[ISN] Secunia Weekly Summary - Issue: 2007-2

From: InfoSec News (alerts@private)
Date: Thu Jan 11 2007 - 22:03:04 PST


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2007-01-04 - 2007-01-11                        

                       This week: 83 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.

Be sure to check your own system:
http://secunia.com/software_inspector/

Feature Overview - The Secunia Software Inspector:
 * Detects insecure versions of applications installed
 * Verifies that all Microsoft patches are applied
 * Assists you in updating your system and applications
 * Runs through your browser. No installation or download is required.

Read more in our blog:
http://secunia.com/blog/4/
http://secunia.com/blog/3/

========================================================================
2) This Week in Brief:

Microsoft released four security advisories this week, three of which
they tagged as critical and one as important. Multiple vulnerabilities
were found in Microsoft Excel and Outlook, while a buffer overflow in
Microsoft's Vector Markup Language (VML) and an error in the Brazilian
Portuguese grammar checker in Microsoft Office were found to
potentially allow remote code execution.

The VML vulnerability is currently being exploited, according to
Microsoft; hence, Secunia has tagged this vulnerability as "Extremely
critical".

Microsoft users are advised to run the Microsoft Update service to
ensure that all security patches are downloaded and installed. You can
use the Secunia Software Inspector to help you determine if your
system has the most current security updates from Microsoft:
http://secunia.com/software_inspector/

For more information, refer to the following Secunia advisories:
http://secunia.com/advisories/23671/
http://secunia.com/advisories/23674/
http://secunia.com/advisories/23676/
http://secunia.com/advisories/23677/

 --

Two vulnerabilities were found in Adobe products this week, one in
Adobe Coldfusion, and the other in Adobe Reader.

The Coldfusion vulnerability has been tagged by Secunia as "Moderately
critical", and is caused due to an input validation error when
processing URL-encoded file names. It can be exploited to view
arbitrary files on the web root via a specially crafted URL with a
doubly-encoded NULL byte and an extension that is handled by
ColdFusion e.g. ".cfm".

The Reader vulnerability has been tagged by Secunia as "Highly
critical", and is caused due to an unspecified error when processing
PDF files. This can be exploited to cause a heap corruption and may
allow execution of arbitrary code when a specially-crafted PDF file is
opened.

Both vulnerabilities have patches available from Adobe. Users who have
Coldfusion and Reader installed in their systems are advised to
install the security updates immediately.

You can use the Secunia Software Inspector to help you determine if
your system is vulnerable:
http://secunia.com/software_inspector/

For more information, refer to the following Secunia advisories:
http://secunia.com/advisories/23666/
http://secunia.com/advisories/23668/

 --

VIRUS ALERTS:

During the past week Secunia collected 213 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA23483] Adobe Reader / Acrobat Multiple Vulnerabilities
2.  [SA23613] Opera Browser Two Vulnerabilities
3.  [SA23676] Microsoft Excel Multiple Vulnerabilities
4.  [SA23282] Mozilla Firefox Multiple Vulnerabilities
5.  [SA23677] Microsoft Windows Vector Markup Language Buffer Overflow
6.  [SA23540] Apple Quicktime RTSP URL Handling Buffer Overflow
              Vulnerability
7.  [SA23612] OpenOffice WMF/EMF Processing Buffer Overflow
              Vulnerabilities
8.  [SA21910] Internet Explorer Multiple Vulnerabilities
9.  [SA23666] Adobe Reader Unspecified Heap Corruption Vulnerability
10. [SA23595] Wordpress SQL Injection and Cross-Site Scripting
              Vulnerabilities

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA23677] Microsoft Windows Vector Markup Language Buffer Overflow
[SA23676] Microsoft Excel Multiple Vulnerabilities
[SA23671] Microsoft Office Brazilian Portuguese Grammar Checker
Vulnerability
[SA23638] Sina UC BROWSER2UC.dll ActiveX Control Buffer Overflows
[SA23674] Microsoft Outlook Multiple Vulnerabilities
[SA23668] Adobe ColdFusion MX File Content Disclosure Vulnerability
[SA23659] EF Commander ISO Long Pathname Buffer Overflow
[SA23658] Resco Photo Viewer PNG Handling Unspecified Vulnerability
[SA23645] Kolayindir Download "id" SQL Injection Vulnerability
[SA23642] ShopStoreNow "CatID" SQL Injection Vulnerability
[SA23622] Eudora WorldMail Mail Management Service Buffer Overflow
[SA23657] RI Blog "q" Cross-Site Scripting Vulnerability
[SA23652] Digitizing Quote And Ordering System SQL Injection and
Cross-Site Scripting
[SA23710] Cisco Multiple Products JTapi Gateway Denial Of Service
[SA23619] Novell Client User Profile Restriction Bypass
[SA23663] HP PML Driver HPZ12 Windows Privilege Escalation Security
Issue
[SA23639] SecureKit Steganography Carrier File Password Bypass Security
Issue
[SA23655] Internet Explorer Memory Corruption Weakness

UNIX/Linux:
[SA23719] Astaro update for ClamAV
[SA23717] SUSE update for w3m
[SA23712] Mandriva update for OpenOffice.org
[SA23707] Fedora Core 5 update for krb5
[SA23706] Fedora Core 6 update for krb5
[SA23703] Apple Mac OS X UFS ffs_mountfs() Integer Overflow
[SA23701] SUSE update for Kerberos
[SA23696] Kerberos kadmind xprt->xp_auth Code Execution Vulnerability
[SA23692] Gentoo update for seamonkey
[SA23690] Kerberos kadmind "mechglue" Code Execution Vulnerability
[SA23683] Debian update for openoffice.org
[SA23682] rPath update for openoffice.org
[SA23680] VMWare ESX Server Multiple Vulnerabilities
[SA23678] Mandriva update for nvidia
[SA23667] Mandriva update for krb5
[SA23650] SUSE update for Sun Java
[SA23624] OmniWeb "alert()" Format String Vulnerability
[SA23620] Fedora update for openoffice.org
[SA23618] Fedora update for thunderbird
[SA23694] Ubuntu update for madwifi
[SA23688] IBM AIX ftpd Two Vulnerabilities
[SA23681] Debian update for libapache-mod-auth-kerb
[SA23679] Sun Solaris update for gzip
[SA23637] @lex Guestbook "lang" SQL Injection Vulnerability
[SA23630] Sun Java System Content Delivery Server Content Details
Disclosure
[SA23675] GForge "advanced_search.php" Cross-Site Scripting
Vulnerability
[SA23654] Novell Access Manager Identity Server "IssueInstant"
Vulnerability
[SA23644] Mandriva update for avahi
[SA23625] Fix And Chips CMS System Cross-Site Scripting and Script
Insertion
[SA23700] Sun Solaris rpcbind Denial of Service
[SA23695] rPath update for fetchmail
[SA23673] Ubuntu update for avahi
[SA23660] Avahi "consume_labels()" Denial of Service Vulnerability
[SA23631] Fetchmail TLS Configuration Security Issue and "MDA" Denial
of Service
[SA23628] Fedora update for avahi
[SA23705] Mandriva update for xorg-x11
[SA23698] Ubuntu update for xserver-xorg-core
[SA23689] rPath update for xorg-x11
[SA23684] XFree86 "DBE" and "Render" Extensions Vulnerabilities
[SA23670] X.Org X11 "DBE" and "Render" Extensions Vulnerabilities
[SA23653] Mac OS X BOM Privilege Escalation Vulnerability
[SA23633] Red Hat update for xorg-x11
[SA23656] b2evolution "redirect_to" HTML Attribute Cross-Site
Scripting
[SA23649] Unsanity Application Enhancer Insecure Permissions

Other:
[SA23636] HP DECnet-Plus for OpenVMS Unspecified Security Bypass
[SA23617] Cisco Clean Access Unchangeable Secret Security Issue
[SA23697] Cisco IOS DLSw Denial Of Service Vulnerability
[SA23685] Packeteer PacketShaper Input Handling Denial of Service
[SA23632] OpenVMS Audit Logfile Password Exposure

Cross Platform:
[SA23715] Axiom Photo/News Gallery "baseAxiomPath" File Inclusion
Vulnerability
[SA23687] Magic Photo Storage "_config[site_path]" File Inclusion
Vulnerability
[SA23666] Adobe Reader Unspecified Heap Corruption Vulnerability
[SA23651] phpMyFAQ SQL Injection and File Upload Vulnerability
[SA23635] NUNE News Script "custom_admin_path" File Inclusion
[SA23629] Cisco Secure ACS Multiple Vulnerabilities
[SA23662] Cuyahoga FCKEditor Security Bypass Issue
[SA23661] Dayfox Blog Local File Inclusion Vulnerability
[SA23646] Yet Another Link Directory "search" SQL Injection and
Cross-Site Scripting
[SA23641] Direct Web Rendering Security Bypass and Denial of Service
[SA23702] phpMyAdmin Cross-Site Scripting and Unspecified
Vulnerabilities
[SA23669] Movable Type "nofollow" Plugin Comment Script Insertion
[SA23647] MediaWiki AJAX Unspecified Cross-Site Scripting
[SA23634] JAMWiki User Permission Security Issue
[SA23623] Serene Bach Unspecified Cross-Site Scripting Vulnerability
[SA23621] WordPress User Account Enumeration Weakness

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA23677] Microsoft Windows Vector Markup Language Buffer Overflow

Critical:    Extremely critical
Where:       From remote
Impact:      System access
Released:    2007-01-09

A vulnerability has been reported in Microsoft Windows, which can be
exploited by malicious people to compromise a user's system

Full Advisory:
http://secunia.com/advisories/23677/

 --

[SA23676] Microsoft Excel Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-09

Multiple vulnerabilities have been reported in Microsoft Excel, which
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/23676/

 --

[SA23671] Microsoft Office Brazilian Portuguese Grammar Checker
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-09

A vulnerability has been reported in Microsoft Office, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/23671/

 --

[SA23638] Sina UC BROWSER2UC.dll ActiveX Control Buffer Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-09

Sowhat has reported two vulnerabilities in Sina UC, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/23638/

 --

[SA23674] Microsoft Outlook Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-01-09

Some vulnerabilities have been reported in Microsoft Outlook, which can
be exploited by malicious people to cause a DoS (Denial of Service) or
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/23674/

 --

[SA23668] Adobe ColdFusion MX File Content Disclosure Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-01-10

Inge Henriksen has reported a vulnerability in Adobe ColdFusion MX,
which can be exploited by malicious people to disclose potentially
sensitive information.

Full Advisory:
http://secunia.com/advisories/23668/

 --

[SA23659] EF Commander ISO Long Pathname Buffer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-01-09

Tan Chew Keong has reported a vulnerability in EF Commander, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/23659/

 --

[SA23658] Resco Photo Viewer PNG Handling Unspecified Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-01-08

A vulnerability has been reported in Resco Photo Viewer, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/23658/

 --

[SA23645] Kolayindir Download "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-01-08

A vulnerability has been reported in Kolayindir Download, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/23645/

 --

[SA23642] ShopStoreNow "CatID" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-01-08

IbnuSina has reported a vulnerability in ShopStoreNow, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/23642/

 --

[SA23622] Eudora WorldMail Mail Management Service Buffer Overflow

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-01-06

A vulnerability has been reported in Eudora WorldMail, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23622/

 --

[SA23657] RI Blog "q" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-01-08

A vulnerability has been reported in RI Blog, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/23657/

 --

[SA23652] Digitizing Quote And Ordering System SQL Injection and
Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
sensitive information
Released:    2007-01-08

ajann has reported two vulnerabilities in Digitizing Quote And Ordering
System, which can be exploited by malicious users to conduct SQL
injection attacks and by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/23652/

 --

[SA23710] Cisco Multiple Products JTapi Gateway Denial Of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-01-11

A vulnerability has been reported in multiple Cisco products, which can
be exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/23710/

 --

[SA23619] Novell Client User Profile Restriction Bypass

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass
Released:    2007-01-05

A vulnerability has been reported in Novell Client, which potentially
can be exploited by malicious users to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/23619/

 --

[SA23663] HP PML Driver HPZ12 Windows Privilege Escalation Security
Issue

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-01-09

Sowhat has reported a security issue in HP PLM Driver, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/23663/

 --

[SA23639] SecureKit Steganography Carrier File Password Bypass Security
Issue

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2007-01-08

Adonis (a.k.a. NtWaK0) and Abed (a.k.a. NoPh0BiA) have discovered a
security issue in SecureKit Steganography, which can be exploited by
malicious people to gain knowledge of sensitive information.

Full Advisory:
http://secunia.com/advisories/23639/

 --

[SA23655] Internet Explorer Memory Corruption Weakness

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2007-01-09

Michal Zalewski has discovered a weakness in Internet Explorer, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/23655/


UNIX/Linux:--

[SA23719] Astaro update for ClamAV

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-01-11

Astaro has issued an update for ClamAV. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to cause a DoS (Denial of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23719/

 --

[SA23717] SUSE update for w3m

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-11

SUSE has issued an update for w3m. This fixes a vulnerability, which
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/23717/

 --

[SA23712] Mandriva update for OpenOffice.org

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-11

Mandriva has issued an update for OpenOffice.org. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/23712/

 --

[SA23707] Fedora Core 5 update for krb5

Critical:    Highly critical
Where:       From remote
Impact:      Privilege escalation, DoS, System access
Released:    2007-01-10

Fedora has issued an update for krb5. This fixes two vulnerabilities,
which can be exploited by malicious, local users to perform certain
actions with escalated privileges, or by malicious people to cause a
DoS (Denial of Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23707/

 --

[SA23706] Fedora Core 6 update for krb5

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-01-10

Fedora has issued an update for krb5. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23706/

 --

[SA23703] Apple Mac OS X UFS ffs_mountfs() Integer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-01-11

LMH has reported a vulnerability in Mac OS X, which can potentially be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/23703/

 --

[SA23701] SUSE update for Kerberos

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-01-10

SUSE has issued an update for Kerberos. This fixes some
vulnerabilities, which can potentially be exploited by malicious people
to cause a DoS (Denial of Service) or to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/23701/

 --

[SA23696] Kerberos kadmind xprt->xp_auth Code Execution Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-01-10

A vulnerability has been reported in Kerberos, which can potentially be
exploited by malicious people to cause a DoS (Denial of Service) or to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23696/

 --

[SA23692] Gentoo update for seamonkey

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, DoS, System access
Released:    2007-01-11

Gentoo has issued an update for seamonkey. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting attacks and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/23692/

 --

[SA23690] Kerberos kadmind "mechglue" Code Execution Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-10

A vulnerability has been reported in Kerberos, which can potentially be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23690/

 --

[SA23683] Debian update for openoffice.org

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-09

Debian has issued an update for openoffice.org. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/23683/

 --

[SA23682] rPath update for openoffice.org

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-09

rPath has issued an update for openoffice.org. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/23682/

 --

[SA23680] VMWare ESX Server Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information,
Privilege escalation, DoS, System access
Released:    2007-01-09

Some vulnerabilities have been reported in VMWare ESX Server, which can
be exploited by malicious people to gain knowledge of sensitive
information, bypass certain security restrictions, cause a DoS (Denial
of Service),  gain escalated privileges, or compromise a system.

Full Advisory:
http://secunia.com/advisories/23680/

 --

[SA23678] Mandriva update for nvidia

Critical:    Highly critical
Where:       From remote
Impact:      Privilege escalation, DoS, System access
Released:    2007-01-11

Mandriva has issued an update for nvidia. This fixes a vulnerability,
which can be exploited by malicious, local users to gain escalated
privileges and potentially by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/23678/

 --

[SA23667] Mandriva update for krb5

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-01-11

Mandriva has issued an update for krb5. This fixes a vulnerability,
which can potentially be exploited by malicious people to cause a DoS
(Denial of Service) or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23667/

 --

[SA23650] SUSE update for Sun Java

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Privilege escalation, System access
Released:    2007-01-09

SUSE has issued an update for Sun Java. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23650/

 --

[SA23624] OmniWeb "alert()" Format String Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-01-08

Kevin Finisterre has reported a vulnerability in OmniWeb, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/23624/

 --

[SA23620] Fedora update for openoffice.org

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-05

Fedora has issued an update for openoffice.org. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/23620/

 --

[SA23618] Fedora update for thunderbird

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, DoS, System access
Released:    2007-01-05

Fedora has issued an update for thunderbird. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting attacks and potentially compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/23618/

 --

[SA23694] Ubuntu update for madwifi

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-01-10

Ubuntu has issued an update for madwifi. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/23694/

 --

[SA23688] IBM AIX ftpd Two Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, DoS
Released:    2007-01-09

Two vulnerabilities have been reported in IBM AIX, which can
potentially be exploited by malicious people to gain knowledge of
sensitive information or to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/23688/

 --

[SA23681] Debian update for libapache-mod-auth-kerb

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-01-09

Debian has issued an update for libapache-mod-auth-kerb. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/23681/

 --

[SA23679] Sun Solaris update for gzip

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-01-09

Sun has issued an update for gzip. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23679/

 --

[SA23637] @lex Guestbook "lang" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-01-10

DarkFig has discovered a vulnerability in @lex Guestbook, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/23637/

 --

[SA23630] Sun Java System Content Delivery Server Content Details
Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-01-08

A vulnerability has been reported in Sun Java System Content Delivery
Server, which can be exploited by malicious people to disclose
sensitive information.

Full Advisory:
http://secunia.com/advisories/23630/

 --

[SA23675] GForge "advanced_search.php" Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-01-09

Jos Ramn Palanco has reported a vulnerability in GForge, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/23675/

 --

[SA23654] Novell Access Manager Identity Server "IssueInstant"
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-01-08

A vulnerability has been reported in Novell Access Manager Identity
Server, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/23654/

 --

[SA23644] Mandriva update for avahi

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-01-09

Mandriva has issued an update for avahi. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/23644/

 --

[SA23625] Fix And Chips CMS System Cross-Site Scripting and Script
Insertion

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-01-08

Luny has discovered several vulnerabilities in Fix And Chips CMS
System, which can be exploited by malicious users to conduct script
insertion attacks and by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/23625/

 --

[SA23700] Sun Solaris rpcbind Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-01-10

A vulnerability has been reported in Sun Solaris, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/23700/

 --

[SA23695] rPath update for fetchmail

Critical:    Less critical
Where:       From local network
Impact:      Exposure of sensitive information
Released:    2007-01-10

rPath has issued an update for fetchmail. This fixes a vulnerability,
which can be exploited by malicious people to gain knowledge of
sensitive information.

Full Advisory:
http://secunia.com/advisories/23695/

 --

[SA23673] Ubuntu update for avahi

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-01-08

Ubuntu has issued an update for avahi. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/23673/

 --

[SA23660] Avahi "consume_labels()" Denial of Service Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-01-08

A vulnerability has been reported in Avahi, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/23660/

 --

[SA23631] Fetchmail TLS Configuration Security Issue and "MDA" Denial
of Service

Critical:    Less critical
Where:       From local network
Impact:      Exposure of sensitive information, DoS
Released:    2007-01-08

A vulnerability and a security issue have been reported in Fetchmail,
which can be exploited by malicious, local users to cause a DoS (Denial
of Service) and by malicious people to gain knowledge of sensitive
information.

Full Advisory:
http://secunia.com/advisories/23631/

 --

[SA23628] Fedora update for avahi

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-01-08

Fedora has issued an update for avahi. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/23628/

 --

[SA23705] Mandriva update for xorg-x11

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-01-10

Mandriva has issued an update for xorg-x11. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/23705/

 --

[SA23698] Ubuntu update for xserver-xorg-core

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-01-10

Ubuntu has issued an update for xserver-xorg-core. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/23698/

 --

[SA23689] rPath update for xorg-x11

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-01-10

rPath has issued an update for xorg-x11. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/23689/

 --

[SA23684] XFree86 "DBE" and "Render" Extensions Vulnerabilities

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-01-10

Sean Larsson has reported some vulnerabilities in XFree86, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/23684/

 --

[SA23670] X.Org X11 "DBE" and "Render" Extensions Vulnerabilities

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-01-10

Sean Larsson has reported some vulnerabilities in X.Org X11, which can
be exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/23670/

 --

[SA23653] Mac OS X BOM Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-01-08

A vulnerability has been reported in Mac OS X, which can be exploited
by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/23653/

 --

[SA23633] Red Hat update for xorg-x11

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-01-10

Red Hat has issued an update for xorg-x11. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/23633/

 --

[SA23656] b2evolution "redirect_to" HTML Attribute Cross-Site
Scripting

Critical:    Not critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-01-09

unsticky has discovered a vulnerability in b2evolution, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/23656/

 --

[SA23649] Unsanity Application Enhancer Insecure Permissions

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-01-09

LMH and Johnny Pwnerseed have reported a security issue in Unsanity
Application Enhancer, which can be exploited by malicious, local users
to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/23649/


Other:--

[SA23636] HP DECnet-Plus for OpenVMS Unspecified Security Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-01-05

A vulnerability has been reported in HP DECnet-Plus for OpenVMS, which
can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/23636/

 --

[SA23617] Cisco Clean Access Unchangeable Secret Security Issue

Critical:    Moderately critical
Where:       From local network
Impact:      Security Bypass
Released:    2007-01-04

Cisco has acknowledged a security issue in Cisco Clean Access, which
can be exploited by malicious users to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/23617/

 --

[SA23697] Cisco IOS DLSw Denial Of Service Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-01-11

A vulnerability has been reported in Cisco IOS, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/23697/

 --

[SA23685] Packeteer PacketShaper Input Handling Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-01-09

kian.mohageri has reported a vulnerability in Packeteer PacketShaper,
which potentially can be exploited by malicious users to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/23685/

 --

[SA23632] OpenVMS Audit Logfile Password Exposure

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2007-01-05

A security issue has been reported in OpenVMS, which can be exploited
by malicious local users to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/23632/


Cross Platform:--

[SA23715] Axiom Photo/News Gallery "baseAxiomPath" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-11

DeltahackingTEAM has discovered a vulnerability in Axiom Photo/News
Gallery, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/23715/

 --

[SA23687] Magic Photo Storage "_config[site_path]" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-10

k1tk4t has reported a vulnerability in Magic Photo Storage, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23687/

 --

[SA23666] Adobe Reader Unspecified Heap Corruption Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-10

Piotr Bania has reported a vulnerability in Adobe Reader, which can
potentially be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/23666/

 --

[SA23651] phpMyFAQ SQL Injection and File Upload Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Manipulation of data, System access
Released:    2007-01-08

Some vulnerabilities have been reported in phpMyFAQ, which can be
exploited by malicious people to conduct SQL injection attacks and
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23651/

 --

[SA23635] NUNE News Script "custom_admin_path" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-08

xoron has discovered some vulnerabilities in NUNE News Script, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/23635/

 --

[SA23629] Cisco Secure ACS Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-01-08

Some vulnerabilities have been reported in Cisco Secure ACS, which can
be exploited by malicious users or people to cause a DoS (Denial of
Service) or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23629/

 --

[SA23662] Cuyahoga FCKEditor Security Bypass Issue

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-01-08

A security issue has been reported in Cuyahoga, which can be exploited
by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/23662/

 --

[SA23661] Dayfox Blog Local File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-01-09

ShaFuq31 has reported a vulnerability in Dayfox Blog, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/23661/

 --

[SA23646] Yet Another Link Directory "search" SQL Injection and
Cross-Site Scripting

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2007-01-08

Some vulnerabilities have been discovered in Yet Another Link Directory
(YALD), which can be exploited by malicious people to conduct cross-site
scripting attacks and SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/23646/

 --

[SA23641] Direct Web Rendering Security Bypass and Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS
Released:    2007-01-09

Some vulnerabilities have been reported in DWR (Direct Web Rendering),
which can be exploited by malicious people to bypass certain security
restrictions or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/23641/

 --

[SA23702] phpMyAdmin Cross-Site Scripting and Unspecified
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Unknown, Cross Site Scripting
Released:    2007-01-10

Some vulnerabilities have been reported in phpMyAdmin, some of which
have unknown impacts, while some can be exploited by malicious people
to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/23702/

 --

[SA23669] Movable Type "nofollow" Plugin Comment Script Insertion

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-01-11

A vulnerability has been discovered in Movable Type, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/23669/

 --

[SA23647] MediaWiki AJAX Unspecified Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-01-09

A vulnerability has been reported in MediaWiki, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/23647/

 --

[SA23634] JAMWiki User Permission Security Issue

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-01-05

A security issue has been reported in JAMWiki, which can be exploited
by malicious users to bypass certain security restriction.

Full Advisory:
http://secunia.com/advisories/23634/

 --

[SA23623] Serene Bach Unspecified Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-01-05

A vulnerability has been reported in Serene Bach, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/23623/

 --

[SA23621] WordPress User Account Enumeration Weakness

Critical:    Not critical
Where:       From remote
Impact:      Exposure of system information
Released:    2007-01-05

Kad has discovered a weakness in WordPress, which can be exploited by
malicious people to identify valid user accounts.

Full Advisory:
http://secunia.com/advisories/23621/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_____________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn
 



This archive was generated by hypermail 2.1.3 : Thu Jan 11 2007 - 22:11:50 PST