======================================================================== The Secunia Weekly Advisory Summary 2007-01-04 - 2007-01-11 This week: 83 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Be sure to check your own system: http://secunia.com/software_inspector/ Feature Overview - The Secunia Software Inspector: * Detects insecure versions of applications installed * Verifies that all Microsoft patches are applied * Assists you in updating your system and applications * Runs through your browser. No installation or download is required. Read more in our blog: http://secunia.com/blog/4/ http://secunia.com/blog/3/ ======================================================================== 2) This Week in Brief: Microsoft released four security advisories this week, three of which they tagged as critical and one as important. Multiple vulnerabilities were found in Microsoft Excel and Outlook, while a buffer overflow in Microsoft's Vector Markup Language (VML) and an error in the Brazilian Portuguese grammar checker in Microsoft Office were found to potentially allow remote code execution. The VML vulnerability is currently being exploited, according to Microsoft; hence, Secunia has tagged this vulnerability as "Extremely critical". Microsoft users are advised to run the Microsoft Update service to ensure that all security patches are downloaded and installed. You can use the Secunia Software Inspector to help you determine if your system has the most current security updates from Microsoft: http://secunia.com/software_inspector/ For more information, refer to the following Secunia advisories: http://secunia.com/advisories/23671/ http://secunia.com/advisories/23674/ http://secunia.com/advisories/23676/ http://secunia.com/advisories/23677/ -- Two vulnerabilities were found in Adobe products this week, one in Adobe Coldfusion, and the other in Adobe Reader. The Coldfusion vulnerability has been tagged by Secunia as "Moderately critical", and is caused due to an input validation error when processing URL-encoded file names. It can be exploited to view arbitrary files on the web root via a specially crafted URL with a doubly-encoded NULL byte and an extension that is handled by ColdFusion e.g. ".cfm". The Reader vulnerability has been tagged by Secunia as "Highly critical", and is caused due to an unspecified error when processing PDF files. This can be exploited to cause a heap corruption and may allow execution of arbitrary code when a specially-crafted PDF file is opened. Both vulnerabilities have patches available from Adobe. Users who have Coldfusion and Reader installed in their systems are advised to install the security updates immediately. You can use the Secunia Software Inspector to help you determine if your system is vulnerable: http://secunia.com/software_inspector/ For more information, refer to the following Secunia advisories: http://secunia.com/advisories/23666/ http://secunia.com/advisories/23668/ -- VIRUS ALERTS: During the past week Secunia collected 213 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA23483] Adobe Reader / Acrobat Multiple Vulnerabilities 2. [SA23613] Opera Browser Two Vulnerabilities 3. [SA23676] Microsoft Excel Multiple Vulnerabilities 4. [SA23282] Mozilla Firefox Multiple Vulnerabilities 5. [SA23677] Microsoft Windows Vector Markup Language Buffer Overflow 6. [SA23540] Apple Quicktime RTSP URL Handling Buffer Overflow Vulnerability 7. [SA23612] OpenOffice WMF/EMF Processing Buffer Overflow Vulnerabilities 8. [SA21910] Internet Explorer Multiple Vulnerabilities 9. [SA23666] Adobe Reader Unspecified Heap Corruption Vulnerability 10. [SA23595] Wordpress SQL Injection and Cross-Site Scripting Vulnerabilities ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA23677] Microsoft Windows Vector Markup Language Buffer Overflow [SA23676] Microsoft Excel Multiple Vulnerabilities [SA23671] Microsoft Office Brazilian Portuguese Grammar Checker Vulnerability [SA23638] Sina UC BROWSER2UC.dll ActiveX Control Buffer Overflows [SA23674] Microsoft Outlook Multiple Vulnerabilities [SA23668] Adobe ColdFusion MX File Content Disclosure Vulnerability [SA23659] EF Commander ISO Long Pathname Buffer Overflow [SA23658] Resco Photo Viewer PNG Handling Unspecified Vulnerability [SA23645] Kolayindir Download "id" SQL Injection Vulnerability [SA23642] ShopStoreNow "CatID" SQL Injection Vulnerability [SA23622] Eudora WorldMail Mail Management Service Buffer Overflow [SA23657] RI Blog "q" Cross-Site Scripting Vulnerability [SA23652] Digitizing Quote And Ordering System SQL Injection and Cross-Site Scripting [SA23710] Cisco Multiple Products JTapi Gateway Denial Of Service [SA23619] Novell Client User Profile Restriction Bypass [SA23663] HP PML Driver HPZ12 Windows Privilege Escalation Security Issue [SA23639] SecureKit Steganography Carrier File Password Bypass Security Issue [SA23655] Internet Explorer Memory Corruption Weakness UNIX/Linux: [SA23719] Astaro update for ClamAV [SA23717] SUSE update for w3m [SA23712] Mandriva update for OpenOffice.org [SA23707] Fedora Core 5 update for krb5 [SA23706] Fedora Core 6 update for krb5 [SA23703] Apple Mac OS X UFS ffs_mountfs() Integer Overflow [SA23701] SUSE update for Kerberos [SA23696] Kerberos kadmind xprt->xp_auth Code Execution Vulnerability [SA23692] Gentoo update for seamonkey [SA23690] Kerberos kadmind "mechglue" Code Execution Vulnerability [SA23683] Debian update for openoffice.org [SA23682] rPath update for openoffice.org [SA23680] VMWare ESX Server Multiple Vulnerabilities [SA23678] Mandriva update for nvidia [SA23667] Mandriva update for krb5 [SA23650] SUSE update for Sun Java [SA23624] OmniWeb "alert()" Format String Vulnerability [SA23620] Fedora update for openoffice.org [SA23618] Fedora update for thunderbird [SA23694] Ubuntu update for madwifi [SA23688] IBM AIX ftpd Two Vulnerabilities [SA23681] Debian update for libapache-mod-auth-kerb [SA23679] Sun Solaris update for gzip [SA23637] @lex Guestbook "lang" SQL Injection Vulnerability [SA23630] Sun Java System Content Delivery Server Content Details Disclosure [SA23675] GForge "advanced_search.php" Cross-Site Scripting Vulnerability [SA23654] Novell Access Manager Identity Server "IssueInstant" Vulnerability [SA23644] Mandriva update for avahi [SA23625] Fix And Chips CMS System Cross-Site Scripting and Script Insertion [SA23700] Sun Solaris rpcbind Denial of Service [SA23695] rPath update for fetchmail [SA23673] Ubuntu update for avahi [SA23660] Avahi "consume_labels()" Denial of Service Vulnerability [SA23631] Fetchmail TLS Configuration Security Issue and "MDA" Denial of Service [SA23628] Fedora update for avahi [SA23705] Mandriva update for xorg-x11 [SA23698] Ubuntu update for xserver-xorg-core [SA23689] rPath update for xorg-x11 [SA23684] XFree86 "DBE" and "Render" Extensions Vulnerabilities [SA23670] X.Org X11 "DBE" and "Render" Extensions Vulnerabilities [SA23653] Mac OS X BOM Privilege Escalation Vulnerability [SA23633] Red Hat update for xorg-x11 [SA23656] b2evolution "redirect_to" HTML Attribute Cross-Site Scripting [SA23649] Unsanity Application Enhancer Insecure Permissions Other: [SA23636] HP DECnet-Plus for OpenVMS Unspecified Security Bypass [SA23617] Cisco Clean Access Unchangeable Secret Security Issue [SA23697] Cisco IOS DLSw Denial Of Service Vulnerability [SA23685] Packeteer PacketShaper Input Handling Denial of Service [SA23632] OpenVMS Audit Logfile Password Exposure Cross Platform: [SA23715] Axiom Photo/News Gallery "baseAxiomPath" File Inclusion Vulnerability [SA23687] Magic Photo Storage "_config[site_path]" File Inclusion Vulnerability [SA23666] Adobe Reader Unspecified Heap Corruption Vulnerability [SA23651] phpMyFAQ SQL Injection and File Upload Vulnerability [SA23635] NUNE News Script "custom_admin_path" File Inclusion [SA23629] Cisco Secure ACS Multiple Vulnerabilities [SA23662] Cuyahoga FCKEditor Security Bypass Issue [SA23661] Dayfox Blog Local File Inclusion Vulnerability [SA23646] Yet Another Link Directory "search" SQL Injection and Cross-Site Scripting [SA23641] Direct Web Rendering Security Bypass and Denial of Service [SA23702] phpMyAdmin Cross-Site Scripting and Unspecified Vulnerabilities [SA23669] Movable Type "nofollow" Plugin Comment Script Insertion [SA23647] MediaWiki AJAX Unspecified Cross-Site Scripting [SA23634] JAMWiki User Permission Security Issue [SA23623] Serene Bach Unspecified Cross-Site Scripting Vulnerability [SA23621] WordPress User Account Enumeration Weakness ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA23677] Microsoft Windows Vector Markup Language Buffer Overflow Critical: Extremely critical Where: From remote Impact: System access Released: 2007-01-09 A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system Full Advisory: http://secunia.com/advisories/23677/ -- [SA23676] Microsoft Excel Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2007-01-09 Multiple vulnerabilities have been reported in Microsoft Excel, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/23676/ -- [SA23671] Microsoft Office Brazilian Portuguese Grammar Checker Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-01-09 A vulnerability has been reported in Microsoft Office, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/23671/ -- [SA23638] Sina UC BROWSER2UC.dll ActiveX Control Buffer Overflows Critical: Highly critical Where: From remote Impact: System access Released: 2007-01-09 Sowhat has reported two vulnerabilities in Sina UC, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/23638/ -- [SA23674] Microsoft Outlook Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-01-09 Some vulnerabilities have been reported in Microsoft Outlook, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system. Full Advisory: http://secunia.com/advisories/23674/ -- [SA23668] Adobe ColdFusion MX File Content Disclosure Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2007-01-10 Inge Henriksen has reported a vulnerability in Adobe ColdFusion MX, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/23668/ -- [SA23659] EF Commander ISO Long Pathname Buffer Overflow Critical: Moderately critical Where: From remote Impact: System access Released: 2007-01-09 Tan Chew Keong has reported a vulnerability in EF Commander, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/23659/ -- [SA23658] Resco Photo Viewer PNG Handling Unspecified Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2007-01-08 A vulnerability has been reported in Resco Photo Viewer, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/23658/ -- [SA23645] Kolayindir Download "id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-01-08 A vulnerability has been reported in Kolayindir Download, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/23645/ -- [SA23642] ShopStoreNow "CatID" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-01-08 IbnuSina has reported a vulnerability in ShopStoreNow, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/23642/ -- [SA23622] Eudora WorldMail Mail Management Service Buffer Overflow Critical: Moderately critical Where: From local network Impact: System access Released: 2007-01-06 A vulnerability has been reported in Eudora WorldMail, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/23622/ -- [SA23657] RI Blog "q" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-01-08 A vulnerability has been reported in RI Blog, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/23657/ -- [SA23652] Digitizing Quote And Ordering System SQL Injection and Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting, Manipulation of data, Exposure of sensitive information Released: 2007-01-08 ajann has reported two vulnerabilities in Digitizing Quote And Ordering System, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/23652/ -- [SA23710] Cisco Multiple Products JTapi Gateway Denial Of Service Critical: Less critical Where: From local network Impact: DoS Released: 2007-01-11 A vulnerability has been reported in multiple Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/23710/ -- [SA23619] Novell Client User Profile Restriction Bypass Critical: Less critical Where: From local network Impact: Security Bypass Released: 2007-01-05 A vulnerability has been reported in Novell Client, which potentially can be exploited by malicious users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/23619/ -- [SA23663] HP PML Driver HPZ12 Windows Privilege Escalation Security Issue Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-01-09 Sowhat has reported a security issue in HP PLM Driver, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/23663/ -- [SA23639] SecureKit Steganography Carrier File Password Bypass Security Issue Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2007-01-08 Adonis (a.k.a. NtWaK0) and Abed (a.k.a. NoPh0BiA) have discovered a security issue in SecureKit Steganography, which can be exploited by malicious people to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/23639/ -- [SA23655] Internet Explorer Memory Corruption Weakness Critical: Not critical Where: From remote Impact: DoS Released: 2007-01-09 Michal Zalewski has discovered a weakness in Internet Explorer, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/23655/ UNIX/Linux:-- [SA23719] Astaro update for ClamAV Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-01-11 Astaro has issued an update for ClamAV. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/23719/ -- [SA23717] SUSE update for w3m Critical: Highly critical Where: From remote Impact: System access Released: 2007-01-11 SUSE has issued an update for w3m. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/23717/ -- [SA23712] Mandriva update for OpenOffice.org Critical: Highly critical Where: From remote Impact: System access Released: 2007-01-11 Mandriva has issued an update for OpenOffice.org. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/23712/ -- [SA23707] Fedora Core 5 update for krb5 Critical: Highly critical Where: From remote Impact: Privilege escalation, DoS, System access Released: 2007-01-10 Fedora has issued an update for krb5. This fixes two vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges, or by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/23707/ -- [SA23706] Fedora Core 6 update for krb5 Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-01-10 Fedora has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/23706/ -- [SA23703] Apple Mac OS X UFS ffs_mountfs() Integer Overflow Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-01-11 LMH has reported a vulnerability in Mac OS X, which can potentially be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/23703/ -- [SA23701] SUSE update for Kerberos Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-01-10 SUSE has issued an update for Kerberos. This fixes some vulnerabilities, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/23701/ -- [SA23696] Kerberos kadmind xprt->xp_auth Code Execution Vulnerability Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-01-10 A vulnerability has been reported in Kerberos, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/23696/ -- [SA23692] Gentoo update for seamonkey Critical: Highly critical Where: From remote Impact: Cross Site Scripting, DoS, System access Released: 2007-01-11 Gentoo has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/23692/ -- [SA23690] Kerberos kadmind "mechglue" Code Execution Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-01-10 A vulnerability has been reported in Kerberos, which can potentially be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/23690/ -- [SA23683] Debian update for openoffice.org Critical: Highly critical Where: From remote Impact: System access Released: 2007-01-09 Debian has issued an update for openoffice.org. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/23683/ -- [SA23682] rPath update for openoffice.org Critical: Highly critical Where: From remote Impact: System access Released: 2007-01-09 rPath has issued an update for openoffice.org. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/23682/ -- [SA23680] VMWare ESX Server Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Security Bypass, Exposure of sensitive information, Privilege escalation, DoS, System access Released: 2007-01-09 Some vulnerabilities have been reported in VMWare ESX Server, which can be exploited by malicious people to gain knowledge of sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), gain escalated privileges, or compromise a system. Full Advisory: http://secunia.com/advisories/23680/ -- [SA23678] Mandriva update for nvidia Critical: Highly critical Where: From remote Impact: Privilege escalation, DoS, System access Released: 2007-01-11 Mandriva has issued an update for nvidia. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges and potentially by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/23678/ -- [SA23667] Mandriva update for krb5 Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-01-11 Mandriva has issued an update for krb5. This fixes a vulnerability, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/23667/ -- [SA23650] SUSE update for Sun Java Critical: Highly critical Where: From remote Impact: Security Bypass, Privilege escalation, System access Released: 2007-01-09 SUSE has issued an update for Sun Java. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/23650/ -- [SA23624] OmniWeb "alert()" Format String Vulnerability Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-01-08 Kevin Finisterre has reported a vulnerability in OmniWeb, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/23624/ -- [SA23620] Fedora update for openoffice.org Critical: Highly critical Where: From remote Impact: System access Released: 2007-01-05 Fedora has issued an update for openoffice.org. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/23620/ -- [SA23618] Fedora update for thunderbird Critical: Highly critical Where: From remote Impact: Cross Site Scripting, DoS, System access Released: 2007-01-05 Fedora has issued an update for thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/23618/ -- [SA23694] Ubuntu update for madwifi Critical: Moderately critical Where: From remote Impact: System access Released: 2007-01-10 Ubuntu has issued an update for madwifi. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/23694/ -- [SA23688] IBM AIX ftpd Two Vulnerabilities Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information, DoS Released: 2007-01-09 Two vulnerabilities have been reported in IBM AIX, which can potentially be exploited by malicious people to gain knowledge of sensitive information or to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/23688/ -- [SA23681] Debian update for libapache-mod-auth-kerb Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-01-09 Debian has issued an update for libapache-mod-auth-kerb. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/23681/ -- [SA23679] Sun Solaris update for gzip Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-01-09 Sun has issued an update for gzip. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/23679/ -- [SA23637] @lex Guestbook "lang" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-01-10 DarkFig has discovered a vulnerability in @lex Guestbook, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/23637/ -- [SA23630] Sun Java System Content Delivery Server Content Details Disclosure Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2007-01-08 A vulnerability has been reported in Sun Java System Content Delivery Server, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/23630/ -- [SA23675] GForge "advanced_search.php" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-01-09 Jos Ramn Palanco has reported a vulnerability in GForge, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/23675/ -- [SA23654] Novell Access Manager Identity Server "IssueInstant" Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-01-08 A vulnerability has been reported in Novell Access Manager Identity Server, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/23654/ -- [SA23644] Mandriva update for avahi Critical: Less critical Where: From remote Impact: DoS Released: 2007-01-09 Mandriva has issued an update for avahi. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/23644/ -- [SA23625] Fix And Chips CMS System Cross-Site Scripting and Script Insertion Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-01-08 Luny has discovered several vulnerabilities in Fix And Chips CMS System, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/23625/ -- [SA23700] Sun Solaris rpcbind Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2007-01-10 A vulnerability has been reported in Sun Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/23700/ -- [SA23695] rPath update for fetchmail Critical: Less critical Where: From local network Impact: Exposure of sensitive information Released: 2007-01-10 rPath has issued an update for fetchmail. This fixes a vulnerability, which can be exploited by malicious people to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/23695/ -- [SA23673] Ubuntu update for avahi Critical: Less critical Where: From local network Impact: DoS Released: 2007-01-08 Ubuntu has issued an update for avahi. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/23673/ -- [SA23660] Avahi "consume_labels()" Denial of Service Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2007-01-08 A vulnerability has been reported in Avahi, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/23660/ -- [SA23631] Fetchmail TLS Configuration Security Issue and "MDA" Denial of Service Critical: Less critical Where: From local network Impact: Exposure of sensitive information, DoS Released: 2007-01-08 A vulnerability and a security issue have been reported in Fetchmail, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/23631/ -- [SA23628] Fedora update for avahi Critical: Less critical Where: From local network Impact: DoS Released: 2007-01-08 Fedora has issued an update for avahi. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/23628/ -- [SA23705] Mandriva update for xorg-x11 Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-01-10 Mandriva has issued an update for xorg-x11. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/23705/ -- [SA23698] Ubuntu update for xserver-xorg-core Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-01-10 Ubuntu has issued an update for xserver-xorg-core. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/23698/ -- [SA23689] rPath update for xorg-x11 Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-01-10 rPath has issued an update for xorg-x11. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/23689/ -- [SA23684] XFree86 "DBE" and "Render" Extensions Vulnerabilities Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-01-10 Sean Larsson has reported some vulnerabilities in XFree86, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/23684/ -- [SA23670] X.Org X11 "DBE" and "Render" Extensions Vulnerabilities Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-01-10 Sean Larsson has reported some vulnerabilities in X.Org X11, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/23670/ -- [SA23653] Mac OS X BOM Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-01-08 A vulnerability has been reported in Mac OS X, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/23653/ -- [SA23633] Red Hat update for xorg-x11 Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-01-10 Red Hat has issued an update for xorg-x11. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/23633/ -- [SA23656] b2evolution "redirect_to" HTML Attribute Cross-Site Scripting Critical: Not critical Where: From remote Impact: Cross Site Scripting Released: 2007-01-09 unsticky has discovered a vulnerability in b2evolution, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/23656/ -- [SA23649] Unsanity Application Enhancer Insecure Permissions Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2007-01-09 LMH and Johnny Pwnerseed have reported a security issue in Unsanity Application Enhancer, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/23649/ Other:-- [SA23636] HP DECnet-Plus for OpenVMS Unspecified Security Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2007-01-05 A vulnerability has been reported in HP DECnet-Plus for OpenVMS, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/23636/ -- [SA23617] Cisco Clean Access Unchangeable Secret Security Issue Critical: Moderately critical Where: From local network Impact: Security Bypass Released: 2007-01-04 Cisco has acknowledged a security issue in Cisco Clean Access, which can be exploited by malicious users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/23617/ -- [SA23697] Cisco IOS DLSw Denial Of Service Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2007-01-11 A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/23697/ -- [SA23685] Packeteer PacketShaper Input Handling Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2007-01-09 kian.mohageri has reported a vulnerability in Packeteer PacketShaper, which potentially can be exploited by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/23685/ -- [SA23632] OpenVMS Audit Logfile Password Exposure Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2007-01-05 A security issue has been reported in OpenVMS, which can be exploited by malicious local users to disclose sensitive information. Full Advisory: http://secunia.com/advisories/23632/ Cross Platform:-- [SA23715] Axiom Photo/News Gallery "baseAxiomPath" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-01-11 DeltahackingTEAM has discovered a vulnerability in Axiom Photo/News Gallery, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/23715/ -- [SA23687] Magic Photo Storage "_config[site_path]" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-01-10 k1tk4t has reported a vulnerability in Magic Photo Storage, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/23687/ -- [SA23666] Adobe Reader Unspecified Heap Corruption Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-01-10 Piotr Bania has reported a vulnerability in Adobe Reader, which can potentially be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/23666/ -- [SA23651] phpMyFAQ SQL Injection and File Upload Vulnerability Critical: Highly critical Where: From remote Impact: Manipulation of data, System access Released: 2007-01-08 Some vulnerabilities have been reported in phpMyFAQ, which can be exploited by malicious people to conduct SQL injection attacks and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/23651/ -- [SA23635] NUNE News Script "custom_admin_path" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2007-01-08 xoron has discovered some vulnerabilities in NUNE News Script, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/23635/ -- [SA23629] Cisco Secure ACS Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-01-08 Some vulnerabilities have been reported in Cisco Secure ACS, which can be exploited by malicious users or people to cause a DoS (Denial of Service) or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/23629/ -- [SA23662] Cuyahoga FCKEditor Security Bypass Issue Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2007-01-08 A security issue has been reported in Cuyahoga, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/23662/ -- [SA23661] Dayfox Blog Local File Inclusion Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2007-01-09 ShaFuq31 has reported a vulnerability in Dayfox Blog, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/23661/ -- [SA23646] Yet Another Link Directory "search" SQL Injection and Cross-Site Scripting Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2007-01-08 Some vulnerabilities have been discovered in Yet Another Link Directory (YALD), which can be exploited by malicious people to conduct cross-site scripting attacks and SQL injection attacks. Full Advisory: http://secunia.com/advisories/23646/ -- [SA23641] Direct Web Rendering Security Bypass and Denial of Service Critical: Moderately critical Where: From remote Impact: Security Bypass, DoS Released: 2007-01-09 Some vulnerabilities have been reported in DWR (Direct Web Rendering), which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/23641/ -- [SA23702] phpMyAdmin Cross-Site Scripting and Unspecified Vulnerabilities Critical: Less critical Where: From remote Impact: Unknown, Cross Site Scripting Released: 2007-01-10 Some vulnerabilities have been reported in phpMyAdmin, some of which have unknown impacts, while some can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/23702/ -- [SA23669] Movable Type "nofollow" Plugin Comment Script Insertion Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-01-11 A vulnerability has been discovered in Movable Type, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/23669/ -- [SA23647] MediaWiki AJAX Unspecified Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-01-09 A vulnerability has been reported in MediaWiki, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/23647/ -- [SA23634] JAMWiki User Permission Security Issue Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-01-05 A security issue has been reported in JAMWiki, which can be exploited by malicious users to bypass certain security restriction. Full Advisory: http://secunia.com/advisories/23634/ -- [SA23623] Serene Bach Unspecified Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-01-05 A vulnerability has been reported in Serene Bach, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/23623/ -- [SA23621] WordPress User Account Enumeration Weakness Critical: Not critical Where: From remote Impact: Exposure of system information Released: 2007-01-05 Kad has discovered a weakness in WordPress, which can be exploited by malicious people to identify valid user accounts. Full Advisory: http://secunia.com/advisories/23621/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _____________________________ Subscribe to InfoSec News http://www.infosecnews.org/mailman/listinfo/isn
This archive was generated by hypermail 2.1.3 : Thu Jan 11 2007 - 22:11:50 PST