======================================================================== The Secunia Weekly Advisory Summary 2007-03-29 - 2007-04-05 This week: 85 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: Should you be interested in a career within Secunia, the current job openings are available right now: Security Sales Engineer: http://corporate.secunia.com/about_secunia/54/ German Key Account Manager: http://corporate.secunia.com/about_secunia/55/ International Account Manager - Enterprise Sales: http://corporate.secunia.com/about_secunia/52/ International Sales Manager - IT Security Partner: http://corporate.secunia.com/about_secunia/51/ Danish: Disassembling og Reversing http://secunia.com/Disassembling_og_Reversing/ Linux Security Specialist: http://secunia.com/Linux_Security_Specialist/ ======================================================================== 2) This Week in Brief: The ANI Cursor Vulnerability discovered in Microsoft Windows can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the handling of animated cursors and can be exploited to cause a stack-based buffer overflow via a specially crafted animated cursor file. Successful exploitation allows execution of arbitrary code when a user e.g. visits a malicious website using Internet Explorer or opens a malicious e-mail message. The vulnerability is being actively exploited. Microsoft has issued an extraordinary patch. Use the Secunia Software Inspector to see if you are vulnerable: http://secunia.com/software_inspector/ For more information: http://secunia.com/SA24659 -- VIRUS ALERTS: During the past week Secunia collected 262 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA24659] Microsoft Windows Animated Cursor Buffer Overflow Vulnerability 2. [SA14921] Microsoft Windows Message Queuing Buffer Overflow Vulnerability 3. [SA24658] Linksys Products Information Disclosure Security Issue 4. [SA24703] Sun Solaris and Java Enterprise System Network Security Services Vulnerabilities 5. [SA24695] Advanced Login "root" File Inclusion Vulnerability 6. [SA24707] ManageEngine Firewall Analyzer Information Disclosure 7. [SA24678] mod_perl "path_info" Denial of Service Vulnerability 8. [SA24667] Windows Vista ATI Radeon Kernel Mode Driver Denial of Service 9. [SA18787] Internet Explorer Drag-and-Drop Vulnerability 10. [SA24676] Mandriva update for openoffice.org ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA24778] Kaspersky Products Multiple Vulnerabilities [SA24762] SolidWorks sldimdownload ActiveX Control "Run()" Insecure Method [SA24742] Yahoo! Messenger AudioConf ActiveX Control Buffer Overflow [SA24725] IrfanView Animated Cursor Handling Buffer Overflow [SA24714] America Online SuperBuddy ActiveX Control "LinkSBIcons()" Vulnerability [SA24711] Netscape Multiple Vulnerabilities [SA24692] HP Mercury Quality Center "SPIDERLib.Loader" ActiveX Control Buffer Overflow [SA24738] Metamod-P "safevoid_vsnprintf()" Denial of Service Vulnerability [SA24700] Winmail Server "sid" Directory Traversal Vulnerability [SA24764] Enterasys Networks NetSight Products TFTPD/BOOTPD Vulnerabilities [SA24693] Hitachi Products Unspecified SQL Injection Vulnerability [SA24730] HP Mercury Quality Center "RunQuery()" Insecure Method [SA24691] Minna De Office Access Restrictions Bypass UNIX/Linux: [SA24739] rpath update for ImageMagick [SA24737] SUSE Update for Multiple Packages [SA24721] ImageMagick DCM and XWD Buffer Overflows [SA24696] Kaqoo Auction Software Free Edition Multiple File Inclusion [SA24695] Advanced Login "root" File Inclusion Vulnerability [SA24798] Novell Kerberos KDC "krb5_klog_syslog()" Buffer Overflow [SA24788] VMware ESX Server Multiple Vulnerabilities [SA24785] Mandriva update for krb5 [SA24776] Mandriva update for freetype2 [SA24768] FreeType BDF Font Integer Overflow Vulnerability [SA24757] rPath updates for krb5 [SA24755] Sun SEAM Kerberized telnetd Daemon Arbitrary User Login [SA24753] Slackware update for ktorrent [SA24750] Red Hat update for krb5 [SA24740] Kerberos Multiple Vulnerabilities [SA24736] Debian update for krb5 [SA24735] Gentoo update for mit-krb5 [SA24734] SUSE update for gpg [SA24719] Gentoo update for asterisk [SA24706] Ubuntu update for krb5 [SA24716] Gentoo update for openpbs [SA24795] Lite-CMS "p" Local File Inclusion Vulnerability [SA24790] Xoops Rha7 Downloads Module "lid" SQL Injection [SA24781] Xoops WF-Snippets Module "c" SQL Injection [SA24761] Xoops PopnupBlog Module "postid" SQL Injection [SA24759] rPath update for qt-x11-free [SA24754] Slackware update for file [SA24749] Xoops Kshop Module "id" SQL Injection [SA24748] Xoops Camportail Module "camid" SQL Injection [SA24728] DirectAdmin Log Viewer Script Insertion Vulnerability [SA24726] Slackware update for qt [SA24723] Debian update for file [SA24713] Debian update for zope2.7 [SA24709] Xoops RM+Soft Gallery System Module "idcat" SQL Injection [SA24708] Gentoo update for zziplib [SA24705] Mandriva update for kdelibs [SA24699] Mandriva update for qt3 and qt4 [SA24694] Asterisk AEL Extensions Security Bypass [SA24777] Mandriva update for kernel [SA24720] Gentoo update for openafs [SA24791] OpenBSD update for X.Org [SA24783] rPath update for nas [SA24772] Mandriva update for tightvnc [SA24771] Red Hat update for XFree86 [SA24770] Ubuntu update for freetype, libxfont, xorg, and xorg-server [SA24765] Mandriva update for xorg-x11 [SA24758] XFree86 Multiple Vulnerabilities [SA24756] rPath update for freetype, xorg-x11, xorg-x11-fonts, xorg-x11-tools, and xorg-x11-xfs [SA24745] Red Hat update for xorg-x11 [SA24741] X.Org X11 Multiple Vulnerabilities [SA24744] Red Hat update for mysql Other: Cross Platform: [SA24773] AROUNDMe File Inclusion Vulnerabilities [SA24760] MySpeach "chat.php" File Inclusion Vulnerability [SA24743] Mozilla Firefox Firebug Extension "console.log()" Cross-Context Scripting [SA24729] Softerra Time-Assistant "inc_dir" / "lib_dir" File Inclusion Vulnerabilities [SA24715] MapLab "gszAppPath" File Inclusion Vulnerability [SA24703] Sun Solaris and Java Enterprise System Network Security Services Vulnerabilities [SA24701] BT-Sondage "repertoire_visiteur" File Inclusion [SA24733] TinyMUX "fun_ladd()" Buffer Overflow Vulnerability [SA24718] PHP-Fusion Expanded Calendar Module "m_month" SQL Injection [SA24704] ScriptMagix FAQ Builder "catid" SQL Injection [SA24702] Flyspray Unspecified Security Bypass and Information Disclose Vulnerabilities [SA24698] ScriptMagix Photo Rating "phid" SQL Injection [SA24697] PHP-Nuke Addressbook Module "module_name" Local File Inclusion [SA24746] HP OpenView Network Node Manager Unspecified Unauthorized Access [SA24722] SAP RFC Library Multiple Vulnerabilities [SA24717] IBM Tivoli Provisioning Manager for OS Deployment "multipart/form-data" Handling Multiple Vulnerabilities [SA24751] WordPress XMLRPC SQL Injection and Security Bypass [SA24732] Apache Tomcat Directory Traversal Security Issue [SA24727] Qt Overlong UTF-8 Sequence Cross-Site Scripting Vulnerability [SA24707] ManageEngine Firewall Analyzer Information Disclosure [SA24763] IBM Tivoli Business Service Manager Password Disclosure ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA24778] Kaspersky Products Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Privilege escalation, DoS, System access, Exposure of sensitive information, Exposure of system information Released: 2007-04-05 Some vulnerabilities have been reported in various Kaspersky products, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to gain knowledge of sensitive information, cause a DoS (Denial of Service), and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/24778/ -- [SA24762] SolidWorks sldimdownload ActiveX Control "Run()" Insecure Method Critical: Highly critical Where: From remote Impact: System access Released: 2007-04-04 Will Dormann has reported a vulnerability in SolidWorks sldimdownload ActiveX control, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/24762/ -- [SA24742] Yahoo! Messenger AudioConf ActiveX Control Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2007-04-04 A vulnerability has been reported in Yahoo! Messenger, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/24742/ -- [SA24725] IrfanView Animated Cursor Handling Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2007-04-03 Marsu Pilami has discovered a vulnerability in IrfanView, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/24725/ -- [SA24714] America Online SuperBuddy ActiveX Control "LinkSBIcons()" Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-04-02 TippingPoint Security Research Team has discovered a vulnerability in America Online, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/24714/ -- [SA24711] Netscape Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Spoofing, DoS, System access Released: 2007-04-03 Multiple vulnerabilities have been reported in Netscape, which can be exploited by malicious people to conduct man-in-the-middle, spoofing, and cross-site scripting attacks, and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/24711/ -- [SA24692] HP Mercury Quality Center "SPIDERLib.Loader" ActiveX Control Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2007-04-02 A vulnerability has been reported in HP Mercury Quality Center, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/24692/ -- [SA24738] Metamod-P "safevoid_vsnprintf()" Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-04-04 A vulnerability has been reported in Metamod-P, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24738/ -- [SA24700] Winmail Server "sid" Directory Traversal Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2007-04-03 rgod has reported a vulnerability in Winmail, which potentially can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/24700/ -- [SA24764] Enterasys Networks NetSight Products TFTPD/BOOTPD Vulnerabilities Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2007-04-05 Some vulnerabilities have been reported in various NetSight products, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24764/ -- [SA24693] Hitachi Products Unspecified SQL Injection Vulnerability Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2007-03-30 A vulnerability has been reported in Hitachi products, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/24693/ -- [SA24730] HP Mercury Quality Center "RunQuery()" Insecure Method Critical: Less critical Where: From local network Impact: Manipulation of data Released: 2007-04-04 Isma Khan has reported a vulnerability in HP Mercury Quality Center, which can be exploited by malicious users to manipulate certain data. Full Advisory: http://secunia.com/advisories/24730/ -- [SA24691] Minna De Office Access Restrictions Bypass Critical: Less critical Where: From local network Impact: Security Bypass Released: 2007-03-29 A vulnerability has been reported in Minna De Office, which can be exploited by malicious users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/24691/ UNIX/Linux:-- [SA24739] rpath update for ImageMagick Critical: Highly critical Where: From remote Impact: System access Released: 2007-04-04 rPath has issued an update for ImageMagick. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24739/ -- [SA24737] SUSE Update for Multiple Packages Critical: Highly critical Where: From remote Impact: Security Bypass, DoS, System access Released: 2007-04-02 SUSE has issued updates for multiple packages. These fix some vulnerabilities and a security issue, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24737/ -- [SA24721] ImageMagick DCM and XWD Buffer Overflows Critical: Highly critical Where: From remote Impact: System access Released: 2007-04-03 Some vulnerabilities have been reported in ImageMagick, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24721/ -- [SA24696] Kaqoo Auction Software Free Edition Multiple File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2007-03-30 ThE dE@Th has discovered several vulnerabilities in Kaqoo Auction Software Free Edition, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24696/ -- [SA24695] Advanced Login "root" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-03-30 Zeni Susanto has discovered a vulnerability in Advanced Login, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24695/ -- [SA24798] Novell Kerberos KDC "krb5_klog_syslog()" Buffer Overflow Critical: Moderately critical Where: From remote Impact: System access Released: 2007-04-05 Novell has acknowledged a vulnerability in Novell Kerberos KDC, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24798/ -- [SA24788] VMware ESX Server Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information, Privilege escalation, DoS, System access Released: 2007-04-05 VMware has acknowledged some vulnerabilities in VMware ESX Server, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges, and malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24788/ -- [SA24785] Mandriva update for krb5 Critical: Moderately critical Where: From remote Impact: Security Bypass, DoS, System access Released: 2007-04-05 Mandriva has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious users to cause a DoS or compromise a vulnerable system and by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/24785/ -- [SA24776] Mandriva update for freetype2 Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-04-05 Mandriva has issued an update for freetype2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/24776/ -- [SA24768] FreeType BDF Font Integer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-04-05 A vulnerability has been reported in FreeType, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/24768/ -- [SA24757] rPath updates for krb5 Critical: Moderately critical Where: From remote Impact: Security Bypass, DoS, System access Released: 2007-04-04 rPath has issued updates for krb5 packages. These fix some vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system and by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/24757/ -- [SA24755] Sun SEAM Kerberized telnetd Daemon Arbitrary User Login Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2007-04-04 Sun has acknowledged a vulnerability in SEAM, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/24755/ -- [SA24753] Slackware update for ktorrent Critical: Moderately critical Where: From remote Impact: Manipulation of data, System access Released: 2007-04-04 Slackware has issued an update for ktorrent. This fixes some vulnerabilities, which can be exploited by malicious people to overwrite arbitrary files on a user's system or to potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/24753/ -- [SA24750] Red Hat update for krb5 Critical: Moderately critical Where: From remote Impact: Security Bypass, DoS, System access Released: 2007-04-04 Red Hat has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and by malicious users to cause a DoS (Denial of Service) or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24750/ -- [SA24740] Kerberos Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, DoS, System access Released: 2007-04-04 Some vulnerabilities have been reported in Kerberos, which can be exploited by malicious users to cause a DoS or compromise a vulnerable system and by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/24740/ -- [SA24736] Debian update for krb5 Critical: Moderately critical Where: From remote Impact: Security Bypass, DoS, System access Released: 2007-04-04 Debian has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and by malicious users to cause a DoS (Denial of Service) or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24736/ -- [SA24735] Gentoo update for mit-krb5 Critical: Moderately critical Where: From remote Impact: Security Bypass, DoS, System access Released: 2007-04-04 Gentoo has issued an update for mit-krb5. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and by malicious users to cause a DoS (Denial of Service) or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24735/ -- [SA24734] SUSE update for gpg Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2007-04-02 SUSE has issued an update for gpg. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions when applications use GnuPG in an insecure manner. Full Advisory: http://secunia.com/advisories/24734/ -- [SA24719] Gentoo update for asterisk Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-04-03 Gentoo has issued an update for asterisk. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24719/ -- [SA24706] Ubuntu update for krb5 Critical: Moderately critical Where: From remote Impact: Security Bypass, DoS, System access Released: 2007-04-04 Ubuntu has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and by malicious users to cause a DoS (Denial of Service) or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24706/ -- [SA24716] Gentoo update for openpbs Critical: Moderately critical Where: From local network Impact: System access Released: 2007-04-04 Gentoo has issued an update for openpbs. This fixes some vulnerabilities, which can be exploited by malicious, local users and malicious people to potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24716/ -- [SA24795] Lite-CMS "p" Local File Inclusion Vulnerability Critical: Less critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-04-05 A vulnerability has been reported in Lite-CMS, which can be exploited by malicious users to disclose sensitive information. Full Advisory: http://secunia.com/advisories/24795/ -- [SA24790] Xoops Rha7 Downloads Module "lid" SQL Injection Critical: Less critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-04-05 ajann has discovered a vulnerability in the Rha7 Downloads module for Xoops, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/24790/ -- [SA24781] Xoops WF-Snippets Module "c" SQL Injection Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2007-04-05 ajann has discovered a vulnerability in the WF-Snippets module for Xoops, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/24781/ -- [SA24761] Xoops PopnupBlog Module "postid" SQL Injection Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2007-04-04 ajann has discovered a vulnerability in the PopnupBlog module for Xoops, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/24761/ -- [SA24759] rPath update for qt-x11-free Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-04-04 rPath has issued an update for qt-x11-free. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/24759/ -- [SA24754] Slackware update for file Critical: Less critical Where: From remote Impact: DoS, System access Released: 2007-04-04 Slackware has issued an update for file. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24754/ -- [SA24749] Xoops Kshop Module "id" SQL Injection Critical: Less critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-04-03 ajann has discovered a vulnerability in the Kshop module for Xoops, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/24749/ -- [SA24748] Xoops Camportail Module "camid" SQL Injection Critical: Less critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-04-03 ajann has discovered a vulnerability in the Camportail module for Xoops, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/24748/ -- [SA24728] DirectAdmin Log Viewer Script Insertion Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-04-03 Kanedaaa has reported a vulnerability in DirectAdmin, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/24728/ -- [SA24726] Slackware update for qt Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-04-04 Slackware has issued an update for qt. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/24726/ -- [SA24723] Debian update for file Critical: Less critical Where: From remote Impact: System access, DoS Released: 2007-04-03 Debian has issued an update for file. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24723/ -- [SA24713] Debian update for zope2.7 Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-04-03 Debian has issued an update for zope2.7. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site request forgery attacks. Full Advisory: http://secunia.com/advisories/24713/ -- [SA24709] Xoops RM+Soft Gallery System Module "idcat" SQL Injection Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2007-04-02 ajann has discovered a vulnerability in the RM+Soft Gallery System module for Xoops, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/24709/ -- [SA24708] Gentoo update for zziplib Critical: Less critical Where: From remote Impact: Privilege escalation, System access Released: 2007-04-04 Gentoo has issued an update for zziplib. This fixes a vulnerability, which can be exploited by malicious people to gain escalated privileges or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24708/ -- [SA24705] Mandriva update for kdelibs Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-04-04 Mandriva has issued an update for kdelibs. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct cross-site scripting attacks in applications using the library. Full Advisory: http://secunia.com/advisories/24705/ -- [SA24699] Mandriva update for qt3 and qt4 Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-04-04 Mandriva has issued an update for qt3 and qt4. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/24699/ -- [SA24694] Asterisk AEL Extensions Security Bypass Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-04-03 A security issue has been reported in Asterisk, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/24694/ -- [SA24777] Mandriva update for kernel Critical: Less critical Where: From local network Impact: Privilege escalation, DoS Released: 2007-04-05 Mandriva has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and gain escalated privileges, and by malicious people to cause a DoS. Full Advisory: http://secunia.com/advisories/24777/ -- [SA24720] Gentoo update for openafs Critical: Less critical Where: From local network Impact: Privilege escalation Released: 2007-04-04 Gentoo has issued an update for openafs. This fixes a vulnerability, which can be exploited by malicious users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/24720/ -- [SA24791] OpenBSD update for X.Org Critical: Less critical Where: Local system Impact: DoS, Privilege escalation, Exposure of sensitive information Released: 2007-04-05 OpenBSD has issued an update for X.Org. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose sensitive information, cause a DoS (Denial of Service), and gain escalated privileges. Full Advisory: http://secunia.com/advisories/24791/ -- [SA24783] rPath update for nas Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-04-05 rPath has issued an update for nas. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/24783/ -- [SA24772] Mandriva update for tightvnc Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-04-05 Mandriva has issued an update for tightvnc. This fixes some vulnerabilities, which potentially can be exploited by malicious users gain escalated privileges. Full Advisory: http://secunia.com/advisories/24772/ -- [SA24771] Red Hat update for XFree86 Critical: Less critical Where: Local system Impact: Exposure of sensitive information, Privilege escalation, DoS Released: 2007-04-04 Red Hat has issued an update for XFree86. This fixes some vulnerabilities, which potentially can be exploited by malicious, local users to disclose potentially sensitive information, cause a DoS (Denial of Service), and gain escalated privileges. Full Advisory: http://secunia.com/advisories/24771/ -- [SA24770] Ubuntu update for freetype, libxfont, xorg, and xorg-server Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-04-04 Ubuntu has issued an update for freetype, libxfont, xorg, and xorg-server. This fixes some vulnerabilities, which potentially can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/24770/ -- [SA24765] Mandriva update for xorg-x11 Critical: Less critical Where: Local system Impact: Exposure of sensitive information, Privilege escalation, DoS Released: 2007-04-05 Mandriva has issued an update for xorg-x11. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose sensitive information, cause a DoS (Denial of Service), and gain escalated privileges. Full Advisory: http://secunia.com/advisories/24765/ -- [SA24758] XFree86 Multiple Vulnerabilities Critical: Less critical Where: Local system Impact: Exposure of sensitive information, Privilege escalation, DoS Released: 2007-04-04 Some vulnerabilities have been reported in XFree86, which can be exploited by malicious, local users to disclose sensitive information, cause a DoS (Denial of Service), and gain escalated privileges. Full Advisory: http://secunia.com/advisories/24758/ -- [SA24756] rPath update for freetype, xorg-x11, xorg-x11-fonts, xorg-x11-tools, and xorg-x11-xfs Critical: Less critical Where: Local system Impact: Exposure of sensitive information, Privilege escalation, DoS Released: 2007-04-04 rPath has issued an update for freetype, xorg-x11, xorg-x11-fonts, xorg-x11-tools, and xorg-x11-xfs. This fixes some vulnerabilities, which potentially can be exploited by malicious, local users to disclose potentially sensitive information, cause a DoS (Denial of Service), and gain escalated privileges. Full Advisory: http://secunia.com/advisories/24756/ -- [SA24745] Red Hat update for xorg-x11 Critical: Less critical Where: Local system Impact: Exposure of sensitive information, Privilege escalation, DoS Released: 2007-04-04 Red Hat has issued an update for xorg-x11. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose sensitive information, cause a DoS (Denial of Service), and gain escalated privileges. Full Advisory: http://secunia.com/advisories/24745/ -- [SA24741] X.Org X11 Multiple Vulnerabilities Critical: Less critical Where: Local system Impact: Exposure of sensitive information, Privilege escalation, DoS Released: 2007-04-04 Some vulnerabilities have been reported in X.Org X11, which potentially can be exploited by malicious, local users to disclose sensitive information, cause a DoS (Denial of Service), and gain escalated privileges. Full Advisory: http://secunia.com/advisories/24741/ -- [SA24744] Red Hat update for mysql Critical: Not critical Where: From local network Impact: Security Bypass Released: 2007-04-04 Red Hat has issued an update for MySQL. This fixes a vulnerability, which can be exploited by malicious users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/24744/ Other: Cross Platform:-- [SA24773] AROUNDMe File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2007-04-05 kezzap66345 has discovered some vulnerabilities in AROUNDMe, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24773/ -- [SA24760] MySpeach "chat.php" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2007-04-04 Xst3nZ has discovered a vulnerability in MySpeach, which can be exploited by malicious people to compromise a vulnerable system or to disclose sensitive information. Full Advisory: http://secunia.com/advisories/24760/ -- [SA24743] Mozilla Firefox Firebug Extension "console.log()" Cross-Context Scripting Critical: Highly critical Where: From remote Impact: Cross Site Scripting, System access Released: 2007-04-05 pdp has reported a vulnerability in the Firebug extension for Mozilla Firefox, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24743/ -- [SA24729] Softerra Time-Assistant "inc_dir" / "lib_dir" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2007-04-02 M.Hasran Addahroni has reported some vulnerabilities in Time-Assistant, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24729/ -- [SA24715] MapLab "gszAppPath" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-04-02 Mufti Rizal has discovered a vulnerability in MapLab, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24715/ -- [SA24703] Sun Solaris and Java Enterprise System Network Security Services Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2007-03-30 Sun has acknowledged some vulnerabilities in Sun Solaris and Sun Java Enterprise System, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24703/ -- [SA24701] BT-Sondage "repertoire_visiteur" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2007-04-02 Crackers_Child has discovered a vulnerability in BT-Sondage, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24701/ -- [SA24733] TinyMUX "fun_ladd()" Buffer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-04-03 A vulnerability has been reported in TinyMUX, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24733/ -- [SA24718] PHP-Fusion Expanded Calendar Module "m_month" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-04-02 UniquE-Key has discovered a vulnerability in the Expanded Calendar module for PHP-Fusion, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/24718/ -- [SA24704] ScriptMagix FAQ Builder "catid" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-04-04 ajann has reported a vulnerability in ScriptMagix FAQ Builder, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/24704/ -- [SA24702] Flyspray Unspecified Security Bypass and Information Disclose Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of sensitive information Released: 2007-03-30 Some vulnerabilities have been reported in Flyspray, which can be exploited by malicious people to bypass certain security restrictions and to disclose sensitive information. Full Advisory: http://secunia.com/advisories/24702/ -- [SA24698] ScriptMagix Photo Rating "phid" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-04-04 ajann has reported a vulnerability in ScriptMagix Photo Rating, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/24698/ -- [SA24697] PHP-Nuke Addressbook Module "module_name" Local File Inclusion Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-04-02 bd0rk has discovered a vulnerability in the Addressbook module for PHP-Nuke, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/24697/ -- [SA24746] HP OpenView Network Node Manager Unspecified Unauthorized Access Critical: Moderately critical Where: From local network Impact: Security Bypass Released: 2007-04-03 A vulnerability has been reported in HP OpenView Network Node Manager (OV NNM), which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/24746/ -- [SA24722] SAP RFC Library Multiple Vulnerabilities Critical: Moderately critical Where: From local network Impact: Exposure of sensitive information, DoS, System access Released: 2007-04-05 Mariano Nuez Di Croce has reported some vulnerabilities in SAP RFC Library, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24722/ -- [SA24717] IBM Tivoli Provisioning Manager for OS Deployment "multipart/form-data" Handling Multiple Vulnerabilities Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2007-04-03 Some vulnerabilities have been reported in IBM Tivoli Provisioning Manager for OS Deployment, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24717/ -- [SA24751] WordPress XMLRPC SQL Injection and Security Bypass Critical: Less critical Where: From remote Impact: Security Bypass, Manipulation of data, Exposure of sensitive information Released: 2007-04-04 Sumit Siddharth has discovered two vulnerabilities in WordPress, which can be exploited by malicious users to conduct SQL injection attacks or to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/24751/ -- [SA24732] Apache Tomcat Directory Traversal Security Issue Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-04-02 D. Matscheko has reported a security issue in Apache Tomcat, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/24732/ -- [SA24727] Qt Overlong UTF-8 Sequence Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-04-03 Andreas Nolden has reported a vulnerability in Qt, which potentially can be exploited to conduct cross-site scripting attacks in applications using the Qt libraries. Full Advisory: http://secunia.com/advisories/24727/ -- [SA24707] ManageEngine Firewall Analyzer Information Disclosure Critical: Less critical Where: From remote Impact: Exposure of sensitive information Released: 2007-03-30 yearsilent has reported a security issue in ManageEngine Firewall Analyzer, which can be exploited by malicious users to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/24707/ -- [SA24763] IBM Tivoli Business Service Manager Password Disclosure Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2007-04-04 A security issue has been reported in IBM Tivoli Business Service Manager, which can be exploited by malicious, local users to disclose sensitive information. Full Advisory: http://secunia.com/advisories/24763/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 __________________________ Subscribe to InfoSec News http://www.infosecnews.org
This archive was generated by hypermail 2.1.3 : Fri Apr 06 2007 - 00:36:48 PDT