[ISN] Secunia Weekly Summary - Issue: 2006-41

From: InfoSec News (alerts@private)
Date: Thu Oct 12 2006 - 22:32:43 PDT


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2006-10-05 - 2006-10-12                        

                       This week: 80 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Secunia Corporate Website has been Released

Learn more about what Secunia can offer you and your company, see and
download detailed product descriptions, and view comprehensive flash
presentations of both our products and corporate profile.

Visit the Secunia Corporate Website:
http://corporate.secunia.com/


Secunia Vulnerability and Advisory Portal has been Updated

Our publicly available Vulnerability and Advisory Portal
secunia.com has been updated with improved accessibility and usability,
enhanced features, and improved search capabilities along with
availability of extensive product reports.

Over the years, the Secunia brand has become synonymous with credible,
accurate, and reliable vulnerability intelligence and our services
are used by more than 5 million unique users every year at secunia.com.

Visit the Secunia Vulnerability and Advisory Portal:
http://secunia.com/

========================================================================
2) This Week in Brief:

Microsoft has released their monthly security bulletins for October,
which fixes several vulnerabilities in various Microsoft products.

Several of the vulnerabilities fixed have the potential of being
exploited on a broader scale. All users of Microsoft products are
advised to visit Windows Update immediately and apply all available
patches.

Additional details can be found in the referenced Secunia advisories
listed below.

References:
http://secunia.com/SA21735
http://secunia.com/SA21276
http://secunia.com/SA22333
http://secunia.com/SA20717
http://secunia.com/SA22341
http://secunia.com/SA22339
http://secunia.com/SA22127
http://secunia.com/SA20268
http://secunia.com/SA22159
http://secunia.com/SA22307

 --
 
CERT/CC has reported two vulnerabilities in AOL, which can be
exploited by malicious people to compromise a user's system.

Updates are automatically available by logging into the AOL
service.

Reference:
http://secunia.com/SA22304

 --

VIRUS ALERTS:

During the past week Secunia collected 283 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA22159] Microsoft Windows Shell Code Execution Vulnerability
2.  [SA21910] Internet Explorer daxctle.ocx "KeyFrame()" Method
              Vulnerability
3.  [SA20153] Microsoft Word Malformed Object Pointer Vulnerability
4.  [SA22185] Skype URI Argument Handling Format String Vulnerability
5.  [SA21865] Adobe Flash Player Multiple Vulnerabilities
6.  [SA21989] Microsoft Vector Graphics Rendering Library Buffer
              Overflow
7.  [SA22235] PHP "open_basedir" Symlink Security Bypass
              Vulnerability
8.  [SA22280] PHP "_ecalloc" Integer Overflow Vulnerability
9.  [SA12959] Internet Explorer HTML Elements Buffer Overflow
              Vulnerability
10. [SA21735] Microsoft Word Code Execution Vulnerabilities

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA22339] Microsoft Office Multiple Code Execution Vulnerabilities
[SA22333] Microsoft XML Core Services Information Disclosure and Code
Execution
[SA22304] AOL YGP ActiveX Controls Buffer Overflow Vulnerabilities
[SA22284] Serv-U FTP Server OpenSSL Multiple Vulnerabilities
[SA22355] Novell BorderManager VPN Denial of Service Vulnerability
[SA22302] Emek Portal "uyegiris.asp" SQL Injection Vulnerabilities
[SA22285] CA Products Multiple Buffer Overflow Vulnerabilities
[SA22283] CA BrightStor ARCserver Backup Mailslot Buffer Overflow
[SA22341] Microsoft Windows Multiple IPv6 Denial of Service
Vulnerabilities
[SA22307] Microsoft .NET Framework Cross-Site Scripting Vulnerability
[SA22288] Symantec Products IOCTL Handler Privilege Escalation

UNIX/Linux:
[SA22342] Ubuntu update for mozilla
[SA22330] OpenBSD update for OpenSSL
[SA22311] Debian update for libwmf
[SA22299] Debian update for mozilla
[SA22298] SUSE updates for openssh, openssl, and bind9
[SA22369] Sun Solaris Sendmail Long Header Denial of Service
[SA22358] Mandriva update for python
[SA22357] rPath update for idle and python
[SA22338] SUSE updates for php4 and php5
[SA22332] Debian update for xfree86
[SA22331] Ubuntu update for php4 and php5
[SA22313] ZABBIX Format String and Buffer Overflow Vulnerabilities
[SA22303] Ubuntu update for python
[SA22300] Trustix Updates for Multiple Packages
[SA22297] Red Hat update for python
[SA22296] Gentoo update for ncompress
[SA22292] Red Hat update for kernel
[SA22281] Red Hat update for php
[SA22279] Linux Kernel Denial of Service Vulnerabilities
[SA22374] JASmine "section" File Inclusion Vulnerability
[SA22325] Sun Secure Global Desktop Software RSA Signature Forgery
Vulnerability
[SA22317] OpenBSD update for httpd
[SA22306] Ubuntu update for awstats
[SA22324] OpenBSD systrace "systrace_preprepl()" Integer Overflow
Vulnerability
[SA22295] Avaya CMS Sun Solaris RBAC Profile Privilege Escalation
[SA22289] Linux Kernel s390 "copy_from_user" Information Disclosure
[SA22277] Ubuntu update for mono
[SA22367] FreeBSD "PT_LWPINFO" Ptrace Command Denial of Service
[SA22323] Sun Solaris X Display Manager "Xsession" Script Security
Issue

Other:
[SA22361] Avaya PDS HP-UX Ignite-UX Server Unspecified Vulnerability
[SA22326] Linksys WRT54GXv2 Insecure Universal Plug and Play
Configuration
[SA22291] Avaya Products Kerberos V5 setuid Security Issue

Cross Platform:
[SA22373] Compteur "folder" and "cp" File Inclusion Vulnerabilities
[SA22366] Softerra PHPLibrary "lib_dir" File Inclusion Vulnerabilities
[SA22364] Claroline "includePath" File Inclusion Vulnerability
[SA22362] Avaya Products OpenSSH Multiple Vulnerabilities
[SA22345] Flatnuke Multiple Vulnerabilities
[SA22343] Docmint "MY_ENV[BASE_ENGINE_LOC]" File Inclusion
Vulnerability
[SA22337] OpenDock Easy Gallery "doc_directory" File Inclusion
Vulnerabilities
[SA22336] WebYep "webyep_sIncludePath" File Inclusion Vulnerabilities
[SA22335] OpenDock Easy Blog "doc_directory" File Inclusion
Vulnerabilities
[SA22334] OpenDock Easy Doc "doc_directory" File Inclusion
Vulnerabilities
[SA22320] FreeForum "fpath" File Inclusion Vulnerability
[SA22305] phpBB User Viewed Posts Tracker "phpbb_root_path" File
Inclusion
[SA22294] SHTTPD HTTP Request Buffer Overflow Vulnerability
[SA22290] phpBB Security Suite IP Logger "phpbb_root_path" File
Inclusion
[SA22287] Dimension of phpBB "phpbb_root_path" File Inclusion
Vulnerabilities
[SA22278] PhpMyTeam "smileys_dir" File Inclusion Vulnerability
[SA22376] FOAFgen redir.php Disclosure of Sensitive Information
[SA22375] Album Photo Sans Nom "img" Disclosure of Sensitive
Information
[SA22372] IBM WebSphere Application Server Three Vulnerabilities
[SA22349] 4images "search_user" SQL Injection Vulnerability
[SA22346] phpMyAgenda "language" Local File Inclusion Vulnerability
[SA22344] Asbru Web Content Management Spell Checking Vulnerability
[SA22327] Macromedia Breeze URL Parsing Information Disclosure
[SA22322] BTI-Tracker "include/prune_torrents.php" File Deletion
Vulnerability
[SA22319] Cahier de Texte "lire.php" SQL Injection Vulnerabilities
[SA22318] Webmedia Explorer "path_include" File Inclusion
Vulnerability
[SA22310] Blue Smiley Organizer SQL Injection Vulnerabilities
[SA22309] Moodle "tag" SQL Injection Vulnerability
[SA22286] Eazy Cart Multiple Vulnerabilities
[SA22280] PHP "_ecalloc" Integer Overflow Vulnerability
[SA22328] eXpBlog "details.php" Cross-Site Scripting Vulnerabilities
[SA22315] Interspire FastFind "query" Cross-Site Scripting
Vulnerability
[SA22308] Hastymail IMAP / SMTP Command Injection Vulnerability
[SA22293] TorrentFlux "User-Agent" HTTP Header Script Insertion
[SA22329] Adobe Contribute Publishing Server Logfile Password
Disclosure
[SA22312] Adobe ColdFusion Verity Library Privilege Escalation
Vulnerability
[SA22282] PHP "ini_restore()" Security Bypass Vulnerability

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA22339] Microsoft Office Multiple Code Execution Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-10

Multiple vulnerabilities have been reported in Microsoft Office, which
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/22339/

 --

[SA22333] Microsoft XML Core Services Information Disclosure and Code
Execution

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2006-10-10

Two vulnerabilities have been reported in Microsoft XML Core Services,
which can be exploited by malicious people to disclose certain
information and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22333/

 --

[SA22304] AOL YGP ActiveX Controls Buffer Overflow Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-10

CERT/CC has reported two vulnerabilities in AOL, which can be exploited
by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/22304/

 --

[SA22284] Serv-U FTP Server OpenSSL Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-06

Some vulnerabilities have been reported in Serv-U FTP Server, which can
be exploited by malicious people to cause a DoS (Denial of Service) or
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22284/

 --

[SA22355] Novell BorderManager VPN Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-10-11

A vulnerability has been reported in Novell BorderManager, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22355/

 --

[SA22302] Emek Portal "uyegiris.asp" SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-10-09

Dj ReMix has discovered some vulnerabilities in Emek Portal, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/22302/

 --

[SA22285] CA Products Multiple Buffer Overflow Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2006-10-06

Some vulnerabilities have been reported in various CA products, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22285/

 --

[SA22283] CA BrightStor ARCserver Backup Mailslot Buffer Overflow

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2006-10-06

Pedram Amini has reported a vulnerability in BrightStor ARCserver
Backup, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/22283/

 --

[SA22341] Microsoft Windows Multiple IPv6 Denial of Service
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2006-10-10

Three vulnerabilities have been reported in Microsoft Windows, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/22341/

 --

[SA22307] Microsoft .NET Framework Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-10

A vulnerability has been reported in ASP.NET 2.0, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22307/

 --

[SA22288] Symantec Products IOCTL Handler Privilege Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-10-06

A vulnerability has been reported in various Symantec Products, which
can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/22288/


UNIX/Linux:--

[SA22342] Ubuntu update for mozilla

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Spoofing, System
access
Released:    2006-10-11

Ubuntu has issued an update for mozilla. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting and spoofing attacks, bypass certain security
restrictions and potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/22342/

 --

[SA22330] OpenBSD update for OpenSSL

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-09

OpenBSD has issued an update for OpenSSL. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22330/

 --

[SA22311] Debian update for libwmf

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-10

Debian has issued an update for libwmf. This fixes a vulnerability,
which can be exploited by malicious people to compromise an application
using the library.

Full Advisory:
http://secunia.com/advisories/22311/

 --

[SA22299] Debian update for mozilla

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Spoofing, DoS, System access
Released:    2006-10-06

Debian has issued an update for mozilla. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing attacks, bypass certain security restrictions, and potentially
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/22299/

 --

[SA22298] SUSE updates for openssh, openssl, and bind9

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-09

SUSE has issued updates for openssh, openssl, and bind9. These fix some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22298/

 --

[SA22369] Sun Solaris Sendmail Long Header Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-10-11

Sun has acknowledged a vulnerability in Solaris, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22369/

 --

[SA22358] Mandriva update for python

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-11

Mandriva has issued an update for python. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22358/

 --

[SA22357] rPath update for idle and python

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-11

rPath has issued an update for idle and python. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22357/

 --

[SA22338] SUSE updates for php4 and php5

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-10

SUSE has issued updates for php4 and php5. These fix some
vulnerabilities, which can be exploited by malicious, local users to
bypass certain security restrictions and by malicious people to cause a
DoS (Denial of Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22338/

 --

[SA22332] Debian update for xfree86

Critical:    Moderately critical
Where:       From remote
Impact:      Privilege escalation, DoS, System access
Released:    2006-10-10

Debian has issued an update for xfree86. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges, and by malicious people to cause a DoS
(Denial of Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22332/

 --

[SA22331] Ubuntu update for php4 and php5

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2006-10-11

Ubuntu has issued an update for php4 and php5. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
bypass certain security restrictions and by malicious people to cause a
DoS (Denial of Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22331/

 --

[SA22313] ZABBIX Format String and Buffer Overflow Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-09

Some vulnerabilities have been reported in ZABBIX, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22313/

 --

[SA22303] Ubuntu update for python

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-07

Ubuntu has issued an update for python. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22303/

 --

[SA22300] Trustix Updates for Multiple Packages

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2006-10-07

Trustix has issued updates for multiple packages. These fix some
vulnerabilities, which can be exploited by malicious users to bypass
certain security restrictions and by malicious people to cause a DoS
(Denial of Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22300/

 --

[SA22297] Red Hat update for python

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-10

Red Hat has issued an update for python. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22297/

 --

[SA22296] Gentoo update for ncompress

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-06

Gentoo has issued an update for ncompress. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/22296/

 --

[SA22292] Red Hat update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-10-06

Red Hat has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users
bypass certain security restrictions, expose potentially sensitive
information, and cause a DoS (Denial of Service), and by malicious
people to cause a DoS.

Full Advisory:
http://secunia.com/advisories/22292/

 --

[SA22281] Red Hat update for php

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-05

Red Hat has issued an update for php. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of Service)
and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22281/

 --

[SA22279] Linux Kernel Denial of Service Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-10-06

Some vulnerabilities have been reported in the Linux Kernel, which can
be exploited by malicious, local users and malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22279/

 --

[SA22374] JASmine "section" File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2006-10-11

DarkFig has discovered a vulnerability in JASmine, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22374/

 --

[SA22325] Sun Secure Global Desktop Software RSA Signature Forgery
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-10-09

Sun has acknowledged a vulnerability in Sun Secure Global Desktop
Software, which can be exploited by malicious people to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/22325/

 --

[SA22317] OpenBSD update for httpd

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-09

OpenBSD has issued an update for httpd. This fixes a vulnerability,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/22317/

 --

[SA22306] Ubuntu update for awstats

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of system information
Released:    2006-10-10

Ubuntu has issued an update for awstats. This fixes some
vulnerabilities, which can be exploited by malicious people to disclose
system information and conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22306/

 --

[SA22324] OpenBSD systrace "systrace_preprepl()" Integer Overflow
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information, Privilege escalation,
DoS
Released:    2006-10-09

A vulnerability has been reported in OpenBSD's systrace, which can be
exploited by malicious, local users to gain knowledge of potentially
sensitive information, cause a DoS (Denial of Service) and gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/22324/

 --

[SA22295] Avaya CMS Sun Solaris RBAC Profile Privilege Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-10-06

Avaya has acknowledged some vulnerabilities in Avaya Call Management
System, which can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/22295/

 --

[SA22289] Linux Kernel s390 "copy_from_user" Information Disclosure

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2006-10-06

A vulnerability has been reported in the Linux Kernel, which can be
exploited by malicious, local users to gain knowledge of potentially
sensitive information.

Full Advisory:
http://secunia.com/advisories/22289/

 --

[SA22277] Ubuntu update for mono

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-10-05

Ubuntu has issued an update for mono. This fixes some vulnerabilities,
which can be exploited by malicious, local users to perform certain
actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/22277/

 --

[SA22367] FreeBSD "PT_LWPINFO" Ptrace Command Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-10-11

A vulnerability has been reported in FreeBSD, which can be exploited by
malicious, local users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22367/

 --

[SA22323] Sun Solaris X Display Manager "Xsession" Script Security
Issue

Critical:    Not critical
Where:       Local system
Impact:      Exposure of system information
Released:    2006-10-09

A security issue has been reported in Sun Solaris, which can be
exploited by malicious, local users to gain access to system
information.

Full Advisory:
http://secunia.com/advisories/22323/


Other:--

[SA22361] Avaya PDS HP-UX Ignite-UX Server Unspecified Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-11

Avaya has acknowledged a vulnerability in Avaya Predictive Dialing
System (PDS), which can be exploited by malicious people to compromise
a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22361/

 --

[SA22326] Linksys WRT54GXv2 Insecure Universal Plug and Play
Configuration

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-10-09

A vulnerability has been reported in Linksys WRT54GXv2, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/22326/

 --

[SA22291] Avaya Products Kerberos V5 setuid Security Issue

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-10-06

Avaya has acknowledged a security issue in various products, which
potentially can be exploited by malicious, local users to perform
certain actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/22291/


Cross Platform:--

[SA22373] Compteur "folder" and "cp" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-11

Some vulnerabilities have been discovered in Compteur, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22373/

 --

[SA22366] Softerra PHPLibrary "lib_dir" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-11

Some vulnerabilities have been discovered in Softerra PHPLibrary, which
can be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22366/

 --

[SA22364] Claroline "includePath" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-11

k1tk4t has discovered a vulnerability in Claroline, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22364/

 --

[SA22362] Avaya Products OpenSSH Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-11

Avaya has acknowledged some vulnerabilities in OpenSSH included in
various Avaya products, which can be exploited by malicious people to
cause a DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22362/

 --

[SA22345] Flatnuke Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information,
System access
Released:    2006-10-11

rgod has discovered some vulnerabilities in Flatnuke, which can be
exploited by malicious people to disclose certain sensitive
information, perform certain actions with escalated privileges, or to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22345/

 --

[SA22343] Docmint "MY_ENV[BASE_ENGINE_LOC]" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-10

M. Hasran Addahroni has discovered a vulnerability in Docmint, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22343/

 --

[SA22337] OpenDock Easy Gallery "doc_directory" File Inclusion
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-10

Dedi Dwianto has reported some vulnerabilities in OpenDock Easy
Gallery, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/22337/

 --

[SA22336] WebYep "webyep_sIncludePath" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-10

Dedi Dwianto has discovered some vulnerabilities in WebYep, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22336/

 --

[SA22335] OpenDock Easy Blog "doc_directory" File Inclusion
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-10

Dedi Dwianto has reported some vulnerabilities in OpenDock Easy Blog,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22335/

 --

[SA22334] OpenDock Easy Doc "doc_directory" File Inclusion
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-10

Dedi Dwianto has reported some vulnerabilities in OpenDock Easy Doc,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22334/

 --

[SA22320] FreeForum "fpath" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-09

XORON has discovered a vulnerability in FreeForum, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22320/

 --

[SA22305] phpBB User Viewed Posts Tracker "phpbb_root_path" File
Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-09

XORON has reported a vulnerability in the User Viewed Posts Tracker
module for phpBB, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22305/

 --

[SA22294] SHTTPD HTTP Request Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-06

skOd has discovered a vulnerability in SHTTPD, which can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22294/

 --

[SA22290] phpBB Security Suite IP Logger "phpbb_root_path" File
Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-06

SpiderZ has reported a vulnerability in the Security Suite IP Logger
module for phpBB, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22290/

 --

[SA22287] Dimension of phpBB "phpbb_root_path" File Inclusion
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-06

SpiderZ has discovered some vulnerabilities in Dimension of phpBB,
which can be exploited by malicious people to execute arbitrary PHP
code by including files from local or external resources.

Full Advisory:
http://secunia.com/advisories/22287/

 --

[SA22278] PhpMyTeam "smileys_dir" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-06

XORON has reported a vulnerability in PhpMyTeam, which can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22278/

 --

[SA22376] FOAFgen redir.php Disclosure of Sensitive Information

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-10-11

DarkFig has discovered a vulnerability in FOAFgen, which can be
exploited by malicious people to gain knowledge of sensitive
information.

Full Advisory:
http://secunia.com/advisories/22376/

 --

[SA22375] Album Photo Sans Nom "img" Disclosure of Sensitive
Information

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-10-11

DarkFig has discovered a vulnerability in Album Photo Sans Nom, which
can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/22375/

 --

[SA22372] IBM WebSphere Application Server Three Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, Security Bypass, Exposure of sensitive
information
Released:    2006-10-11

Some vulnerabilities have been reported in IBM WebSphere Application
Server, which can be exploited by malicious people to gain knowledge of
potentially sensitive information or gain unautorised access.

Full Advisory:
http://secunia.com/advisories/22372/

 --

[SA22349] 4images "search_user" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-10-10

disfigure has reported a vulnerability in 4images, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/22349/

 --

[SA22346] phpMyAgenda "language" Local File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2006-10-11

Nima Salehi has discovered a vulnerability in phpMyAgenda, which can be
exploited by malicious people to disclose potentially sensitive
information or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22346/

 --

[SA22344] Asbru Web Content Management Spell Checking Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-10-11

A vulnerability has been reported in Asbru Web Content Management,
which can be exploited by malicious users to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22344/

 --

[SA22327] Macromedia Breeze URL Parsing Information Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-10-11

A vulnerability has been reported in Macromedia Breeze, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/22327/

 --

[SA22322] BTI-Tracker "include/prune_torrents.php" File Deletion
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-10-09

Gu1ll4um3r0m41n has discovered a vulnerability in BTI-Tracker, which
can be exploited by malicious people to delete arbitrary files.

Full Advisory:
http://secunia.com/advisories/22322/

 --

[SA22319] Cahier de Texte "lire.php" SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-10-09

s4mi has discovered some vulnerabilities in Cahier de Texte, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/22319/

 --

[SA22318] Webmedia Explorer "path_include" File Inclusion
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-10-10

Kacper has discovered a vulnerability in Webmedia Explorer, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22318/

 --

[SA22310] Blue Smiley Organizer SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-10-09

Some vulnerabilities have been reported in Blue Smiley Organizer, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/22310/

 --

[SA22309] Moodle "tag" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-10-09

Disfigure has discovered a vulnerability in Moodle, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/22309/

 --

[SA22286] Eazy Cart Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Manipulation of
data, Exposure of sensitive information
Released:    2006-10-10

Some vulnerabilities have been discovered in Eazy Cart, which can be
exploited by malicious people to bypass certain security restriction,
disclose sensitive information, manipulate orders, and to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22286/

 --

[SA22280] PHP "_ecalloc" Integer Overflow Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-05

A vulnerability has been reported in PHP, which can be exploited by
malicious people to cause a DoS (Denial of Service) or potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22280/

 --

[SA22328] eXpBlog "details.php" Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-10

Tamriel has discovered some vulnerabilities in eXpBlog, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22328/

 --

[SA22315] Interspire FastFind "query" Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-09

Dr.Ninux has reported a vulnerability in FastFind, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22315/

 --

[SA22308] Hastymail IMAP / SMTP Command Injection Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-10-09

A vulnerability has been reported in Hastymail, which can be exploited
by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/22308/

 --

[SA22293] TorrentFlux "User-Agent" HTTP Header Script Insertion

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-06

Steven Roddis has discovered a vulnerability in TorrentFlux, which can
be exploited by malicious users to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/22293/

 --

[SA22329] Adobe Contribute Publishing Server Logfile Password
Disclosure

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2006-10-11

A security issue has been reported in Adobe Contribute Publishing
Server, which can be exploited by malicious, local users to disclose
sensitive information.

Full Advisory:
http://secunia.com/advisories/22329/

 --

[SA22312] Adobe ColdFusion Verity Library Privilege Escalation
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-10-11

A vulnerability has been reported in Adobe ColdFusion, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/22312/

 --

[SA22282] PHP "ini_restore()" Security Bypass Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2006-10-10

Maksymilian Arciemowicz has reported a vulnerability in PHP, which can
be exploited by malicious, local users to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/22282/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_________________________________
Visit the InfoSec News store!
http://www.shopinfosecnews.org 



This archive was generated by hypermail 2.1.3 : Thu Oct 12 2006 - 22:39:29 PDT