[ISN] Secunia Weekly Summary - Issue: 2007-8

From: InfoSec News (alerts@private)
Date: Fri Feb 23 2007 - 01:24:27 PST


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2007-02-15 - 2007-02-22                        

                       This week: 62 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Secunia blog entry about the "availability" of the latest Apple
QuickTime security update.

The update is ready, yet users are still only able to download the
vulnerable version from Apple.com - without any indication or guidance
about why or how to secure it:
http://secunia.com/blog/7/

Exploitation appears to be straight forward and the QuickTime player
is installed on more than 50% of all computers!

Use the Secunia Software Inspector for verification and real guidance
on how to secure your QuickTime player:
http://secunia.com/software_Inspector/

 --

Should you be interesting in a career within Secunia, the current job
openings are available right now:

Security Sales Engineer:
http://corporate.secunia.com/about_secunia/54/

German Key Account Manager:
http://corporate.secunia.com/about_secunia/55/

International Account Manager - Enterprise Sales:
http://corporate.secunia.com/about_secunia/52/

International Sales Manager - IT Security Partner:
http://corporate.secunia.com/about_secunia/51/

Danish: Disassembling og Reversing
http://secunia.com/Disassembling_og_Reversing/

========================================================================
2) This Week in Brief:

Several vulnerabilities in various Trend Micro products were disclosed
this week, bringing the advisory count for Trend Micro to six this
year, and five so far for February alone.

The first advisory discussed two vulnerabilities caused by boundary
errors within the OfficeScan Corp Edition Web-Deployment SetupINI
ActiveX control (OfficeScanSetupINI.dll) on an OfficeScan client. This
could be exploited by passing overly long properties, for example when
a user visits a malicious web site.

Successful exploitation allows execution of arbitrary code, but
requires that the OfficeScan client was installed using web
deployment.

The vulnerabilities reportedly affect the following products:
* OfficeScan versions 7.3, 7.0, 6.5, and 5.58.
* Client Server Messaging Security versions 3.5, 3.0, and 2.0.

As of this writing, fixes only for Officescan versions 7.0 and 7.3,
and Client Server Messaging Security version 3.0 have been released.

For more information, refer to:
http://secunia.com/advisories/24193/

 --

Four vulnerabilities were discovered in Trend Micro ServerProtect,
which could potentially allow a malicious person to compromise a
system on the local network.

All four vulnerabilities are boundary errors in various functions in
two library files, and could be exploited to cause stack-based buffer
overflows via specially crafted RPC requests.

Successful exploitation of the vulnerabilities allows execution of
arbitrary code with SYSTEM privileges.

The vulnerabilities are reported in the following versions:
* ServerProtect for Windows 5.58
* ServerProtect for EMC 5.58
* ServerProtect for Network Appliance Filer 5.61
* ServerProtect for Network Appliance Filer 5.62
A patch has been released for ServerProtect for Windows 5.58 in
English.

For more information, refer to:
http://secunia.com/advisories/24243/

 --

A vulnerability in Trend Micro ServerProtect for Linux was also
disclosed, this time regarding a design error in the management web
interface. The error could be exploited to bypass user authentication
by requesting any page while supplying a "splx_2376_info" cookie with
an arbitrary value.

Successful exploitation, allows, for example, editing and disabling
anti-virus features on the server.

The vulnerability is reported in versions 1.3 and 2.5. Patches are
available for this vulnerability.

For more information, refer to:
http://secunia.com/advisories/24264/

 --

VIRUS ALERTS:

During the past week Secunia collected 140 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA24122] Microsoft Word Unspecified Memory Corruption 
              Vulnerability
2.  [SA24156] Internet Explorer Multiple Vulnerabilities
3.  [SA24175] Mozilla Firefox "locations.hostname" DOM Property
              Handling Vulnerability
4.  [SA24198] Mac OS X Security Update Fixes Multiple Vulnerabilities
5.  [SA24008] Microsoft Office Two Code Execution Vulnerabilities
6.  [SA24153] Mozilla Firefox "_blank" Phishing Weakness
7.  [SA24193] Trend Micro OfficeScan Client ActiveX Control Buffer
              Overflows
8.  [SA24160] Cisco PIX and ASA Privilege Escalation and Denial of
              Service
9.  [SA24197] SpamAssassin Long URI Denial of Service
10. [SA24187] ClamAV MIME Header Handling and CAB File Processing
              Vulnerabilities

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA24216] News Rover NZB File Processing Buffer Overflow
[SA24199] EasyMail Objects IMAP4 Component "Connect" Buffer Overflow
[SA24193] Trend Micro OfficeScan Client ActiveX Control Buffer
Overflows
[SA24261] NewsBin Pro NBI Configuration File Processing Buffer
Overflow
[SA24237] News File Grabber NZB File Processing Code Execution
[SA24209] Turuncu Portal "id" SQL Injection Vulnerability
[SA24208] Online Web Building "art_id" SQL Injection Vulnerability
[SA24243] Trend Micro ServerProtect Buffer Overflow Vulnerabilities
[SA24258] Cisco Secure Services Client Multiple Vulnerabilities

UNIX/Linux:
[SA24219] Ultimate Fun Book "gbpfad" File Inclusion Vulnerability
[SA24218] Red Hat update for koffice
[SA24202] Gentoo update for sun-jdk and sun-jre-bin
[SA24198] Mac OS X Security Update Fixes Multiple Vulnerabilities
[SA24189] Gentoo update for emul-linux-x86-java
[SA24182] VS-Gstebuch "gb_pfad" File Inclusion Vulnerability
[SA24271] Ubuntu update for ekiga and gnomemeeting
[SA24250] Red Hat update for spamassassin
[SA24248] Red Hat update for php
[SA24241] Fedora update for php
[SA24229] Mandriva update for ekiga
[SA24228] Fedora update for ekiga
[SA24224] PHP-Nuke HTTP "referer" SQL Injection Vulnerability
[SA24217] Ubuntu update for php
[SA24200] Fedora update for spamassassin
[SA24197] SpamAssassin Long URI Denial of Service
[SA24196] Ubuntu update for imagemagick
[SA24195] Red Hat update for php
[SA24194] Ekiga Format String Vulnerability
[SA24192] Mandriva update for clamav
[SA24186] Red Hat update for ImageMagick
[SA24185] Red Hat update for gnomemeeting
[SA24184] Gentoo update for fail2ban
[SA24264] Trend Micro ServerProtect for Linux Web Interface
Authentication Bypass
[SA24244] Ubuntu update for moinmoin
[SA24206] Avaya Products Kernel Multiple Vulnerabilities
[SA24204] SUSE update for poppler
[SA24203] Gentoo update for bind
[SA24188] Red Hat update for samba
[SA24247] Avaya CMS xfs / X Render and DBE Extensions Vulnerabilities
[SA24215] Linux Kernel NFSACL "ACCESS" Denial of Service
[SA24231] Nortel Net Direct Client for Linux Privilege Escalation
[SA24226] Mandriva update for gnucash
[SA24225] GnuCash Insecure Temporary Files
[SA24213] IBM DB2 DB2DIAG.LOG Insecure File Creation
[SA24210] Avaya Products XFree86 "DBE" and "Render" Extensions
Vulnerabilities
[SA24259] Mandriva update for kernel

Other:
[SA24240] Nortel Threat Protection System DCE/RPC Preprocessor Buffer
Overflow
[SA24239] Nortel Threat Protection System DCE/RPC Preprocessor Buffer
Overflow
[SA24235] Sourcefire Intrusion Sensor DCE/RPC Preprocessor Buffer
Overflow
[SA24262] Cisco Unified IP Conference Station / IP Phone Default
Accounts

Cross Platform:
[SA24230] phpMyFAQ Unspecified File Upload Vulnerability
[SA24220] VS-News-System "newsordner" File Inclusion Vulnerabilities
[SA24214] Htaccess Passwort Generator "ht_pfad" File Inclusion
Vulnerability
[SA24212] Interspire SendStudio "ROOTDIR" File Inclusion
Vulnerabilities
[SA24190] Snort DCE/RPC Preprocessor Buffer Overflow
[SA24260] deV!L'z Clanportal Local File Disclosure Vulnerability
[SA24242] phpTrafficA "file" and "lang" Local File Inclusion
[SA24191] webSPELL "showonly" SQL Injection Vulnerability
[SA24187] ClamAV MIME Header Handling and CAB File Processing
Vulnerabilities
[SA24222] MyCalendar Multiple Cross-Site Scripting Vulnerabilities
[SA24211] MediaWiki AJAX UTF-7 Cross-Site Scripting
[SA24181] libevent DNS Response Denial of Service

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA24216] News Rover NZB File Processing Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-20

Marsu Pilami has discovered a vulnerability in News Rover, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24216/

 --

[SA24199] EasyMail Objects IMAP4 Component "Connect" Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-16

Paul Graig has reported a vulnerability in EasyMail Objects, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24199/

 --

[SA24193] Trend Micro OfficeScan Client ActiveX Control Buffer
Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-16

Some vulnerabilities have been discovered in Trend Micro OfficeScan,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/24193/

 --

[SA24261] NewsBin Pro NBI Configuration File Processing Buffer
Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-02-22

Marsu Pilami has discovered a vulnerability in NewsBin Pro, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24261/

 --

[SA24237] News File Grabber NZB File Processing Code Execution

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-02-20

Marsu Pilami has discovered a vulnerability in News File Grabber, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/24237/

 --

[SA24209] Turuncu Portal "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-02-19

chernobiLe has discovered a vulnerability in Turuncu Portal, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/24209/

 --

[SA24208] Online Web Building "art_id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-02-21

xoron has reported a vulnerability in Online Web Building, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/24208/

 --

[SA24243] Trend Micro ServerProtect Buffer Overflow Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-02-21

TippingPoint Security Research Team has reported some vulnerabilities
in Trend Micro ServerProtect, which can be exploited by malicious
people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24243/

 --

[SA24258] Cisco Secure Services Client Multiple Vulnerabilities

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information, Privilege escalation
Released:    2007-02-22

Some vulnerabilities have been reported in Cisco Secure Services
Client, which can be exploited by malicious, local users to gain
knowledge of sensitive information or gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/24258/


UNIX/Linux:--

[SA24219] Ultimate Fun Book "gbpfad" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-21

kezzap66345 has discovered a vulnerability in Ultimate Fun Book, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/24219/

 --

[SA24218] Red Hat update for koffice

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-21

Red Hat has issued an update for koffice. This fixes a vulnerability,
which can be exploited by malicious people to potentially compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/24218/

 --

[SA24202] Gentoo update for sun-jdk and sun-jre-bin

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-19

Gentoo has issued an update for sun-jdk and sun-jre-bin. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24202/

 --

[SA24198] Mac OS X Security Update Fixes Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Privilege escalation, DoS, System access
Released:    2007-02-16

Apple has issued a security update for Mac OS X, which fixes multiple
vulnerabilities.

Full Advisory:
http://secunia.com/advisories/24198/

 --

[SA24189] Gentoo update for emul-linux-x86-java

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Privilege escalation, System access
Released:    2007-02-19

Gentoo has issued an update for emul-linux-x86-java. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24189/

 --

[SA24182] VS-Gstebuch "gb_pfad" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-19

ajann has discovered a vulnerability in VS-Gstebuch, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24182/

 --

[SA24271] Ubuntu update for ekiga and gnomemeeting

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-02-22

Ubuntu has issued an update for ekiga and gnomemeeting. This fixes a
vulnerability, which can be exploited by malicious people to
potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24271/

 --

[SA24250] Red Hat update for spamassassin

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-02-22

Red Hat has issued an update for spamassassin. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24250/

 --

[SA24248] Red Hat update for php

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information, DoS,
System access
Released:    2007-02-21

Red Hat has issued an update for php. This fixes some vulnerabilities
and a weakness, which can be exploited by malicious people to disclose
potentially sensitive information, bypass certain security
restrictions, cause a DoS (Denial of Service) and potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24248/

 --

[SA24241] Fedora update for php

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information, DoS,
System access
Released:    2007-02-22

Fedora has issued an update for php. This fixes some vulnerabilities,
which can be exploited by malicious people to disclose potentially
sensitive information, bypass certain security restrictions, cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/24241/

 --

[SA24229] Mandriva update for ekiga

Critical:    Moderately critical
Where:       From remote
Impact:      System access, DoS
Released:    2007-02-22

Mandriva has issued an update for ekiga. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/24229/

 --

[SA24228] Fedora update for ekiga

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-02-22

Fedora has issued an update for ekiga. This fixes a vulnerability,
which can be exploited by malicious people to potentially compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/24228/

 --

[SA24224] PHP-Nuke HTTP "referer" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-02-21

Maciej "krasza" Kukla has discovered a vulnerability in PHP-Nuke, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/24224/

 --

[SA24217] Ubuntu update for php

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, DoS, System access
Released:    2007-02-22

Ubuntu has issued an update for php. This fixes some vulnerabilities
and a weakness, which can be exploited by malicious people to disclose
potentially sensitive information, cause a DoS (Denial of Service) and
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24217/

 --

[SA24200] Fedora update for spamassassin

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-02-16

Fedora has issued an update for spamassassin. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24200/

 --

[SA24197] SpamAssassin Long URI Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-02-16

A vulnerability has been reported in SpamAssassin, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24197/

 --

[SA24196] Ubuntu update for imagemagick

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-02-16

Ubuntu has issued an update for imagemagick. This fixes a
vulnerability, which can be exploited by malicious people to
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24196/

 --

[SA24195] Red Hat update for php

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information, DoS,
System access
Released:    2007-02-20

Red Hat has issued an update for php. This fixes some vulnerabilities
and a weakness, which can be exploited by malicious people to disclose
potentially sensitive information, bypass certain security
restrictions, cause a DoS (Denial of Service) and potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24195/

 --

[SA24194] Ekiga Format String Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-02-19

A vulnerability has been reported in Ekiga, which potentially can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24194/

 --

[SA24192] Mandriva update for clamav

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-02-20

Mandriva has issued an update for clamav. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24192/

 --

[SA24186] Red Hat update for ImageMagick

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-02-16

Red Hat has issued an update for ImageMagick. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/24186/

 --

[SA24185] Red Hat update for gnomemeeting

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-02-20

Red Hat has issued an update for gnomemeeting. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24185/

 --

[SA24184] Gentoo update for fail2ban

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-02-16

Gentoo has issued an update for fail2ban. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/24184/

 --

[SA24264] Trend Micro ServerProtect for Linux Web Interface
Authentication Bypass

Critical:    Moderately critical
Where:       From local network
Impact:      Security Bypass
Released:    2007-02-22

A vulnerability has been reported in Trend Micro ServerProtect for
Linux, which can be exploited by malicious people to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/24264/

 --

[SA24244] Ubuntu update for moinmoin

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-02-21

Ubuntu has issued an update for moinmoin. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/24244/

 --

[SA24206] Avaya Products Kernel Multiple Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information, Privilege escalation,
DoS
Released:    2007-02-19

Avaya has acknowledged some vulnerabilities in various Avaya products,
which can be exploited by malicious, local users to disclose
potentially sensitive information, gain escalated privileges, or cause
a DoS (Denial of Service), and by malicious people to cause a DoS.

Full Advisory:
http://secunia.com/advisories/24206/

 --

[SA24204] SUSE update for poppler

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-02-20

SUSE has issued an update for poppler. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/24204/

 --

[SA24203] Gentoo update for bind

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-02-19

Gentoo has issued an update for bind. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/24203/

 --

[SA24188] Red Hat update for samba

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-02-16

Red Hat has issued an update for samba. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/24188/

 --

[SA24247] Avaya CMS xfs / X Render and DBE Extensions Vulnerabilities

Critical:    Less critical
Where:       From local network
Impact:      Privilege escalation, System access
Released:    2007-02-22

Avaya has acknowledged some vulnerabilities in Avaya CMS (Call
Management System), which can be exploited by malicious, local users to
gain escalated privileges or by malicious users to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/24247/

 --

[SA24215] Linux Kernel NFSACL "ACCESS" Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-02-20

A vulnerability has been reported in the Linux Kernel, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24215/

 --

[SA24231] Nortel Net Direct Client for Linux Privilege Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-02-21

Jon Hart has reported a vulnerability in Net Direct Client for Linux,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/24231/

 --

[SA24226] Mandriva update for gnucash

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-02-22

Mandriva has issued an update for gnucash. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/24226/

 --

[SA24225] GnuCash Insecure Temporary Files

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-02-19

A vulnerability has been reported in GnuCash, which can be exploited by
malicious, local users to perform certain actions with escalated
privileges.

Full Advisory:
http://secunia.com/advisories/24225/

 --

[SA24213] IBM DB2 DB2DIAG.LOG Insecure File Creation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-02-19

A vulnerability has been reported in IBM DB2, which can be exploited by
malicious, local users to perform certain actions with escalated
privileges.

Full Advisory:
http://secunia.com/advisories/24213/

 --

[SA24210] Avaya Products XFree86 "DBE" and "Render" Extensions
Vulnerabilities

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-02-21

Avaya has acknowledged some vulnerabilities in various Avaya products,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/24210/

 --

[SA24259] Mandriva update for kernel

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-02-22

Mandriva has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24259/


Other:--

[SA24240] Nortel Threat Protection System DCE/RPC Preprocessor Buffer
Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-21

A vulnerability has been reported in Nortel Threat Protection System
products, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/24240/

 --

[SA24239] Nortel Threat Protection System DCE/RPC Preprocessor Buffer
Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-21

A vulnerability has been reported in Nortel Threat Protection System
products, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/24239/

 --

[SA24235] Sourcefire Intrusion Sensor DCE/RPC Preprocessor Buffer
Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-20

Neel Mehta has reported a vulnerability in Sourcefire Intrusion Sensor,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/24235/

 --

[SA24262] Cisco Unified IP Conference Station / IP Phone Default
Accounts

Critical:    Moderately critical
Where:       From local network
Impact:      Security Bypass
Released:    2007-02-22

Some security issues have been reported in Cisco Unified IP Conference
Station and IP Phones, which can be exploited by malicious people to
access a vulnerable device.

Full Advisory:
http://secunia.com/advisories/24262/


Cross Platform:--

[SA24230] phpMyFAQ Unspecified File Upload Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-19

A vulnerability has been reported in phpMyFAQ, which can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24230/

 --

[SA24220] VS-News-System "newsordner" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-19

Some vulnerabilities have been reported in VS-News-System, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24220/

 --

[SA24214] Htaccess Passwort Generator "ht_pfad" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-19

kezzap66345 has discovered a vulnerability in Htaccess Passwort
Generator, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/24214/

 --

[SA24212] Interspire SendStudio "ROOTDIR" File Inclusion
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-21

M.Hasran Addahroni has reported two vulnerabilities in Interspire
SendStudio, which can be exploited by malicious people to compromise
vulnerable systems.

Full Advisory:
http://secunia.com/advisories/24212/

 --

[SA24190] Snort DCE/RPC Preprocessor Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-20

Neel Mehta has reported a vulnerability in Snort, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24190/

 --

[SA24260] deV!L'z Clanportal Local File Disclosure Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-02-22

A vulnerability has been reported in deV!L'z Clanportal, which can be
exploited by malicious people to disclose potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/24260/

 --

[SA24242] phpTrafficA "file" and "lang" Local File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-02-22

Hamid Ebadi has discovered some vulnerabilities in phpTrafficA, which
can be exploited by malicious people to disclose potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/24242/

 --

[SA24191] webSPELL "showonly" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-02-19

DNX has discovered a vulnerability in webSPELL, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/24191/

 --

[SA24187] ClamAV MIME Header Handling and CAB File Processing
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-02-16

Two vulnerabilities have been reported in ClamAV, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24187/

 --

[SA24222] MyCalendar Multiple Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-02-21

sn0oPy has reported some vulnerabilities in AbleDesign MyCalendar,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/24222/

 --

[SA24211] MediaWiki AJAX UTF-7 Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-02-21

Moshe BA has reported a vulnerability in MediaWiki, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/24211/

 --

[SA24181] libevent DNS Response Denial of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-02-19

Jon Oberheide has reported a vulnerability in libevent, which can be
exploited by malicious people to cause a DoS (Denial of Service) of
applications using the library.

Full Advisory:
http://secunia.com/advisories/24181/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


______________________________________
Subscribe to the InfoSec News RSS Feed
http://www.infosecnews.org/isn.rss



This archive was generated by hypermail 2.1.3 : Fri Feb 23 2007 - 01:33:48 PST