update for mailman
[SA22017] Red Hat update for gzip
[SA22012] rPath update for gzip
[SA22011] Mandriva update for mailman
[SA22009] Ubuntu update for gzip
[SA22002] FreeBSD update for gzip
[SA21985] Debian update for bomberclone
[SA21954] Trustix Updates for Multiple Packages
[SA21953] Debian update for zope2.7
[SA22049] Mandriva update for gnutls
[SA21986] Avaya Products Apache "Expect" Header Cross-Site Scripting
[SA21983] Avaya Products Linux Kernel Multiple Vulnerabilities
[SA21973] Ubuntu update for gnutls
[SA21993] Avaya CMS Sun Solaris libX11 Buffer Overflow
[SA21967] Ubuntu update for kernel
[SA21966] Avaya Modular Messaging Linux Kernel "prctl" Privilege
Escalation
[SA22016] OSU HTTP Server System Information Disclosure Weaknesses
[SA21981] Debian update for usermin
[SA22010] Avaya PDS ARPA Transport Software Denial of Service
[SA21999] Linux Kernel ELF Cross-Region Mapping Denial of Service
[SA21984] Avaya PDS HP-UX Trusted Mode Denial of Service Vulnerability
[SA21968] Usermin "shell" Denial of Service Vulnerability

Other:
[SA22022] Cisco Intrusion Prevention System Fragmented IP Packets
Security Bypass
[SA21974] Cisco IOS DOCSIS Community String Vulnerability
[SA21962] Cisco Guard "meta-refresh" Cross-Site Scripting
Vulnerability
[SA22046] Cisco Intrusion Detection / Prevention System "SSL Hello"
Denial of Service

Cross Platform:
[SA22031] Php Blue Dragon CMS Multiple Vulnerabilities
[SA22029] Neon WebMail for Java Multiple Vulnerabilities
[SA22026] DigitalWebShop "_PHPLIB[libdir]" File Inclusion
Vulnerability
[SA22024] BCWB "root_path" File Inclusion Vulnerability
[SA22019] Dr.Web LHA Directory Name Buffer Overflow
[SA22015] PHPQuiz Multiple Vulnerabilities
[SA22005] Qualiteam X-Cart cmpi.php Variable Overwriting Vulnerability
[SA21990] Simple Discussion Board Remote File Inclusion
Vulnerabilities
[SA21975] Site@School Multiple Vulnerabilities
[SA21971] ReviewPost PHP Pro  "RP_PATH" File Inclusion Vulnerability
[SA21970] phpBB XS "phpbb_root_path" File Inclusion Vulnerability
[SA21965] BolinOS "gBRootPath" File Inclusion Vulnerability
[SA21957] Unak-CMS "dirroot" Parameter File Inclusion Vulnerabilities
[SA21955] aeDating "dir[inc]" File Inclusion Vulnerabilities
[SA21951] MobilePublisherPHP "abspath" Parameter File Inclusion
[SA22038] A.l-Pifou "ze_langue_02" Parameter Local File Inclusion
[SA22021] Drupal Search Keywords Module Script Insertion
[SA22014] PHP-Post Multiple Vulnerabilities
[SA22003] Exponent CMS "view" Local File Inclusion Vulnerability
[SA21997] Amazing Little Poll "lp_settings.inc" Password Disclosure
[SA21996] gzip Multiple Vulnerabilities
[SA21991] MyReview "email" Parameter SQL Injection Vulnerability
[SA21988] CMtextS admin.txt Password Disclosure
[SA21964] Roller Weblogger Script Insertion Vulnerabilities
[SA21961] AlstraSoft E-Friends "lang" Local File Inclusion
Vulnerability
[SA21958] RSSOwl Atom Feed Script Insertion Vulnerabilities
[SA21956] Gnuturk Portal "t_id" Parameter SQL Injection Vulnerability
[SA22050] MAXdev MD-Pro Cross-Site Scripting Vulnerability
[SA22035] Drupal Site Profile Directory Module Cross-Site Scripting
[SA22030] NextAge Cart "CatId" and "SearchWd" Cross-Site Scripting
[SA22028] PT News "pgname" Cross-Site Scripting Vulnerability
[SA22007] more.groupware "new_calendarid" SQL Injection Vulnerability
[SA21982] Opera SSL RSA Signature Forgery Vulnerability
[SA21979] eSyndiCat Directory Software "what" Cross-Site Scripting
[SA21972] MyBB Cross-Site Scripting Vulnerabilities

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA21989] Microsoft Vector Graphics Rendering Library Buffer Overflow

Critical:    Extremely critical
Where:       From remote
Impact:      System access
Released:    2006-09-19

A vulnerability has been discovered in Microsoft Windows, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21989/

 --

[SA21978] Microsoft PowerPoint Unspecified Code Execution
Vulnerability

Critical:    Extremely critical
Where:       From remote
Impact:      System access
Released:    2006-09-19

NOTE: This advisory has been revoked. The information in this
particular advisory was based on a claim made by Symantec. Symantec
erroneously concluded that this was a previously undocumented and
unpatched vulnerability. This conclusion was posted in their Symantec
Security Response Weblog.

Full Advisory:
http://secunia.com/advisories/21978/

 --

[SA21959] Easy Address Book Web Server Format String Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-09-18

Revnic Vasile has discovered a vulnerability in Easy Address Book Web
Server, which potentially can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21959/

 --

[SA22013] ECardPro "keyword" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-09-19

ajann has reported a vulnerability in ECardPro, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/22013/

 --

[SA22008] Tekman Portal "uye_id" Parameter SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-09-20

Fix TR has discovered a vulnerability in Tekman Portal, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/22008/

 --

[SA22006] EShoppingPro "order" Parameter SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-09-19

ajann has reported a vulnerability in EShoppingPro, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/22006/

 --

[SA21998] MailEnable SPF Lookup Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-09-18

A vulnerability has been reported in MailEnable, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21998/

 --

[SA21987] Charon Cart "ProductID" Parameter SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-09-19

ajann has reported a vulnerability in Charon Cart, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/21987/

 --

[SA21980] ClickBlog Login SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2006-09-18

ajann has reported some vulnerabilities in ClickBlog, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/21980/

 --

[SA21977] Techno Dreams FAQ Manager Package "key" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-09-19

ajann has reported a vulnerability in Techno Dreams FAQ Manager
Package, which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/21977/

 --

[SA21976] Techno Dreams Articles & Papers Package "key" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-09-19

ajann has reported a vulnerability in Techno Dreams Articles & Papers
Package, which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/21976/

 --

[SA21960] HaberX "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-09-18

Fix TR has discovered a vulnerability in HaberX, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/21960/

 --

[SA22051] DotNetNuke "error" Parameter Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-21

Secure Shapes has reported a vulnerability in DotNetNuke, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22051/

 --

[SA21995] FeedDemon Atom Feed Script Insertion Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-19

SPI Dynamics have reported some vulnerabilities in FeedDemon, which can
be exploited by malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/21995/

 --

[SA21994] RssReader Feed Script Insertion Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-20

SPI Dynamics has reported some vulnerabilities in RssReader, which can
be exploited by malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/21994/

 --

[SA21963] SharpReader Feed Script Insertion Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-20

SPI Dynamics has reported some vulnerabilities in SharpReader, which
can be exploited by malicious people to conduct script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/21963/


UNIX/Linux:--

[SA22036] SGI Advanced Linux Environment Multiple Updates

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Spoofing, DoS, System access
Released:    2006-09-20

SGI has issued a patch for SGI Advanced Linux Environment. This fixes
some vulnerabilities, which can be exploited by malicious people to
bypass certain security restrictions, conduct spoofing attacks, cause a
DoS (Denial of Service), and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22036/

 --

[SA22018] Debian update for alsaplayer

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-09-19

Debian has issued an update for alsaplayer. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/22018/

 --

[SA22043] Mandriva update for gzip

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-09-21

Mandriva has issued an update for gzip. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22043/

 --

[SA22034] Debian update for gzip

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-09-20

Debian has issued an updated for gzip. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22034/

 --

[SA22033] Slackware update for gzip

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-09-20

Slackware has issued an update for gzip. This fixes some
vulnerabilities, which can be exploited by malicious poeple to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22033/

 --

[SA22020] Gentoo update for mailman

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Spoofing, DoS
Released:    2006-09-19

Gentoo has issued an update for mailman. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting or spoofing attacks, and cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/22020/

 --

[SA22017] Red Hat update for gzip

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-09-20

Red Hat has issued an update for gzip. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22017/

 --

[SA22012] rPath update for gzip

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-09-20

rPath has issued an update for gzip. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22012/

 --

[SA22011] Mandriva update for mailman

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Spoofing, DoS
Released:    2006-09-19

Mandriva has issued an update for mailman. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting and phishing attacks, and cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/22011/

 --

[SA22009] Ubuntu update for gzip

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-09-20

Ubuntu has issued an update for gzip. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22009/

 --

[SA22002] FreeBSD update for gzip

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-09-20

FreeBSD has issued an update for gzip. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22002/

 --

[SA21985] Debian update for bomberclone

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, DoS
Released:    2006-09-20

Debian has issued an update for bomberclone. This fixes some
vulnerabilities, which can be exploited by malicious  people to gain
knowledge of system information or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21985/

 --

[SA21954] Trustix Updates for Multiple Packages

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information, DoS
Released:    2006-09-18

Trustix has issued updates for multiple packages. These fix some
vulnerabilities, which can be exploited by malicious, local users or by
malicious people to disclose potentially sensitive information, bypass
certain security restrictions, and cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21954/

 --

[SA21953] Debian update for zope2.7

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-09-18

Debian has issued an update for zope2.7. This fixes a vulnerability,
which can be exploited by malicious people to disclose potentially
sensitive information.

Full Advisory:
http://secunia.com/advisories/21953/

 --

[SA22049] Mandriva update for gnutls

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-09-21

Mandriva has issued an update for gnutls. This fixes a vulnerability,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/22049/

 --

[SA21986] Avaya Products Apache "Expect" Header Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-19

Avaya has acknowledged a vulnerability in various Avaya products, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/21986/

 --

[SA21983] Avaya Products Linux Kernel Multiple Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Exposure of system information, Exposure
of sensitive information, DoS
Released:    2006-09-18

Avaya has acknowledged some vulnerabilities in the Linux Kernel
included in various Avaya products, which can be exploited by
malicious, local users to gain knowledge of system or potentially
sensitive information, bypass certain security restrictions, cause a
DoS (Denial of Service), or by malicious people to cause a DoS.

Full Advisory:
http://secunia.com/advisories/21983/

 --

[SA21973] Ubuntu update for gnutls

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-09-19

Ubuntu has issued an update for gnutls. This fixes a vulnerability,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/21973/

 --

[SA21993] Avaya CMS Sun Solaris libX11 Buffer Overflow

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-09-19

Avaya has acknowledged a vulnerability in Avaya Call Management System,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/21993/

 --

[SA21967] Ubuntu update for kernel

Critical:    Less critical
Where:       Local system
Impact:      DoS
Released:    2006-09-19

Ubuntu has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21967/

 --

[SA21966] Avaya Modular Messaging Linux Kernel "prctl" Privilege
Escalation

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass, Privilege escalation
Released:    2006-09-18

Avaya has acknowledged a vulnerability in the Linux Kernel included in
Avaya Modular Messaging, which can be exploited by malicious, local
users to bypass certain security restrictions or potentially gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/21966/

 --

[SA22016] OSU HTTP Server System Information Disclosure Weaknesses

Critical:    Not critical
Where:       From remote
Impact:      Exposure of system information
Released:    2006-09-20

Two weaknesses have been reported in OSU HTTP Server, which can be
exploited by malicious people to disclose system information.

Full Advisory:
http://secunia.com/advisories/22016/

 --

[SA21981] Debian update for usermin

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2006-09-18

Debian has issued an update for usermin. This fixes a vulnerability,
which can be exploited by malicious users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/21981/

 --

[SA22010] Avaya PDS ARPA Transport Software Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-09-19

Avaya has acknowledged a vulnerability in Avaya Predictive Dialing
System (PDS), which potentially can be exploited by a malicious, local
user to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22010/

 --

[SA21999] Linux Kernel ELF Cross-Region Mapping Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-09-18

A vulnerability has been reported in Linux Kernel, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/21999/

 --

[SA21984] Avaya PDS HP-UX Trusted Mode Denial of Service Vulnerability

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-09-18

Avaya has acknowledged a vulnerability in Avaya Predictive Dialing
System (PDS), which potentially can be exploited by malicious, local
users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21984/

 --

[SA21968] Usermin "shell" Denial of Service Vulnerability

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-09-18

Hendrik Weimer has discovered a vulnerability in Usermin, which can be
exploited by malicious users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21968/


Other:--

[SA22022] Cisco Intrusion Prevention System Fragmented IP Packets
Security Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-09-21

A vulnerability has been reported in Cisco Intrusion Prevention System,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/22022/

 --

[SA21974] Cisco IOS DOCSIS Community String Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2006-09-21

A vulnerability has been reported in Cisco IOS, which can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21974/

 --

[SA21962] Cisco Guard "meta-refresh" Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-21

A vulnerability has been reported in Cisco Guard, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/21962/

 --

[SA22046] Cisco Intrusion Detection / Prevention System "SSL Hello"
Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2006-09-21

A vulnerability has been reported in Cisco Intrusion Detection System
and Cisco Intrusion Prevention System, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22046/


Cross Platform:--

[SA22031] Php Blue Dragon CMS Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, System access
Released:    2006-09-21

Kacper has discovered some vulnerabilities in Php Blue Dragon CMS,
which can be exploited by malicious people to conduct cross-site
scripting and SQL injection attacks, and compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22031/

 --

[SA22029] Neon WebMail for Java Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
sensitive information, System access
Released:    2006-09-21

Tan Chew Keong has reported some vulnerabilities in Neon WebMail for
Java, which can be exploited by malicious users to manipulate and
disclose sensitive information, and conduct script insertion and SQL
injection attacks, and by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22029/

 --

[SA22026] DigitalWebShop "_PHPLIB[libdir]" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-20

ajann has reported a vulnerability in DigitalWebShop, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22026/

 --

[SA22024] BCWB "root_path" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-20

ajann has discovered a vulnerability in BCWB, which can be exploited by
malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22024/

 --

[SA22019] Dr.Web LHA Directory Name Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-09-20

Jean-Sébastien Guay-Leroux has reported a vulnerability in Dr.Web,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22019/

 --

[SA22015] PHPQuiz Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Manipulation of data, System access
Released:    2006-09-19

Simo64 has discovered some vulnerabilities in PHPQuiz, which can be
exploited by malicious people to conduct SQL injection attacks and
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22015/

 --

[SA22005] Qualiteam X-Cart cmpi.php Variable Overwriting Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-19

James Bercegay has reported a vulnerability in Qualiteam X-Cart, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22005/

 --

[SA21990] Simple Discussion Board Remote File Inclusion
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-21

CeNGiZ-HaN has discovered some vulnerabilities in Simple Discussion
Board, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/21990/

 --

[SA21975] Site@School Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2006-09-18

Simo64 has discovered some vulnerabilities in Site@School, which can be
exploited by malicious users to disclose certain sensitive information
and by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21975/

 --

[SA21971] ReviewPost PHP Pro  "RP_PATH" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-18

home_edition_2001 has reported a vulnerability in ReviewPost PHP Pro,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/21971/

 --

[SA21970] phpBB XS "phpbb_root_path" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-18

NoGe has discovered a vulnerability in phpBB XS, which can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21970/

 --

[SA21965] BolinOS "gBRootPath" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-18

xoron has discovered a vulnerability in BolinOS, which can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21965/

 --

[SA21957] Unak-CMS "dirroot" Parameter File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-18

SHiKaA has discovered two vulnerabilities in Unak-CMS, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21957/

 --

[SA21955] aeDating "dir[inc]" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-18

NeXtMaN has reported some vulnerabilities in aeDating, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21955/

 --

[SA21951] MobilePublisherPHP "abspath" Parameter File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-18

Timq has reported a vulnerability in MobilePublisherPHP, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21951/

 --

[SA22038] A.l-Pifou "ze_langue_02" Parameter Local File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-09-20

cdg393 has discovered a vulnerability in A.l-Pifou, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/22038/

 --

[SA22021] Drupal Search Keywords Module Script Insertion

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-20

A vulnerability has been reported in the Search Keywords module for
Drupal, which can be exploited by malicious people to conduct script
insertion attacks.

Full Advisory:
http://secunia.com/advisories/22021/

 --

[SA22014] PHP-Post Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
sensitive information
Released:    2006-09-19

HACKERS PAL has reported some vulnerabilities in PHP-Post, which can be
exploited by malicious people to disclose sensitive information, and
conduct cross-site scripting and SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/22014/

 --

[SA22003] Exponent CMS "view" Local File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2006-09-20

rgod has discovered a vulnerability in Exponent CMS, which can be
exploited by malicious people to gain knowledge of sensitive
information and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22003/

 --

[SA21997] Amazing Little Poll "lp_settings.inc" Password Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-09-19

AlpEren and tugr have discovered a security issue in Amazing Little
Poll, which can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/21997/

 --

[SA21996] gzip Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-09-20

Tavis Ormandy has reported some vulnerabilities in gzip, which can be
exploited by malicious people to cause a DoS (Denial of Service) and
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21996/

 --

[SA21991] MyReview "email" Parameter SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-09-20

STILPU has discovered a vulnerability in MyReview, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/21991/

 --

[SA21988] CMtextS admin.txt Password Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-09-19

Kacper has reported a security issue in CMtextS, which can be exploited
by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/21988/

 --

[SA21964] Roller Weblogger Script Insertion Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-18

Avinash Shenoi has reported some vulnerabilities in Roller Weblogger,
which can be exploited by malicious people to conduct script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/21964/

 --

[SA21961] AlstraSoft E-Friends "lang" Local File Inclusion
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-09-19

Kw3[R]Ln has reported a vulnerability in AlstraSoft E-Friends, which
can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/21961/

 --

[SA21958] RSSOwl Atom Feed Script Insertion Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, System access
Released:    2006-09-19

SPI Dynamics has discovered some vulnerabilities in RSSOwl, which can
be exploited by malicious people to conduct script insertion attacks
and potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21958/

 --

[SA21956] Gnuturk Portal "t_id" Parameter SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-09-18

p2y has reported a vulnerability in Gnuturk Portal, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/21956/

 --

[SA22050] MAXdev MD-Pro Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-21

A vulnerability has been reported in MAXdev MD-Pro, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22050/

 --

[SA22035] Drupal Site Profile Directory Module Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-20

A vulnerability has been reported in the Site Profile Directory module
for Drupal, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22035/

 --

[SA22030] NextAge Cart "CatId" and "SearchWd" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-20

meto5757 has reported some vulnerabilities in Nextage Cart, which can
be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/22030/

 --

[SA22028] PT News "pgname" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-20

Snake has discovered a vulnerability in PT News, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22028/

 --

[SA22007] more.groupware "new_calendarid" SQL Injection Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-09-20

alexander wilhelm has discovered a vulnerability in more.groupware,
which can be exploited by malicious users to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/22007/

 --

[SA21982] Opera SSL RSA Signature Forgery Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Spoofing
Released:    2006-09-18

A vulnerability has been reported in Opera, which can be exploited by
malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/21982/

 --

[SA21979] eSyndiCat Directory Software "what" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-20

meto5757 has reported a vulnerability in eSyndicat Directory Software,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/21979/

 --

[SA21972] MyBB Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-18

HACKERS PAL has discovered some vulnerabilities in MyBB, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/21972/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45



_________________________________
Visit the InfoSec News store!
http://www.shopinfosecnews.org 



This archive was generated by hypermail 2.1.3 : Thu Sep 21 2006 - 22:25:01 PDT