======================================================================== The Secunia Weekly Advisory Summary 2007-02-15 - 2007-02-22 This week: 62 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: Secunia blog entry about the "availability" of the latest Apple QuickTime security update. The update is ready, yet users are still only able to download the vulnerable version from Apple.com - without any indication or guidance about why or how to secure it: http://secunia.com/blog/7/ Exploitation appears to be straight forward and the QuickTime player is installed on more than 50% of all computers! Use the Secunia Software Inspector for verification and real guidance on how to secure your QuickTime player: http://secunia.com/software_Inspector/ -- Should you be interesting in a career within Secunia, the current job openings are available right now: Security Sales Engineer: http://corporate.secunia.com/about_secunia/54/ German Key Account Manager: http://corporate.secunia.com/about_secunia/55/ International Account Manager - Enterprise Sales: http://corporate.secunia.com/about_secunia/52/ International Sales Manager - IT Security Partner: http://corporate.secunia.com/about_secunia/51/ Danish: Disassembling og Reversing http://secunia.com/Disassembling_og_Reversing/ ======================================================================== 2) This Week in Brief: Several vulnerabilities in various Trend Micro products were disclosed this week, bringing the advisory count for Trend Micro to six this year, and five so far for February alone. The first advisory discussed two vulnerabilities caused by boundary errors within the OfficeScan Corp Edition Web-Deployment SetupINI ActiveX control (OfficeScanSetupINI.dll) on an OfficeScan client. This could be exploited by passing overly long properties, for example when a user visits a malicious web site. Successful exploitation allows execution of arbitrary code, but requires that the OfficeScan client was installed using web deployment. The vulnerabilities reportedly affect the following products: * OfficeScan versions 7.3, 7.0, 6.5, and 5.58. * Client Server Messaging Security versions 3.5, 3.0, and 2.0. As of this writing, fixes only for Officescan versions 7.0 and 7.3, and Client Server Messaging Security version 3.0 have been released. For more information, refer to: http://secunia.com/advisories/24193/ -- Four vulnerabilities were discovered in Trend Micro ServerProtect, which could potentially allow a malicious person to compromise a system on the local network. All four vulnerabilities are boundary errors in various functions in two library files, and could be exploited to cause stack-based buffer overflows via specially crafted RPC requests. Successful exploitation of the vulnerabilities allows execution of arbitrary code with SYSTEM privileges. The vulnerabilities are reported in the following versions: * ServerProtect for Windows 5.58 * ServerProtect for EMC 5.58 * ServerProtect for Network Appliance Filer 5.61 * ServerProtect for Network Appliance Filer 5.62 A patch has been released for ServerProtect for Windows 5.58 in English. For more information, refer to: http://secunia.com/advisories/24243/ -- A vulnerability in Trend Micro ServerProtect for Linux was also disclosed, this time regarding a design error in the management web interface. The error could be exploited to bypass user authentication by requesting any page while supplying a "splx_2376_info" cookie with an arbitrary value. Successful exploitation, allows, for example, editing and disabling anti-virus features on the server. The vulnerability is reported in versions 1.3 and 2.5. Patches are available for this vulnerability. For more information, refer to: http://secunia.com/advisories/24264/ -- VIRUS ALERTS: During the past week Secunia collected 140 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA24122] Microsoft Word Unspecified Memory Corruption Vulnerability 2. [SA24156] Internet Explorer Multiple Vulnerabilities 3. [SA24175] Mozilla Firefox "locations.hostname" DOM Property Handling Vulnerability 4. [SA24198] Mac OS X Security Update Fixes Multiple Vulnerabilities 5. [SA24008] Microsoft Office Two Code Execution Vulnerabilities 6. [SA24153] Mozilla Firefox "_blank" Phishing Weakness 7. [SA24193] Trend Micro OfficeScan Client ActiveX Control Buffer Overflows 8. [SA24160] Cisco PIX and ASA Privilege Escalation and Denial of Service 9. [SA24197] SpamAssassin Long URI Denial of Service 10. [SA24187] ClamAV MIME Header Handling and CAB File Processing Vulnerabilities ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA24216] News Rover NZB File Processing Buffer Overflow [SA24199] EasyMail Objects IMAP4 Component "Connect" Buffer Overflow [SA24193] Trend Micro OfficeScan Client ActiveX Control Buffer Overflows [SA24261] NewsBin Pro NBI Configuration File Processing Buffer Overflow [SA24237] News File Grabber NZB File Processing Code Execution [SA24209] Turuncu Portal "id" SQL Injection Vulnerability [SA24208] Online Web Building "art_id" SQL Injection Vulnerability [SA24243] Trend Micro ServerProtect Buffer Overflow Vulnerabilities [SA24258] Cisco Secure Services Client Multiple Vulnerabilities UNIX/Linux: [SA24219] Ultimate Fun Book "gbpfad" File Inclusion Vulnerability [SA24218] Red Hat update for koffice [SA24202] Gentoo update for sun-jdk and sun-jre-bin [SA24198] Mac OS X Security Update Fixes Multiple Vulnerabilities [SA24189] Gentoo update for emul-linux-x86-java [SA24182] VS-Gstebuch "gb_pfad" File Inclusion Vulnerability [SA24271] Ubuntu update for ekiga and gnomemeeting [SA24250] Red Hat update for spamassassin [SA24248] Red Hat update for php [SA24241] Fedora update for php [SA24229] Mandriva update for ekiga [SA24228] Fedora update for ekiga [SA24224] PHP-Nuke HTTP "referer" SQL Injection Vulnerability [SA24217] Ubuntu update for php [SA24200] Fedora update for spamassassin [SA24197] SpamAssassin Long URI Denial of Service [SA24196] Ubuntu update for imagemagick [SA24195] Red Hat update for php [SA24194] Ekiga Format String Vulnerability [SA24192] Mandriva update for clamav [SA24186] Red Hat update for ImageMagick [SA24185] Red Hat update for gnomemeeting [SA24184] Gentoo update for fail2ban [SA24264] Trend Micro ServerProtect for Linux Web Interface Authentication Bypass [SA24244] Ubuntu update for moinmoin [SA24206] Avaya Products Kernel Multiple Vulnerabilities [SA24204] SUSE update for poppler [SA24203] Gentoo update for bind [SA24188] Red Hat update for samba [SA24247] Avaya CMS xfs / X Render and DBE Extensions Vulnerabilities [SA24215] Linux Kernel NFSACL "ACCESS" Denial of Service [SA24231] Nortel Net Direct Client for Linux Privilege Escalation [SA24226] Mandriva update for gnucash [SA24225] GnuCash Insecure Temporary Files [SA24213] IBM DB2 DB2DIAG.LOG Insecure File Creation [SA24210] Avaya Products XFree86 "DBE" and "Render" Extensions Vulnerabilities [SA24259] Mandriva update for kernel Other: [SA24240] Nortel Threat Protection System DCE/RPC Preprocessor Buffer Overflow [SA24239] Nortel Threat Protection System DCE/RPC Preprocessor Buffer Overflow [SA24235] Sourcefire Intrusion Sensor DCE/RPC Preprocessor Buffer Overflow [SA24262] Cisco Unified IP Conference Station / IP Phone Default Accounts Cross Platform: [SA24230] phpMyFAQ Unspecified File Upload Vulnerability [SA24220] VS-News-System "newsordner" File Inclusion Vulnerabilities [SA24214] Htaccess Passwort Generator "ht_pfad" File Inclusion Vulnerability [SA24212] Interspire SendStudio "ROOTDIR" File Inclusion Vulnerabilities [SA24190] Snort DCE/RPC Preprocessor Buffer Overflow [SA24260] deV!L'z Clanportal Local File Disclosure Vulnerability [SA24242] phpTrafficA "file" and "lang" Local File Inclusion [SA24191] webSPELL "showonly" SQL Injection Vulnerability [SA24187] ClamAV MIME Header Handling and CAB File Processing Vulnerabilities [SA24222] MyCalendar Multiple Cross-Site Scripting Vulnerabilities [SA24211] MediaWiki AJAX UTF-7 Cross-Site Scripting [SA24181] libevent DNS Response Denial of Service ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA24216] News Rover NZB File Processing Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-20 Marsu Pilami has discovered a vulnerability in News Rover, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/24216/ -- [SA24199] EasyMail Objects IMAP4 Component "Connect" Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-16 Paul Graig has reported a vulnerability in EasyMail Objects, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/24199/ -- [SA24193] Trend Micro OfficeScan Client ActiveX Control Buffer Overflows Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-16 Some vulnerabilities have been discovered in Trend Micro OfficeScan, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/24193/ -- [SA24261] NewsBin Pro NBI Configuration File Processing Buffer Overflow Critical: Moderately critical Where: From remote Impact: System access Released: 2007-02-22 Marsu Pilami has discovered a vulnerability in NewsBin Pro, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/24261/ -- [SA24237] News File Grabber NZB File Processing Code Execution Critical: Moderately critical Where: From remote Impact: System access Released: 2007-02-20 Marsu Pilami has discovered a vulnerability in News File Grabber, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/24237/ -- [SA24209] Turuncu Portal "id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-02-19 chernobiLe has discovered a vulnerability in Turuncu Portal, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/24209/ -- [SA24208] Online Web Building "art_id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-02-21 xoron has reported a vulnerability in Online Web Building, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/24208/ -- [SA24243] Trend Micro ServerProtect Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From local network Impact: System access Released: 2007-02-21 TippingPoint Security Research Team has reported some vulnerabilities in Trend Micro ServerProtect, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24243/ -- [SA24258] Cisco Secure Services Client Multiple Vulnerabilities Critical: Less critical Where: Local system Impact: Exposure of sensitive information, Privilege escalation Released: 2007-02-22 Some vulnerabilities have been reported in Cisco Secure Services Client, which can be exploited by malicious, local users to gain knowledge of sensitive information or gain escalated privileges. Full Advisory: http://secunia.com/advisories/24258/ UNIX/Linux:-- [SA24219] Ultimate Fun Book "gbpfad" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-21 kezzap66345 has discovered a vulnerability in Ultimate Fun Book, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24219/ -- [SA24218] Red Hat update for koffice Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-21 Red Hat has issued an update for koffice. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/24218/ -- [SA24202] Gentoo update for sun-jdk and sun-jre-bin Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-19 Gentoo has issued an update for sun-jdk and sun-jre-bin. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24202/ -- [SA24198] Mac OS X Security Update Fixes Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Privilege escalation, DoS, System access Released: 2007-02-16 Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities. Full Advisory: http://secunia.com/advisories/24198/ -- [SA24189] Gentoo update for emul-linux-x86-java Critical: Highly critical Where: From remote Impact: Security Bypass, Privilege escalation, System access Released: 2007-02-19 Gentoo has issued an update for emul-linux-x86-java. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24189/ -- [SA24182] VS-Gstebuch "gb_pfad" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-19 ajann has discovered a vulnerability in VS-Gstebuch, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24182/ -- [SA24271] Ubuntu update for ekiga and gnomemeeting Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-02-22 Ubuntu has issued an update for ekiga and gnomemeeting. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/24271/ -- [SA24250] Red Hat update for spamassassin Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-02-22 Red Hat has issued an update for spamassassin. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24250/ -- [SA24248] Red Hat update for php Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of sensitive information, DoS, System access Released: 2007-02-21 Red Hat has issued an update for php. This fixes some vulnerabilities and a weakness, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24248/ -- [SA24241] Fedora update for php Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of sensitive information, DoS, System access Released: 2007-02-22 Fedora has issued an update for php. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24241/ -- [SA24229] Mandriva update for ekiga Critical: Moderately critical Where: From remote Impact: System access, DoS Released: 2007-02-22 Mandriva has issued an update for ekiga. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24229/ -- [SA24228] Fedora update for ekiga Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-02-22 Fedora has issued an update for ekiga. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/24228/ -- [SA24224] PHP-Nuke HTTP "referer" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-02-21 Maciej "krasza" Kukla has discovered a vulnerability in PHP-Nuke, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/24224/ -- [SA24217] Ubuntu update for php Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information, DoS, System access Released: 2007-02-22 Ubuntu has issued an update for php. This fixes some vulnerabilities and a weakness, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24217/ -- [SA24200] Fedora update for spamassassin Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-02-16 Fedora has issued an update for spamassassin. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24200/ -- [SA24197] SpamAssassin Long URI Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-02-16 A vulnerability has been reported in SpamAssassin, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24197/ -- [SA24196] Ubuntu update for imagemagick Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-02-16 Ubuntu has issued an update for imagemagick. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24196/ -- [SA24195] Red Hat update for php Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of sensitive information, DoS, System access Released: 2007-02-20 Red Hat has issued an update for php. This fixes some vulnerabilities and a weakness, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24195/ -- [SA24194] Ekiga Format String Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-02-19 A vulnerability has been reported in Ekiga, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/24194/ -- [SA24192] Mandriva update for clamav Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-02-20 Mandriva has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24192/ -- [SA24186] Red Hat update for ImageMagick Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-02-16 Red Hat has issued an update for ImageMagick. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24186/ -- [SA24185] Red Hat update for gnomemeeting Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-02-20 Red Hat has issued an update for gnomemeeting. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/24185/ -- [SA24184] Gentoo update for fail2ban Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-02-16 Gentoo has issued an update for fail2ban. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24184/ -- [SA24264] Trend Micro ServerProtect for Linux Web Interface Authentication Bypass Critical: Moderately critical Where: From local network Impact: Security Bypass Released: 2007-02-22 A vulnerability has been reported in Trend Micro ServerProtect for Linux, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/24264/ -- [SA24244] Ubuntu update for moinmoin Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-02-21 Ubuntu has issued an update for moinmoin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/24244/ -- [SA24206] Avaya Products Kernel Multiple Vulnerabilities Critical: Less critical Where: From remote Impact: Exposure of sensitive information, Privilege escalation, DoS Released: 2007-02-19 Avaya has acknowledged some vulnerabilities in various Avaya products, which can be exploited by malicious, local users to disclose potentially sensitive information, gain escalated privileges, or cause a DoS (Denial of Service), and by malicious people to cause a DoS. Full Advisory: http://secunia.com/advisories/24206/ -- [SA24204] SUSE update for poppler Critical: Less critical Where: From remote Impact: DoS Released: 2007-02-20 SUSE has issued an update for poppler. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24204/ -- [SA24203] Gentoo update for bind Critical: Less critical Where: From remote Impact: DoS Released: 2007-02-19 Gentoo has issued an update for bind. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24203/ -- [SA24188] Red Hat update for samba Critical: Less critical Where: From remote Impact: DoS Released: 2007-02-16 Red Hat has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24188/ -- [SA24247] Avaya CMS xfs / X Render and DBE Extensions Vulnerabilities Critical: Less critical Where: From local network Impact: Privilege escalation, System access Released: 2007-02-22 Avaya has acknowledged some vulnerabilities in Avaya CMS (Call Management System), which can be exploited by malicious, local users to gain escalated privileges or by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24247/ -- [SA24215] Linux Kernel NFSACL "ACCESS" Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2007-02-20 A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24215/ -- [SA24231] Nortel Net Direct Client for Linux Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-02-21 Jon Hart has reported a vulnerability in Net Direct Client for Linux, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/24231/ -- [SA24226] Mandriva update for gnucash Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-02-22 Mandriva has issued an update for gnucash. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/24226/ -- [SA24225] GnuCash Insecure Temporary Files Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-02-19 A vulnerability has been reported in GnuCash, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/24225/ -- [SA24213] IBM DB2 DB2DIAG.LOG Insecure File Creation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-02-19 A vulnerability has been reported in IBM DB2, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/24213/ -- [SA24210] Avaya Products XFree86 "DBE" and "Render" Extensions Vulnerabilities Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-02-21 Avaya has acknowledged some vulnerabilities in various Avaya products, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/24210/ -- [SA24259] Mandriva update for kernel Critical: Not critical Where: Local system Impact: DoS Released: 2007-02-22 Mandriva has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24259/ Other:-- [SA24240] Nortel Threat Protection System DCE/RPC Preprocessor Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-21 A vulnerability has been reported in Nortel Threat Protection System products, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24240/ -- [SA24239] Nortel Threat Protection System DCE/RPC Preprocessor Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-21 A vulnerability has been reported in Nortel Threat Protection System products, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24239/ -- [SA24235] Sourcefire Intrusion Sensor DCE/RPC Preprocessor Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-20 Neel Mehta has reported a vulnerability in Sourcefire Intrusion Sensor, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24235/ -- [SA24262] Cisco Unified IP Conference Station / IP Phone Default Accounts Critical: Moderately critical Where: From local network Impact: Security Bypass Released: 2007-02-22 Some security issues have been reported in Cisco Unified IP Conference Station and IP Phones, which can be exploited by malicious people to access a vulnerable device. Full Advisory: http://secunia.com/advisories/24262/ Cross Platform:-- [SA24230] phpMyFAQ Unspecified File Upload Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-19 A vulnerability has been reported in phpMyFAQ, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24230/ -- [SA24220] VS-News-System "newsordner" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-19 Some vulnerabilities have been reported in VS-News-System, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24220/ -- [SA24214] Htaccess Passwort Generator "ht_pfad" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-19 kezzap66345 has discovered a vulnerability in Htaccess Passwort Generator, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24214/ -- [SA24212] Interspire SendStudio "ROOTDIR" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-21 M.Hasran Addahroni has reported two vulnerabilities in Interspire SendStudio, which can be exploited by malicious people to compromise vulnerable systems. Full Advisory: http://secunia.com/advisories/24212/ -- [SA24190] Snort DCE/RPC Preprocessor Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-20 Neel Mehta has reported a vulnerability in Snort, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24190/ -- [SA24260] deV!L'z Clanportal Local File Disclosure Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2007-02-22 A vulnerability has been reported in deV!L'z Clanportal, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/24260/ -- [SA24242] phpTrafficA "file" and "lang" Local File Inclusion Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2007-02-22 Hamid Ebadi has discovered some vulnerabilities in phpTrafficA, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/24242/ -- [SA24191] webSPELL "showonly" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-02-19 DNX has discovered a vulnerability in webSPELL, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/24191/ -- [SA24187] ClamAV MIME Header Handling and CAB File Processing Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-02-16 Two vulnerabilities have been reported in ClamAV, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24187/ -- [SA24222] MyCalendar Multiple Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-02-21 sn0oPy has reported some vulnerabilities in AbleDesign MyCalendar, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/24222/ -- [SA24211] MediaWiki AJAX UTF-7 Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-02-21 Moshe BA has reported a vulnerability in MediaWiki, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/24211/ -- [SA24181] libevent DNS Response Denial of Service Critical: Less critical Where: From remote Impact: DoS Released: 2007-02-19 Jon Oberheide has reported a vulnerability in libevent, which can be exploited by malicious people to cause a DoS (Denial of Service) of applications using the library. Full Advisory: http://secunia.com/advisories/24181/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 ______________________________________ Subscribe to the InfoSec News RSS Feed http://www.infosecnews.org/isn.rss
This archive was generated by hypermail 2.1.3 : Fri Feb 23 2007 - 01:33:48 PST