======================================================================== The Secunia Weekly Advisory Summary 2006-10-05 - 2006-10-12 This week: 80 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: Secunia Corporate Website has been Released Learn more about what Secunia can offer you and your company, see and download detailed product descriptions, and view comprehensive flash presentations of both our products and corporate profile. Visit the Secunia Corporate Website: http://corporate.secunia.com/ Secunia Vulnerability and Advisory Portal has been Updated Our publicly available Vulnerability and Advisory Portal secunia.com has been updated with improved accessibility and usability, enhanced features, and improved search capabilities along with availability of extensive product reports. Over the years, the Secunia brand has become synonymous with credible, accurate, and reliable vulnerability intelligence and our services are used by more than 5 million unique users every year at secunia.com. Visit the Secunia Vulnerability and Advisory Portal: http://secunia.com/ ======================================================================== 2) This Week in Brief: Microsoft has released their monthly security bulletins for October, which fixes several vulnerabilities in various Microsoft products. Several of the vulnerabilities fixed have the potential of being exploited on a broader scale. All users of Microsoft products are advised to visit Windows Update immediately and apply all available patches. Additional details can be found in the referenced Secunia advisories listed below. References: http://secunia.com/SA21735 http://secunia.com/SA21276 http://secunia.com/SA22333 http://secunia.com/SA20717 http://secunia.com/SA22341 http://secunia.com/SA22339 http://secunia.com/SA22127 http://secunia.com/SA20268 http://secunia.com/SA22159 http://secunia.com/SA22307 -- CERT/CC has reported two vulnerabilities in AOL, which can be exploited by malicious people to compromise a user's system. Updates are automatically available by logging into the AOL service. Reference: http://secunia.com/SA22304 -- VIRUS ALERTS: During the past week Secunia collected 283 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA22159] Microsoft Windows Shell Code Execution Vulnerability 2. [SA21910] Internet Explorer daxctle.ocx "KeyFrame()" Method Vulnerability 3. [SA20153] Microsoft Word Malformed Object Pointer Vulnerability 4. [SA22185] Skype URI Argument Handling Format String Vulnerability 5. [SA21865] Adobe Flash Player Multiple Vulnerabilities 6. [SA21989] Microsoft Vector Graphics Rendering Library Buffer Overflow 7. [SA22235] PHP "open_basedir" Symlink Security Bypass Vulnerability 8. [SA22280] PHP "_ecalloc" Integer Overflow Vulnerability 9. [SA12959] Internet Explorer HTML Elements Buffer Overflow Vulnerability 10. [SA21735] Microsoft Word Code Execution Vulnerabilities ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA22339] Microsoft Office Multiple Code Execution Vulnerabilities [SA22333] Microsoft XML Core Services Information Disclosure and Code Execution [SA22304] AOL YGP ActiveX Controls Buffer Overflow Vulnerabilities [SA22284] Serv-U FTP Server OpenSSL Multiple Vulnerabilities [SA22355] Novell BorderManager VPN Denial of Service Vulnerability [SA22302] Emek Portal "uyegiris.asp" SQL Injection Vulnerabilities [SA22285] CA Products Multiple Buffer Overflow Vulnerabilities [SA22283] CA BrightStor ARCserver Backup Mailslot Buffer Overflow [SA22341] Microsoft Windows Multiple IPv6 Denial of Service Vulnerabilities [SA22307] Microsoft .NET Framework Cross-Site Scripting Vulnerability [SA22288] Symantec Products IOCTL Handler Privilege Escalation UNIX/Linux: [SA22342] Ubuntu update for mozilla [SA22330] OpenBSD update for OpenSSL [SA22311] Debian update for libwmf [SA22299] Debian update for mozilla [SA22298] SUSE updates for openssh, openssl, and bind9 [SA22369] Sun Solaris Sendmail Long Header Denial of Service [SA22358] Mandriva update for python [SA22357] rPath update for idle and python [SA22338] SUSE updates for php4 and php5 [SA22332] Debian update for xfree86 [SA22331] Ubuntu update for php4 and php5 [SA22313] ZABBIX Format String and Buffer Overflow Vulnerabilities [SA22303] Ubuntu update for python [SA22300] Trustix Updates for Multiple Packages [SA22297] Red Hat update for python [SA22296] Gentoo update for ncompress [SA22292] Red Hat update for kernel [SA22281] Red Hat update for php [SA22279] Linux Kernel Denial of Service Vulnerabilities [SA22374] JASmine "section" File Inclusion Vulnerability [SA22325] Sun Secure Global Desktop Software RSA Signature Forgery Vulnerability [SA22317] OpenBSD update for httpd [SA22306] Ubuntu update for awstats [SA22324] OpenBSD systrace "systrace_preprepl()" Integer Overflow Vulnerability [SA22295] Avaya CMS Sun Solaris RBAC Profile Privilege Escalation [SA22289] Linux Kernel s390 "copy_from_user" Information Disclosure [SA22277] Ubuntu update for mono [SA22367] FreeBSD "PT_LWPINFO" Ptrace Command Denial of Service [SA22323] Sun Solaris X Display Manager "Xsession" Script Security Issue Other: [SA22361] Avaya PDS HP-UX Ignite-UX Server Unspecified Vulnerability [SA22326] Linksys WRT54GXv2 Insecure Universal Plug and Play Configuration [SA22291] Avaya Products Kerberos V5 setuid Security Issue Cross Platform: [SA22373] Compteur "folder" and "cp" File Inclusion Vulnerabilities [SA22366] Softerra PHPLibrary "lib_dir" File Inclusion Vulnerabilities [SA22364] Claroline "includePath" File Inclusion Vulnerability [SA22362] Avaya Products OpenSSH Multiple Vulnerabilities [SA22345] Flatnuke Multiple Vulnerabilities [SA22343] Docmint "MY_ENV[BASE_ENGINE_LOC]" File Inclusion Vulnerability [SA22337] OpenDock Easy Gallery "doc_directory" File Inclusion Vulnerabilities [SA22336] WebYep "webyep_sIncludePath" File Inclusion Vulnerabilities [SA22335] OpenDock Easy Blog "doc_directory" File Inclusion Vulnerabilities [SA22334] OpenDock Easy Doc "doc_directory" File Inclusion Vulnerabilities [SA22320] FreeForum "fpath" File Inclusion Vulnerability [SA22305] phpBB User Viewed Posts Tracker "phpbb_root_path" File Inclusion [SA22294] SHTTPD HTTP Request Buffer Overflow Vulnerability [SA22290] phpBB Security Suite IP Logger "phpbb_root_path" File Inclusion [SA22287] Dimension of phpBB "phpbb_root_path" File Inclusion Vulnerabilities [SA22278] PhpMyTeam "smileys_dir" File Inclusion Vulnerability [SA22376] FOAFgen redir.php Disclosure of Sensitive Information [SA22375] Album Photo Sans Nom "img" Disclosure of Sensitive Information [SA22372] IBM WebSphere Application Server Three Vulnerabilities [SA22349] 4images "search_user" SQL Injection Vulnerability [SA22346] phpMyAgenda "language" Local File Inclusion Vulnerability [SA22344] Asbru Web Content Management Spell Checking Vulnerability [SA22327] Macromedia Breeze URL Parsing Information Disclosure [SA22322] BTI-Tracker "include/prune_torrents.php" File Deletion Vulnerability [SA22319] Cahier de Texte "lire.php" SQL Injection Vulnerabilities [SA22318] Webmedia Explorer "path_include" File Inclusion Vulnerability [SA22310] Blue Smiley Organizer SQL Injection Vulnerabilities [SA22309] Moodle "tag" SQL Injection Vulnerability [SA22286] Eazy Cart Multiple Vulnerabilities [SA22280] PHP "_ecalloc" Integer Overflow Vulnerability [SA22328] eXpBlog "details.php" Cross-Site Scripting Vulnerabilities [SA22315] Interspire FastFind "query" Cross-Site Scripting Vulnerability [SA22308] Hastymail IMAP / SMTP Command Injection Vulnerability [SA22293] TorrentFlux "User-Agent" HTTP Header Script Insertion [SA22329] Adobe Contribute Publishing Server Logfile Password Disclosure [SA22312] Adobe ColdFusion Verity Library Privilege Escalation Vulnerability [SA22282] PHP "ini_restore()" Security Bypass Vulnerability ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA22339] Microsoft Office Multiple Code Execution Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-10-10 Multiple vulnerabilities have been reported in Microsoft Office, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/22339/ -- [SA22333] Microsoft XML Core Services Information Disclosure and Code Execution Critical: Highly critical Where: From remote Impact: Exposure of sensitive information, System access Released: 2006-10-10 Two vulnerabilities have been reported in Microsoft XML Core Services, which can be exploited by malicious people to disclose certain information and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22333/ -- [SA22304] AOL YGP ActiveX Controls Buffer Overflow Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-10-10 CERT/CC has reported two vulnerabilities in AOL, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/22304/ -- [SA22284] Serv-U FTP Server OpenSSL Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-10-06 Some vulnerabilities have been reported in Serv-U FTP Server, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22284/ -- [SA22355] Novell BorderManager VPN Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-10-11 A vulnerability has been reported in Novell BorderManager, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/22355/ -- [SA22302] Emek Portal "uyegiris.asp" SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-10-09 Dj ReMix has discovered some vulnerabilities in Emek Portal, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/22302/ -- [SA22285] CA Products Multiple Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From local network Impact: System access Released: 2006-10-06 Some vulnerabilities have been reported in various CA products, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22285/ -- [SA22283] CA BrightStor ARCserver Backup Mailslot Buffer Overflow Critical: Moderately critical Where: From local network Impact: System access Released: 2006-10-06 Pedram Amini has reported a vulnerability in BrightStor ARCserver Backup, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22283/ -- [SA22341] Microsoft Windows Multiple IPv6 Denial of Service Vulnerabilities Critical: Less critical Where: From remote Impact: DoS Released: 2006-10-10 Three vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/22341/ -- [SA22307] Microsoft .NET Framework Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-10-10 A vulnerability has been reported in ASP.NET 2.0, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/22307/ -- [SA22288] Symantec Products IOCTL Handler Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-10-06 A vulnerability has been reported in various Symantec Products, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/22288/ UNIX/Linux:-- [SA22342] Ubuntu update for mozilla Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Spoofing, System access Released: 2006-10-11 Ubuntu has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, bypass certain security restrictions and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/22342/ -- [SA22330] OpenBSD update for OpenSSL Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-10-09 OpenBSD has issued an update for OpenSSL. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22330/ -- [SA22311] Debian update for libwmf Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-10-10 Debian has issued an update for libwmf. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/22311/ -- [SA22299] Debian update for mozilla Critical: Highly critical Where: From remote Impact: Security Bypass, Spoofing, DoS, System access Released: 2006-10-06 Debian has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/22299/ -- [SA22298] SUSE updates for openssh, openssl, and bind9 Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-10-09 SUSE has issued updates for openssh, openssl, and bind9. These fix some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22298/ -- [SA22369] Sun Solaris Sendmail Long Header Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-10-11 Sun has acknowledged a vulnerability in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/22369/ -- [SA22358] Mandriva update for python Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-10-11 Mandriva has issued an update for python. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22358/ -- [SA22357] rPath update for idle and python Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-10-11 rPath has issued an update for idle and python. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22357/ -- [SA22338] SUSE updates for php4 and php5 Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-10-10 SUSE has issued updates for php4 and php5. These fix some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22338/ -- [SA22332] Debian update for xfree86 Critical: Moderately critical Where: From remote Impact: Privilege escalation, DoS, System access Released: 2006-10-10 Debian has issued an update for xfree86. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges, and by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22332/ -- [SA22331] Ubuntu update for php4 and php5 Critical: Moderately critical Where: From remote Impact: Security Bypass, DoS, System access Released: 2006-10-11 Ubuntu has issued an update for php4 and php5. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22331/ -- [SA22313] ZABBIX Format String and Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-10-09 Some vulnerabilities have been reported in ZABBIX, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22313/ -- [SA22303] Ubuntu update for python Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-10-07 Ubuntu has issued an update for python. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22303/ -- [SA22300] Trustix Updates for Multiple Packages Critical: Moderately critical Where: From remote Impact: Security Bypass, DoS, System access Released: 2006-10-07 Trustix has issued updates for multiple packages. These fix some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22300/ -- [SA22297] Red Hat update for python Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-10-10 Red Hat has issued an update for python. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22297/ -- [SA22296] Gentoo update for ncompress Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-10-06 Gentoo has issued an update for ncompress. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/22296/ -- [SA22292] Red Hat update for kernel Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-10-06 Red Hat has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users bypass certain security restrictions, expose potentially sensitive information, and cause a DoS (Denial of Service), and by malicious people to cause a DoS. Full Advisory: http://secunia.com/advisories/22292/ -- [SA22281] Red Hat update for php Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-10-05 Red Hat has issued an update for php. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22281/ -- [SA22279] Linux Kernel Denial of Service Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-10-06 Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/22279/ -- [SA22374] JASmine "section" File Inclusion Vulnerability Critical: Moderately critical Where: From local network Impact: System access Released: 2006-10-11 DarkFig has discovered a vulnerability in JASmine, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22374/ -- [SA22325] Sun Secure Global Desktop Software RSA Signature Forgery Vulnerability Critical: Less critical Where: From remote Impact: Security Bypass Released: 2006-10-09 Sun has acknowledged a vulnerability in Sun Secure Global Desktop Software, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/22325/ -- [SA22317] OpenBSD update for httpd Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-10-09 OpenBSD has issued an update for httpd. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/22317/ -- [SA22306] Ubuntu update for awstats Critical: Less critical Where: From remote Impact: Cross Site Scripting, Exposure of system information Released: 2006-10-10 Ubuntu has issued an update for awstats. This fixes some vulnerabilities, which can be exploited by malicious people to disclose system information and conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/22306/ -- [SA22324] OpenBSD systrace "systrace_preprepl()" Integer Overflow Vulnerability Critical: Less critical Where: Local system Impact: Exposure of sensitive information, Privilege escalation, DoS Released: 2006-10-09 A vulnerability has been reported in OpenBSD's systrace, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information, cause a DoS (Denial of Service) and gain escalated privileges. Full Advisory: http://secunia.com/advisories/22324/ -- [SA22295] Avaya CMS Sun Solaris RBAC Profile Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-10-06 Avaya has acknowledged some vulnerabilities in Avaya Call Management System, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/22295/ -- [SA22289] Linux Kernel s390 "copy_from_user" Information Disclosure Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2006-10-06 A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information. Full Advisory: http://secunia.com/advisories/22289/ -- [SA22277] Ubuntu update for mono Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-10-05 Ubuntu has issued an update for mono. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/22277/ -- [SA22367] FreeBSD "PT_LWPINFO" Ptrace Command Denial of Service Critical: Not critical Where: Local system Impact: DoS Released: 2006-10-11 A vulnerability has been reported in FreeBSD, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/22367/ -- [SA22323] Sun Solaris X Display Manager "Xsession" Script Security Issue Critical: Not critical Where: Local system Impact: Exposure of system information Released: 2006-10-09 A security issue has been reported in Sun Solaris, which can be exploited by malicious, local users to gain access to system information. Full Advisory: http://secunia.com/advisories/22323/ Other:-- [SA22361] Avaya PDS HP-UX Ignite-UX Server Unspecified Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-10-11 Avaya has acknowledged a vulnerability in Avaya Predictive Dialing System (PDS), which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22361/ -- [SA22326] Linksys WRT54GXv2 Insecure Universal Plug and Play Configuration Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2006-10-09 A vulnerability has been reported in Linksys WRT54GXv2, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/22326/ -- [SA22291] Avaya Products Kerberos V5 setuid Security Issue Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-10-06 Avaya has acknowledged a security issue in various products, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/22291/ Cross Platform:-- [SA22373] Compteur "folder" and "cp" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-10-11 Some vulnerabilities have been discovered in Compteur, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22373/ -- [SA22366] Softerra PHPLibrary "lib_dir" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-10-11 Some vulnerabilities have been discovered in Softerra PHPLibrary, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22366/ -- [SA22364] Claroline "includePath" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-10-11 k1tk4t has discovered a vulnerability in Claroline, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22364/ -- [SA22362] Avaya Products OpenSSH Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-10-11 Avaya has acknowledged some vulnerabilities in OpenSSH included in various Avaya products, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22362/ -- [SA22345] Flatnuke Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information, System access Released: 2006-10-11 rgod has discovered some vulnerabilities in Flatnuke, which can be exploited by malicious people to disclose certain sensitive information, perform certain actions with escalated privileges, or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22345/ -- [SA22343] Docmint "MY_ENV[BASE_ENGINE_LOC]" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-10-10 M. Hasran Addahroni has discovered a vulnerability in Docmint, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22343/ -- [SA22337] OpenDock Easy Gallery "doc_directory" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-10-10 Dedi Dwianto has reported some vulnerabilities in OpenDock Easy Gallery, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22337/ -- [SA22336] WebYep "webyep_sIncludePath" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-10-10 Dedi Dwianto has discovered some vulnerabilities in WebYep, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22336/ -- [SA22335] OpenDock Easy Blog "doc_directory" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-10-10 Dedi Dwianto has reported some vulnerabilities in OpenDock Easy Blog, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22335/ -- [SA22334] OpenDock Easy Doc "doc_directory" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-10-10 Dedi Dwianto has reported some vulnerabilities in OpenDock Easy Doc, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22334/ -- [SA22320] FreeForum "fpath" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-10-09 XORON has discovered a vulnerability in FreeForum, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22320/ -- [SA22305] phpBB User Viewed Posts Tracker "phpbb_root_path" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2006-10-09 XORON has reported a vulnerability in the User Viewed Posts Tracker module for phpBB, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22305/ -- [SA22294] SHTTPD HTTP Request Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-10-06 skOd has discovered a vulnerability in SHTTPD, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22294/ -- [SA22290] phpBB Security Suite IP Logger "phpbb_root_path" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2006-10-06 SpiderZ has reported a vulnerability in the Security Suite IP Logger module for phpBB, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22290/ -- [SA22287] Dimension of phpBB "phpbb_root_path" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-10-06 SpiderZ has discovered some vulnerabilities in Dimension of phpBB, which can be exploited by malicious people to execute arbitrary PHP code by including files from local or external resources. Full Advisory: http://secunia.com/advisories/22287/ -- [SA22278] PhpMyTeam "smileys_dir" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-10-06 XORON has reported a vulnerability in PhpMyTeam, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22278/ -- [SA22376] FOAFgen redir.php Disclosure of Sensitive Information Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2006-10-11 DarkFig has discovered a vulnerability in FOAFgen, which can be exploited by malicious people to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/22376/ -- [SA22375] Album Photo Sans Nom "img" Disclosure of Sensitive Information Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2006-10-11 DarkFig has discovered a vulnerability in Album Photo Sans Nom, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/22375/ -- [SA22372] IBM WebSphere Application Server Three Vulnerabilities Critical: Moderately critical Where: From remote Impact: Unknown, Security Bypass, Exposure of sensitive information Released: 2006-10-11 Some vulnerabilities have been reported in IBM WebSphere Application Server, which can be exploited by malicious people to gain knowledge of potentially sensitive information or gain unautorised access. Full Advisory: http://secunia.com/advisories/22372/ -- [SA22349] 4images "search_user" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-10-10 disfigure has reported a vulnerability in 4images, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/22349/ -- [SA22346] phpMyAgenda "language" Local File Inclusion Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information, System access Released: 2006-10-11 Nima Salehi has discovered a vulnerability in phpMyAgenda, which can be exploited by malicious people to disclose potentially sensitive information or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22346/ -- [SA22344] Asbru Web Content Management Spell Checking Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2006-10-11 A vulnerability has been reported in Asbru Web Content Management, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22344/ -- [SA22327] Macromedia Breeze URL Parsing Information Disclosure Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2006-10-11 A vulnerability has been reported in Macromedia Breeze, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/22327/ -- [SA22322] BTI-Tracker "include/prune_torrents.php" File Deletion Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-10-09 Gu1ll4um3r0m41n has discovered a vulnerability in BTI-Tracker, which can be exploited by malicious people to delete arbitrary files. Full Advisory: http://secunia.com/advisories/22322/ -- [SA22319] Cahier de Texte "lire.php" SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-10-09 s4mi has discovered some vulnerabilities in Cahier de Texte, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/22319/ -- [SA22318] Webmedia Explorer "path_include" File Inclusion Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2006-10-10 Kacper has discovered a vulnerability in Webmedia Explorer, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22318/ -- [SA22310] Blue Smiley Organizer SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-10-09 Some vulnerabilities have been reported in Blue Smiley Organizer, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/22310/ -- [SA22309] Moodle "tag" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-10-09 Disfigure has discovered a vulnerability in Moodle, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/22309/ -- [SA22286] Eazy Cart Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Manipulation of data, Exposure of sensitive information Released: 2006-10-10 Some vulnerabilities have been discovered in Eazy Cart, which can be exploited by malicious people to bypass certain security restriction, disclose sensitive information, manipulate orders, and to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/22286/ -- [SA22280] PHP "_ecalloc" Integer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-10-05 A vulnerability has been reported in PHP, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/22280/ -- [SA22328] eXpBlog "details.php" Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-10-10 Tamriel has discovered some vulnerabilities in eXpBlog, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/22328/ -- [SA22315] Interspire FastFind "query" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-10-09 Dr.Ninux has reported a vulnerability in FastFind, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/22315/ -- [SA22308] Hastymail IMAP / SMTP Command Injection Vulnerability Critical: Less critical Where: From remote Impact: Security Bypass Released: 2006-10-09 A vulnerability has been reported in Hastymail, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/22308/ -- [SA22293] TorrentFlux "User-Agent" HTTP Header Script Insertion Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-10-06 Steven Roddis has discovered a vulnerability in TorrentFlux, which can be exploited by malicious users to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/22293/ -- [SA22329] Adobe Contribute Publishing Server Logfile Password Disclosure Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2006-10-11 A security issue has been reported in Adobe Contribute Publishing Server, which can be exploited by malicious, local users to disclose sensitive information. Full Advisory: http://secunia.com/advisories/22329/ -- [SA22312] Adobe ColdFusion Verity Library Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-10-11 A vulnerability has been reported in Adobe ColdFusion, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/22312/ -- [SA22282] PHP "ini_restore()" Security Bypass Vulnerability Critical: Less critical Where: Local system Impact: Security Bypass Released: 2006-10-10 Maksymilian Arciemowicz has reported a vulnerability in PHP, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/22282/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _________________________________ Visit the InfoSec News store! http://www.shopinfosecnews.org
This archive was generated by hypermail 2.1.3 : Thu Oct 12 2006 - 22:39:29 PDT