[ISN] Secunia Weekly Summary - Issue: 2007-3

From: InfoSec News (alerts@private)
Date: Thu Jan 18 2007 - 22:32:00 PST


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2007-01-11 - 2007-01-18                        

                       This week: 73 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.

Be sure to check your own system:
http://secunia.com/software_inspector/

Feature Overview - The Secunia Software Inspector:
 * Detects insecure versions of applications installed
 * Verifies that all Microsoft patches are applied
 * Assists you in updating your system and applications
 * Runs through your browser. No installation or download is required.

Read more in our blog:
http://secunia.com/blog/4/
http://secunia.com/blog/3/

========================================================================
2) This Week in Brief:

A vulnerability in the Sun Java Runtime Environment (JRE) has been
reported, which can be used by malicious people to gain access to a
remote system.

An error occurs when JRE processes a specially crafted GIF image with 0
width, which can be exploited to cause a heap-based buffer overflow.
Successful exploitation allows the execution of arbitrary code.

The vulnerability is reported in the following versions:
* JDK and JRE 5.0 Update 9 and prior.
* SDK and JRE 1.4.2_12 and prior.
* SDK and JRE 1.3.1_18 and prior.

Vendor patches are now available.

You can check if your JRE version is up-to-date by using the Secunia
Software Inspector:
http://secunia.com/software_inspector/

For more information, refer to the following Secunia advisory:
http://secunia.com/advisories/23757/

 --

A number of vulnerabilities were reported in various Oracle products,
including some that may facilitate cross-site scripting, SQL injection,
or denial of service (DoS) attacks, exposure of sensitive information,
or allow system access from a remote location.

The vulnerabilities are reported in the following products:
* Oracle Application Server 10g
* Oracle Database 10g
* Oracle Developer Suite 10g
* Oracle E-Business Suite 11i
* Oracle Enterprise Manager 10.x
* Oracle PeopleSoft Enterprise Tools 8.x
* Oracle9i Application Server
* Oracle9i Database Enterprise Edition
* Oracle9i Database Standard Edition
* Oracle9i Developer Suite

Patches are available for these vulnerabilities.

For more information, refer to the following Secunia advisory:
http://secunia.com/advisories/23794/

 --

VIRUS ALERTS:

During the past week Secunia collected 241 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA23677] Microsoft Windows Vector Markup Language Vulnerabilities
2.  [SA23666] Adobe Reader Unspecified Heap Corruption Vulnerability
3.  [SA23703] Apple Mac OS X UFS ffs_mountfs() Integer Overflow
4.  [SA23757] Sun Java JRE GIF Image Processing Buffer Overflow
              Vulnerability
5.  [SA23716] Snort Rule Matching Backtrack Denial of Service
              Vulnerability
6.  [SA18787] Internet Explorer Drag-and-Drop Vulnerability
7.  [SA22477] Internet Explorer 7 "mhtml:" Redirection Information
              Disclosure
8.  [SA23686] Red Hat update for libgsf
9.  [SA23765] IBM OS/400 Connection Reset Denial of Service
              Vulnerability
10. [SA23483] Adobe Reader / Acrobat Multiple Vulnerabilities

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA23794] Oracle Products Multiple Vulnerabilities
[SA23760] LunarPoll "PollDir" File Inclusion Vulnerability
[SA23731] Dream FTP Server Data Handling Buffer Overflow Vulnerability
[SA23759] Ezboxx Portal Multiple Vulnerabilities
[SA23756] MiNT Haber Sistemi "id" SQL Injection Vulnerability
[SA23755] Okul Web Otomasyon Sistemi "id" SQL Injection Vulnerability
[SA23744] DigiAffiliate "id" SQL Injection Vulnerability
[SA23787] InstantForum.NET Members1.aspx and Logon.aspx Cross-Site
Scripting
[SA23774] Fritz!DSL Software AR7 Web Server Directory Traversal
[SA23775] Remedy Action Request System User Enumeration Weakness

UNIX/Linux:
[SA23811] Fedora update squirrelmail
[SA23792] Fedora update for w3m
[SA23785] IPCop update for various packages
[SA23773] Gentoo update for w3m
[SA23772] Ubuntu update for krb5
[SA23771] Gentoo update for opera
[SA23762] Gentoo update for openoffice
[SA23739] SUSE update for opera
[SA23723] Mandriva update for mozilla-thunderbird
[SA23797] Gentoo update for oftpd
[SA23790] oftpd LPSV and LPRT Denial of Service Vulnerability
[SA23788] Red Hat update for kernel
[SA23783] rPath update for gd
[SA23780] Gentoo update for kronolith
[SA23779] Gentoo update for mono
[SA23776] Fedora Core 5 update for mono
[SA23752] Mandriva update for kernel
[SA23727] Fedora Core 6 update for mono
[SA23798] Mandriva update for BlueZ
[SA23781] Mandriva update for fetchmail
[SA23770] Debian update for libsoup
[SA23767] Squid Denial of Service Vulnerabilities
[SA23765] IBM OS/400 Connection Reset Denial of Service Vulnerability
[SA23763] Mandriva update for libneon
[SA23751] neon "ne_uri_parse()" Denial of Service
[SA23747] BlueZ HID Insecure Device Connection Vulnerability
[SA23738] Quick.Cart "p" Cross-Site Scripting Vulnerability
[SA23734] libsoup "soup_headers_parse()" Denial of Service
[SA23733] Fastilo "p" Cross-Site Scripting Vulnerability
[SA23804] Fedora update for fetchmail
[SA23782] Fedora update for Avahi
[SA23789] Debian update for xfree86
[SA23777] Ubuntu update for libgtop2
[SA23758] SUSE update for XFree86 and Xorg
[SA23736] libgtop2 "glibtop_get_proc_map_s()" Buffer Overflow
[SA23730] FreeBSD jail rc.d Security Bypass Vulnerability
[SA23801] Colloquy "INVITE" Denial of Service Weakness
[SA23799] KDE and KOffice PDF Invalid Tree Node Denial of Service
Weakness
[SA23742] Mac OS X HFS+ "do_hfs_truncate()" Denial of Service
[SA23728] Gentoo update for kdegraphics-kfile-plugins
[SA23725] Apple Mac OS X UFS Denial of Service Vulnerabilities
[SA23721] FreeBSD UFS "ufs_dirbad()" Local Denial of Service

Other:
[SA23737] Ingate Firewall and SIParator Replay Attack Vulnerability

Cross Platform:
[SA23761] Poplar Gedcom Viewer "env[rootPath]" File Inclusion
Vulnerability
[SA23757] Sun Java JRE GIF Image Processing Buffer Overflow
Vulnerability
[SA23746] sNews Authentication Bypass Vulnerability
[SA23743] FdWeB Espace Membre "path" File Inclusion Vulnerability
[SA23722] TLM CMS "chemin" File Inclusion Vulnerability
[SA23784] Jax Petition Book "language" Local File Inclusion
[SA23766] SmE FileMailer "ps" SQL Injection Vulnerability
[SA23750] BEA WebLogic Multiple Vulnerabilities and Security Issues
[SA23749] GOsa Unspecified Manipulation of Data
[SA23748] PHP-Nuke "cat" Old Articles Block SQL Injection
[SA23741] Gentoo update for wordpress
[SA23740] All In One Control Panel (AIOCP) SQL Injection
Vulnerabilities
[SA23735] ThWboard "board[styleid]" SQL Injection Vulnerability
[SA23726] All In One Control Panel "download_category" SQL Injection
[SA23724] JV2 Folder Gallery "file" Information Disclosure
[SA23729] HP OpenView Network Node Manager Two Vulnerabilities
[SA23778] dt_guestbook "error[]" Cross-Site Scripting Vulnerability
[SA23764] Indexu Multiple Cross-Site Scripting Vulnerabilities
[SA23732] All In One Control Panel (AIOCP) Unspecified Cross-Site
Scripting
[SA23786] BEA AquaLogic Weakness and Multiple Vulnerabilities

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA23794] Oracle Products Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Unknown, Cross Site Scripting, Manipulation of data,
Exposure of sensitive information, DoS, System access
Released:    2007-01-17

Multiple vulnerabilities have been reported in various Oracle products.
Some of these vulnerabilities have unknown impacts while others can be
exploited to gain access to sensitive information, cause a DoS (Denial
of Service), conduct cross-site scripting and SQL injection attacks,
and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23794/

 --

[SA23760] LunarPoll "PollDir" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-15

ilker Kandemir has discovered a vulnerability in LunarPoll, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23760/

 --

[SA23731] Dream FTP Server Data Handling Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-15

Marsu has discovered a vulnerability in Dream FTP Server, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23731/

 --

[SA23759] Ezboxx Portal Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
system information
Released:    2007-01-16

Doron P and Eyal G have reported some vulnerabilities in Ezboxx Portal
System, which can be exploited by malicious users to conduct cross-site
scripting attacks and by malicious people to conduct cross-site
scripting attacks and conduct SQL-injection attacks.

Full Advisory:
http://secunia.com/advisories/23759/

 --

[SA23756] MiNT Haber Sistemi "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-01-16

chernobiLe has reported a vulnerability in MiNT Haber Sistemi, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/23756/

 --

[SA23755] Okul Web Otomasyon Sistemi "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-01-16

ilker Kandemir has reported a vulnerability in Okul Web Otomasyon
Sistemi, which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/23755/

 --

[SA23744] DigiAffiliate "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-01-15

ajann has reported a vulnerability in DigiAffiliate, which can be
exploited by malicious people to conduct SQL Injection Attacks.

Full Advisory:
http://secunia.com/advisories/23744/

 --

[SA23787] InstantForum.NET Members1.aspx and Logon.aspx Cross-Site
Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-01-17

Doz has reported some vulnerabilities in InstantForum.NET, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/23787/

 --

[SA23774] Fritz!DSL Software AR7 Web Server Directory Traversal

Critical:    Less critical
Where:       From local network
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-01-18

DPR has discovered a vulnerability in Fritz!DSL Software, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/23774/

 --

[SA23775] Remedy Action Request System User Enumeration Weakness

Critical:    Not critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-01-16

Davide Del Vecchio has reported a weakness in Remedy Action Request
System, which can be exploited by malicious people to identify valid
user accounts.

Full Advisory:
http://secunia.com/advisories/23775/


UNIX/Linux:--

[SA23811] Fedora update squirrelmail

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-01-18

Fedora has issued an update for squirrelmail. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting and script insertion attacks.

Full Advisory:
http://secunia.com/advisories/23811/

 --

[SA23792] Fedora update for w3m

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-16

Fedora has issued an update for w3m. This fixes a vulnerability, which
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/23792/

 --

[SA23785] IPCop update for various packages

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data, DoS, System access
Released:    2007-01-16

An updated version of IPCop has been released, which fixes some
vulnerabilities in various packages. The vulnerabilities can be
exploited by malicious people to bypass certain security restrictions,
overwrite arbitrary files, cause a DoS (Denial of Service), or
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23785/

 --

[SA23773] Gentoo update for w3m

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-15

Gentoo has issued an update for w3m. This fixes a vulnerability, which
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/23773/

 --

[SA23772] Ubuntu update for krb5

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-01-16

Ubuntu has issued an update for krb5. This fixes a vulnerability, which
can potentially be exploited by malicious people to cause a DoS (Denial
of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23772/

 --

[SA23771] Gentoo update for opera

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-15

Gentoo has issued an update for opera. This fixes two vulnerabilities,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/23771/

 --

[SA23762] Gentoo update for openoffice

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-15

Gentoo has issued an update for openoffice. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/23762/

 --

[SA23739] SUSE update for opera

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-15

SUSE has issued an update for opera. This fixes some vulnerabilities,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/23739/

 --

[SA23723] Mandriva update for mozilla-thunderbird

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, DoS, System access
Released:    2007-01-12

Mandriva has issued an update for mozilla-thunderbird. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting attacks and potentially compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/23723/

 --

[SA23797] Gentoo update for oftpd

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-01-16

Gentoo has issued an update for oftpd. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/23797/

 --

[SA23790] oftpd LPSV and LPRT Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-01-16

Tavis Ormandy has reported a vulnerability in oftpd, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/23790/

 --

[SA23788] Red Hat update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-01-17

Red Hat has issued an update for the kernel. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/23788/

 --

[SA23783] rPath update for gd

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-01-16

rPath has issued an update for gd. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23783/

 --

[SA23780] Gentoo update for kronolith

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-01-17

Gentoo has issued an update for kronolith. This fixes a vulnerability,
which can be exploited by malicious users to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/23780/

 --

[SA23779] Gentoo update for mono

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-01-17

Gentoo has issued an update for mono. This fixes a vulnerability, which
can be exploited by malicious people to disclose potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/23779/

 --

[SA23776] Fedora Core 5 update for mono

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, Privilege escalation
Released:    2007-01-15

Fedora has issued an update for mono. This fixes some vulnerabilities,
which can be exploited by malicious, local users to perform certain
actions with escalated privileges, and by malicious people to disclose
potentially sensitive information.

Full Advisory:
http://secunia.com/advisories/23776/

 --

[SA23752] Mandriva update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, Privilege escalation,
DoS
Released:    2007-01-15

Mandriva has issued an update for the kernel. This fixes some
vulnerabilities, which have unknown impact or can be exploited by
malicious, local users to gain knowledge of potentially sensitive
information, cause a DoS (Denial of Service), or gain escalated
privileges, and by malicious people to cause a DoS.

Full Advisory:
http://secunia.com/advisories/23752/

 --

[SA23727] Fedora Core 6 update for mono

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-01-15

Fedora has issued an update for mono. This fixes a vulnerability, which
can be exploited by malicious people to disclose potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/23727/

 --

[SA23798] Mandriva update for BlueZ

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2007-01-16

Mandriva has issued an update for BlueZ. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/23798/

 --

[SA23781] Mandriva update for fetchmail

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-01-16

Mandriva has issued an update for fetchmail. This fixes a security
issue, which can be exploited by malicious people to gain sensitive
information.

Full Advisory:
http://secunia.com/advisories/23781/

 --

[SA23770] Debian update for libsoup

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-01-15

Debian has issued an update for libsoup. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/23770/

 --

[SA23767] Squid Denial of Service Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-01-16

Two vulnerabilities have been reported in Squid, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/23767/

 --

[SA23765] IBM OS/400 Connection Reset Denial of Service Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-01-15

IBM has acknowledged a vulnerability in OS/400, which can be exploited
by malicious people to reset established TCP connections on a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/23765/

 --

[SA23763] Mandriva update for libneon

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-01-15

Mandriva has issued an update for libneon. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/23763/

 --

[SA23751] neon "ne_uri_parse()" Denial of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-01-15

A vulnerability has been reported in neon, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/23751/

 --

[SA23747] BlueZ HID Insecure Device Connection Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2007-01-16

Collin Mulliner has reported a vulnerability in BlueZ, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23747/

 --

[SA23738] Quick.Cart "p" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-01-12

David Sopas has discovered a vulnerability in Quick.Cart, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/23738/

 --

[SA23734] libsoup "soup_headers_parse()" Denial of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-01-15

Roland Lezuo and Josselin Mouette have reported a vulnerability in
libsoup, which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/23734/

 --

[SA23733] Fastilo "p" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-01-12

David Sopas has discovered a vulnerability in Fastilo, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/23733/

 --

[SA23804] Fedora update for fetchmail

Critical:    Less critical
Where:       From local network
Impact:      Exposure of sensitive information, DoS
Released:    2007-01-17

Fedora has issued an update for fetchmail. This fixes a vulnerability
and a security issue, which can be exploited by malicious, local users
to cause a DoS (Denial of Service) and malicious people to gain
knowledge of sensitive information.

Full Advisory:
http://secunia.com/advisories/23804/

 --

[SA23782] Fedora update for Avahi

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-01-16

Fedora has issued an update for Avahi. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/23782/

 --

[SA23789] Debian update for xfree86

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-01-16

Debian has issued an update for xfree86. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/23789/

 --

[SA23777] Ubuntu update for libgtop2

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-01-15

Ubuntu has issued an update for libgtop2. This fixes a vulnerability,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/23777/

 --

[SA23758] SUSE update for XFree86 and Xorg

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-01-15

SUSE has issued an update for XFree86 and Xorg. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/23758/

 --

[SA23736] libgtop2 "glibtop_get_proc_map_s()" Buffer Overflow

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-01-15

Liu Qishuai has reported a vulnerability in libgtop2, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/23736/

 --

[SA23730] FreeBSD jail rc.d Security Bypass Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2007-01-12

A vulnerability has been reported in FreeBSD, which can be exploited by
malicious, local users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/23730/

 --

[SA23801] Colloquy "INVITE" Denial of Service Weakness

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2007-01-18

KF and LMH have reported a weakness in Colloquy, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/23801/

 --

[SA23799] KDE and KOffice PDF Invalid Tree Node Denial of Service
Weakness

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2007-01-17

A weakness has been reported in KDE and KOffice, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/23799/

 --

[SA23742] Mac OS X HFS+ "do_hfs_truncate()" Denial of Service

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2007-01-15

LMH has reported a vulnerability in Mac OS X, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/23742/

 --

[SA23728] Gentoo update for kdegraphics-kfile-plugins

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2007-01-15

Gentoo has issued an update for kdegraphics-kfile-plugins. This fixes a
weakness, which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/23728/

 --

[SA23725] Apple Mac OS X UFS Denial of Service Vulnerabilities

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2007-01-12

LMH has reported some vulnerabilities in Apple Mac OS X, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/23725/

 --

[SA23721] FreeBSD UFS "ufs_dirbad()" Local Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-01-16

LMH has reported a vulnerability in FreeBSD, which can be exploited by
malicious, local users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/23721/


Other:--

[SA23737] Ingate Firewall and SIParator Replay Attack Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-01-16

A vulnerability has been reported in Ingate Firewall and SIParator,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/23737/


Cross Platform:--

[SA23761] Poplar Gedcom Viewer "env[rootPath]" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-15

Mahmood_ali has discovered a vulnerability in Poplar Gedcom Viewer,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/23761/

 --

[SA23757] Sun Java JRE GIF Image Processing Buffer Overflow
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-17

A vulnerability has been reported in Sun Java Runtime Environment
(JRE), which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/23757/

 --

[SA23746] sNews Authentication Bypass Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-01-15

rgod has discovered a vulnerability in sNews, which can be exploited by
malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/23746/

 --

[SA23743] FdWeB Espace Membre "path" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-16

ajann has discovered a vulnerability in FdWeb Espace Membre, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23743/

 --

[SA23722] TLM CMS "chemin" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-01-15

Mahmood_ali has discovered a vulnerability in TLM CMS, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23722/

 --

[SA23784] Jax Petition Book "language" Local File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-01-17

ilker Kandemir has discovered two vulnerabilities in Jax Petition Book,
which can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/23784/

 --

[SA23766] SmE FileMailer "ps" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-01-17

CorryL has discovered a vulnerability in SmE FileMailer, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/23766/

 --

[SA23750] BEA WebLogic Multiple Vulnerabilities and Security Issues

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Spoofing, Exposure of sensitive
information, DoS, System access
Released:    2007-01-17

Multiple vulnerabilities and security issues have been reported in BEA
Weblogic, which can be exploited by malicious people or malicious users
to gain knowledge of sensitive information, bypass certain security
restrictions, conduct spoofing attacks, cause a DoS (Denial Of
Service), or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23750/

 --

[SA23749] GOsa Unspecified Manipulation of Data

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-01-16

A vulnerability has been reported in GOsa, which can be exploited by
malicious users to manipulate certain data.

Full Advisory:
http://secunia.com/advisories/23749/

 --

[SA23748] PHP-Nuke "cat" Old Articles Block SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-01-17

Paisterist has discovered a vulnerability in PHP-Nuke, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/23748/

 --

[SA23741] Gentoo update for wordpress

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
system information
Released:    2007-01-16

Gentoo has issued an update for wordpress. This fixes some
vulnerabilities and a weakness, which can be exploited by malicious
people to identify valid user accounts and to conduct cross-site
scripting, script insertion, and SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/23741/

 --

[SA23740] All In One Control Panel (AIOCP) SQL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-01-15

Coloss has discovered some vulnerabilities in All In One Control Panel
(AIOCP), which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/23740/

 --

[SA23735] ThWboard "board[styleid]" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-01-17

rgod has reported a vulnerability in ThWboard, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/23735/

 --

[SA23726] All In One Control Panel "download_category" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-01-12

A vulnerability has been reported in All In One Control Panel (AIOCP),
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/23726/

 --

[SA23724] JV2 Folder Gallery "file" Information Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-01-15

SaO has reported a vulnerability in JV2 Folder Gallery, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/23724/

 --

[SA23729] HP OpenView Network Node Manager Two Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      Exposure of sensitive information, System access
Released:    2007-01-12

Two vulnerabilities have been reported in HP OpenView Network Node
Manager (OV NNM), which can potentially be exploited by malicious
people to bypass certain security restrictions and gain knowledge of
sensitive information, or  to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/23729/

 --

[SA23778] dt_guestbook "error[]" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-01-16

Jesper Jurcenoks has reported a vulnerability in DT Guestbook, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/23778/

 --

[SA23764] Indexu Multiple Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-01-17

Some vulnerabilities have been reported in Indexu, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/23764/

 --

[SA23732] All In One Control Panel (AIOCP) Unspecified Cross-Site
Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-01-15

A vulnerability has been reported in All In One Control Panel (AIOCP),
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/23732/

 --

[SA23786] BEA AquaLogic Weakness and Multiple Vulnerabilities

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass
Released:    2007-01-17

Some vulnerabilities and a weakness have been reported in BEA
AquaLogic, which can be exploited by malicious people to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/23786/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_____________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn
 



This archive was generated by hypermail 2.1.3 : Thu Jan 18 2007 - 22:44:53 PST