[ISN] Secunia Weekly Summary - Issue: 2007-14

From: InfoSec News (alerts@private)
Date: Fri Apr 06 2007 - 00:26:03 PDT


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2007-03-29 - 2007-04-05                        

                       This week: 85 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Should you be interested in a career within Secunia, the current job
openings are available right now:

Security Sales Engineer:
http://corporate.secunia.com/about_secunia/54/

German Key Account Manager:
http://corporate.secunia.com/about_secunia/55/

International Account Manager - Enterprise Sales:
http://corporate.secunia.com/about_secunia/52/

International Sales Manager - IT Security Partner:
http://corporate.secunia.com/about_secunia/51/

Danish: Disassembling og Reversing
http://secunia.com/Disassembling_og_Reversing/

Linux Security Specialist:
http://secunia.com/Linux_Security_Specialist/

========================================================================
2) This Week in Brief:

The ANI Cursor Vulnerability discovered in Microsoft Windows can be
exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error within the handling
of animated cursors and can be exploited to cause a stack-based buffer
overflow via a specially crafted animated cursor file.

Successful exploitation allows execution of arbitrary code when a user
e.g. visits a malicious website using Internet Explorer or opens a
malicious e-mail message.

The vulnerability is being actively exploited.

Microsoft has issued an extraordinary patch. Use the Secunia Software
Inspector to see if you are vulnerable:
http://secunia.com/software_inspector/

For more information:
http://secunia.com/SA24659

 --

VIRUS ALERTS:

During the past week Secunia collected 262 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA24659] Microsoft Windows Animated Cursor Buffer Overflow
              Vulnerability
2.  [SA14921] Microsoft Windows Message Queuing Buffer Overflow
              Vulnerability
3.  [SA24658] Linksys Products Information Disclosure Security Issue
4.  [SA24703] Sun Solaris and Java Enterprise System Network Security
              Services Vulnerabilities
5.  [SA24695] Advanced Login "root" File Inclusion Vulnerability
6.  [SA24707] ManageEngine Firewall Analyzer Information Disclosure
7.  [SA24678] mod_perl "path_info" Denial of Service Vulnerability
8.  [SA24667] Windows Vista ATI Radeon Kernel Mode Driver Denial of
              Service
9.  [SA18787] Internet Explorer Drag-and-Drop Vulnerability
10. [SA24676] Mandriva update for openoffice.org

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA24778] Kaspersky Products Multiple Vulnerabilities
[SA24762] SolidWorks sldimdownload ActiveX Control "Run()" Insecure
Method
[SA24742] Yahoo! Messenger AudioConf ActiveX Control Buffer Overflow
[SA24725] IrfanView Animated Cursor Handling Buffer Overflow
[SA24714] America Online SuperBuddy ActiveX Control "LinkSBIcons()"
Vulnerability
[SA24711] Netscape Multiple Vulnerabilities
[SA24692] HP Mercury Quality Center "SPIDERLib.Loader" ActiveX Control
Buffer Overflow
[SA24738] Metamod-P "safevoid_vsnprintf()" Denial of Service
Vulnerability
[SA24700] Winmail Server "sid" Directory Traversal Vulnerability
[SA24764] Enterasys Networks NetSight Products TFTPD/BOOTPD
Vulnerabilities
[SA24693] Hitachi Products Unspecified SQL Injection Vulnerability
[SA24730] HP Mercury Quality Center "RunQuery()" Insecure Method
[SA24691] Minna De Office Access Restrictions Bypass

UNIX/Linux:
[SA24739] rpath update for ImageMagick
[SA24737] SUSE Update for Multiple Packages
[SA24721] ImageMagick DCM and XWD Buffer Overflows
[SA24696] Kaqoo Auction Software Free Edition Multiple File Inclusion
[SA24695] Advanced Login "root" File Inclusion Vulnerability
[SA24798] Novell Kerberos KDC "krb5_klog_syslog()" Buffer Overflow
[SA24788] VMware ESX Server Multiple Vulnerabilities
[SA24785] Mandriva update for krb5
[SA24776] Mandriva update for freetype2
[SA24768] FreeType BDF Font Integer Overflow Vulnerability
[SA24757] rPath updates for krb5
[SA24755] Sun SEAM Kerberized telnetd Daemon Arbitrary User Login
[SA24753] Slackware update for ktorrent
[SA24750] Red Hat update for krb5
[SA24740] Kerberos Multiple Vulnerabilities
[SA24736] Debian update for krb5
[SA24735] Gentoo update for mit-krb5
[SA24734] SUSE update for gpg
[SA24719] Gentoo update for asterisk
[SA24706] Ubuntu update for krb5
[SA24716] Gentoo update for openpbs
[SA24795] Lite-CMS "p" Local File Inclusion Vulnerability
[SA24790] Xoops Rha7 Downloads Module "lid" SQL Injection
[SA24781] Xoops WF-Snippets Module "c" SQL Injection
[SA24761] Xoops PopnupBlog Module "postid" SQL Injection
[SA24759] rPath update for qt-x11-free
[SA24754] Slackware update for file
[SA24749] Xoops Kshop Module "id" SQL Injection
[SA24748] Xoops Camportail Module "camid" SQL Injection
[SA24728] DirectAdmin Log Viewer Script Insertion Vulnerability
[SA24726] Slackware update for qt
[SA24723] Debian update for file
[SA24713] Debian update for zope2.7
[SA24709] Xoops RM+Soft Gallery System Module "idcat" SQL Injection
[SA24708] Gentoo update for zziplib
[SA24705] Mandriva update for kdelibs
[SA24699] Mandriva update for qt3 and qt4
[SA24694] Asterisk AEL Extensions Security Bypass
[SA24777] Mandriva update for kernel
[SA24720] Gentoo update for openafs
[SA24791] OpenBSD update for X.Org
[SA24783] rPath update for nas
[SA24772] Mandriva update for tightvnc
[SA24771] Red Hat update for XFree86
[SA24770] Ubuntu update for freetype, libxfont, xorg, and xorg-server
[SA24765] Mandriva update for xorg-x11
[SA24758] XFree86 Multiple Vulnerabilities
[SA24756] rPath update for freetype, xorg-x11, xorg-x11-fonts,
xorg-x11-tools, and xorg-x11-xfs
[SA24745] Red Hat update for xorg-x11
[SA24741] X.Org X11 Multiple Vulnerabilities
[SA24744] Red Hat update for mysql

Other:


Cross Platform:
[SA24773] AROUNDMe File Inclusion Vulnerabilities
[SA24760] MySpeach "chat.php" File Inclusion Vulnerability
[SA24743] Mozilla Firefox Firebug Extension "console.log()"
Cross-Context Scripting
[SA24729] Softerra Time-Assistant "inc_dir" / "lib_dir" File Inclusion
Vulnerabilities
[SA24715] MapLab "gszAppPath" File Inclusion Vulnerability
[SA24703] Sun Solaris and Java Enterprise System Network Security
Services Vulnerabilities
[SA24701] BT-Sondage "repertoire_visiteur" File Inclusion
[SA24733] TinyMUX "fun_ladd()" Buffer Overflow Vulnerability
[SA24718] PHP-Fusion Expanded Calendar Module "m_month" SQL Injection
[SA24704] ScriptMagix FAQ Builder "catid" SQL Injection
[SA24702] Flyspray Unspecified Security Bypass and Information Disclose
Vulnerabilities
[SA24698] ScriptMagix Photo Rating "phid" SQL Injection
[SA24697] PHP-Nuke Addressbook Module "module_name" Local File
Inclusion
[SA24746] HP OpenView Network Node Manager Unspecified Unauthorized
Access
[SA24722] SAP RFC Library Multiple Vulnerabilities
[SA24717] IBM Tivoli Provisioning Manager for OS Deployment
"multipart/form-data" Handling Multiple Vulnerabilities
[SA24751] WordPress XMLRPC SQL Injection and Security Bypass
[SA24732] Apache Tomcat Directory Traversal Security Issue
[SA24727] Qt Overlong UTF-8 Sequence Cross-Site Scripting
Vulnerability
[SA24707] ManageEngine Firewall Analyzer Information Disclosure
[SA24763] IBM Tivoli Business Service Manager Password Disclosure

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA24778] Kaspersky Products Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Privilege escalation, DoS, System access, Exposure of
sensitive information, Exposure of system information
Released:    2007-04-05

Some vulnerabilities have been reported in various Kaspersky products,
which can be exploited by malicious, local users to gain escalated
privileges and by malicious people to gain knowledge of sensitive
information, cause a DoS (Denial of Service), and potentially
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24778/

 --

[SA24762] SolidWorks sldimdownload ActiveX Control "Run()" Insecure
Method

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-04

Will Dormann has reported a vulnerability in SolidWorks sldimdownload
ActiveX control, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24762/

 --

[SA24742] Yahoo! Messenger AudioConf ActiveX Control Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-04

A vulnerability has been reported in Yahoo! Messenger, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24742/

 --

[SA24725] IrfanView Animated Cursor Handling Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-03

Marsu Pilami has discovered a vulnerability in IrfanView, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24725/

 --

[SA24714] America Online SuperBuddy ActiveX Control "LinkSBIcons()"
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-02

TippingPoint Security Research Team has discovered a vulnerability in
America Online, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24714/

 --

[SA24711] Netscape Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Spoofing, DoS,
System access
Released:    2007-04-03

Multiple vulnerabilities have been reported in Netscape, which can be
exploited by malicious people to conduct man-in-the-middle, spoofing,
and cross-site scripting attacks, and potentially to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/24711/

 --

[SA24692] HP Mercury Quality Center "SPIDERLib.Loader" ActiveX Control
Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-02

A vulnerability has been reported in HP Mercury Quality Center, which
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24692/

 --

[SA24738] Metamod-P "safevoid_vsnprintf()" Denial of Service
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-04-04

A vulnerability has been reported in Metamod-P, which potentially can
be exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24738/

 --

[SA24700] Winmail Server "sid" Directory Traversal Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-04-03

rgod has reported a vulnerability in Winmail, which potentially can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/24700/

 --

[SA24764] Enterasys Networks NetSight Products TFTPD/BOOTPD
Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2007-04-05

Some vulnerabilities have been reported in various NetSight products,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24764/

 --

[SA24693] Hitachi Products Unspecified SQL Injection Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-03-30

A vulnerability has been reported in Hitachi products, which can be
exploited by malicious users to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/24693/

 --

[SA24730] HP Mercury Quality Center "RunQuery()" Insecure Method

Critical:    Less critical
Where:       From local network
Impact:      Manipulation of data
Released:    2007-04-04

Isma Khan has reported a vulnerability in HP Mercury Quality Center,
which can be exploited by malicious users to manipulate certain data.

Full Advisory:
http://secunia.com/advisories/24730/

 --

[SA24691] Minna De Office Access Restrictions Bypass

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass
Released:    2007-03-29

A vulnerability has been reported in Minna De Office, which can be
exploited by malicious users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/24691/


UNIX/Linux:--

[SA24739] rpath update for ImageMagick

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-04

rPath has issued an update for ImageMagick. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24739/

 --

[SA24737] SUSE Update for Multiple Packages

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2007-04-02

SUSE has issued updates for multiple packages. These fix some
vulnerabilities and a security issue, which can be exploited by
malicious people to bypass certain security restrictions, cause a DoS
(Denial of Service), and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24737/

 --

[SA24721] ImageMagick DCM and XWD Buffer Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-03

Some vulnerabilities have been reported in ImageMagick, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24721/

 --

[SA24696] Kaqoo Auction Software Free Edition Multiple File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-03-30

ThE dE@Th has discovered several vulnerabilities in Kaqoo Auction
Software Free Edition, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24696/

 --

[SA24695] Advanced Login "root" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-03-30

Zeni Susanto has discovered a vulnerability in Advanced Login, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/24695/

 --

[SA24798] Novell Kerberos KDC "krb5_klog_syslog()" Buffer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-04-05

Novell has acknowledged a vulnerability in Novell Kerberos KDC, which
can be exploited by malicious users to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24798/

 --

[SA24788] VMware ESX Server Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, Privilege escalation,
DoS, System access
Released:    2007-04-05

VMware has acknowledged some vulnerabilities in VMware ESX Server,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges, and malicious
people to disclose potentially sensitive information, cause a DoS
(Denial of Service), and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24788/

 --

[SA24785] Mandriva update for krb5

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2007-04-05

Mandriva has issued an update for krb5. This fixes some
vulnerabilities, which can be exploited by malicious users to cause a
DoS or compromise a vulnerable system and by malicious people to bypass
certain security restrictions.

Full Advisory:
http://secunia.com/advisories/24785/

 --

[SA24776] Mandriva update for freetype2

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-04-05

Mandriva has issued an update for freetype2. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise an application using
the library.

Full Advisory:
http://secunia.com/advisories/24776/

 --

[SA24768] FreeType BDF Font Integer Overflow Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-04-05

A vulnerability has been reported in FreeType, which can be exploited
by malicious people to cause a DoS (Denial of Service) and potentially
compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/24768/

 --

[SA24757] rPath updates for krb5

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2007-04-04

rPath has issued updates for krb5 packages. These fix some
vulnerabilities, which can be exploited by malicious users to cause a
DoS (Denial of Service) or compromise a vulnerable system and by
malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/24757/

 --

[SA24755] Sun SEAM Kerberized telnetd Daemon Arbitrary User Login

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-04-04

Sun has acknowledged a vulnerability in SEAM, which can be exploited by
malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/24755/

 --

[SA24753] Slackware update for ktorrent

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, System access
Released:    2007-04-04

Slackware has issued an update for ktorrent. This fixes some
vulnerabilities, which can be exploited by malicious people to
overwrite arbitrary files on a user's system or to potentially
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24753/

 --

[SA24750] Red Hat update for krb5

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2007-04-04

Red Hat has issued an update for krb5. This fixes some vulnerabilities,
which can be exploited by malicious people to bypass certain security
restrictions and by malicious users to cause a DoS (Denial of Service)
or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24750/

 --

[SA24740] Kerberos Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2007-04-04

Some vulnerabilities have been reported in Kerberos, which can be
exploited by malicious users to cause a DoS or compromise a vulnerable
system and by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/24740/

 --

[SA24736] Debian update for krb5

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2007-04-04

Debian has issued an update for krb5. This fixes some vulnerabilities,
which can be exploited by malicious people to bypass certain security
restrictions and by malicious users to cause a DoS (Denial of Service)
or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24736/

 --

[SA24735] Gentoo update for mit-krb5

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2007-04-04

Gentoo has issued an update for mit-krb5. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions and by malicious users to cause a DoS
(Denial of Service) or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24735/

 --

[SA24734] SUSE update for gpg

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-04-02

SUSE has issued an update for gpg. This fixes a vulnerability, which
can be exploited by malicious people to bypass certain security
restrictions when applications use GnuPG in an insecure manner.

Full Advisory:
http://secunia.com/advisories/24734/

 --

[SA24719] Gentoo update for asterisk

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-04-03

Gentoo has issued an update for asterisk. This fixes two
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24719/

 --

[SA24706] Ubuntu update for krb5

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2007-04-04

Ubuntu has issued an update for krb5. This fixes some vulnerabilities,
which can be exploited by malicious people to bypass certain security
restrictions and by malicious users to cause a DoS (Denial of Service)
or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24706/

 --

[SA24716] Gentoo update for openpbs

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-04-04

Gentoo has issued an update for openpbs. This fixes some
vulnerabilities, which can be exploited by malicious, local users and
malicious people to potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24716/

 --

[SA24795] Lite-CMS "p" Local File Inclusion Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-04-05

A vulnerability has been reported in Lite-CMS, which can be exploited
by malicious users to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/24795/

 --

[SA24790] Xoops Rha7 Downloads Module "lid" SQL Injection

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-04-05

ajann has discovered a vulnerability in the Rha7 Downloads module for
Xoops, which can be exploited by malicious users to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/24790/

 --

[SA24781] Xoops WF-Snippets Module "c" SQL Injection

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-04-05

ajann has discovered a vulnerability in the WF-Snippets module for
Xoops, which can be exploited by malicious users to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/24781/

 --

[SA24761] Xoops PopnupBlog Module "postid" SQL Injection

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-04-04

ajann has discovered a vulnerability in the PopnupBlog module for
Xoops, which can be exploited by malicious users to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/24761/

 --

[SA24759] rPath update for qt-x11-free

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-04-04

rPath has issued an update for qt-x11-free. This fixes a vulnerability,
which potentially can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/24759/

 --

[SA24754] Slackware update for file

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-04-04

Slackware has issued an update for file. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/24754/

 --

[SA24749] Xoops Kshop Module "id" SQL Injection

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-04-03

ajann has discovered a vulnerability in the Kshop module for Xoops,
which can be exploited by malicious users to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/24749/

 --

[SA24748] Xoops Camportail Module "camid" SQL Injection

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-04-03

ajann has discovered a vulnerability in the Camportail module for
Xoops, which can be exploited by malicious users to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/24748/

 --

[SA24728] DirectAdmin Log Viewer Script Insertion Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-04-03

Kanedaaa has reported a vulnerability in DirectAdmin, which can be
exploited by malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/24728/

 --

[SA24726] Slackware update for qt

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-04-04

Slackware has issued an update for qt. This fixes a vulnerability,
which potentially can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/24726/

 --

[SA24723] Debian update for file

Critical:    Less critical
Where:       From remote
Impact:      System access, DoS
Released:    2007-04-03

Debian has issued an update for file. This fixes a vulnerability, which
potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/24723/

 --

[SA24713] Debian update for zope2.7

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-04-03

Debian has issued an update for zope2.7. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site request forgery attacks.

Full Advisory:
http://secunia.com/advisories/24713/

 --

[SA24709] Xoops RM+Soft Gallery System Module "idcat" SQL Injection

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-04-02

ajann has discovered a vulnerability in the RM+Soft Gallery System
module for Xoops, which can be exploited by malicious users to conduct
SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/24709/

 --

[SA24708] Gentoo update for zziplib

Critical:    Less critical
Where:       From remote
Impact:      Privilege escalation, System access
Released:    2007-04-04

Gentoo has issued an update for zziplib. This fixes a vulnerability,
which can be exploited by malicious people to gain escalated privileges
or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24708/

 --

[SA24705] Mandriva update for kdelibs

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-04-04

Mandriva has issued an update for kdelibs. This fixes a vulnerability,
which potentially can be exploited by malicious people to conduct
cross-site scripting attacks in applications using the library.

Full Advisory:
http://secunia.com/advisories/24705/

 --

[SA24699] Mandriva update for qt3 and qt4

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-04-04

Mandriva has issued an update for qt3 and qt4. This fixes a
vulnerability, which potentially can be exploited by malicious people
to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/24699/

 --

[SA24694] Asterisk AEL Extensions Security Bypass

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-04-03

A security issue has been reported in Asterisk, which can be exploited
by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/24694/

 --

[SA24777] Mandriva update for kernel

Critical:    Less critical
Where:       From local network
Impact:      Privilege escalation, DoS
Released:    2007-04-05

Mandriva has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service), disclose potentially sensitive
information, and gain escalated privileges, and by malicious people to
cause a DoS.

Full Advisory:
http://secunia.com/advisories/24777/

 --

[SA24720] Gentoo update for openafs

Critical:    Less critical
Where:       From local network
Impact:      Privilege escalation
Released:    2007-04-04

Gentoo has issued an update for openafs. This fixes a vulnerability,
which can be exploited by malicious users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/24720/

 --

[SA24791] OpenBSD update for X.Org

Critical:    Less critical
Where:       Local system
Impact:      DoS, Privilege escalation, Exposure of sensitive
information
Released:    2007-04-05

OpenBSD has issued an update for X.Org. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
disclose sensitive information, cause a DoS (Denial of Service), and
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/24791/

 --

[SA24783] rPath update for nas

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-04-05

rPath has issued an update for nas. This fixes a vulnerability, which
potentially can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/24783/

 --

[SA24772] Mandriva update for tightvnc

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-04-05

Mandriva has issued an update for tightvnc. This fixes some
vulnerabilities, which potentially can be exploited by malicious users
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/24772/

 --

[SA24771] Red Hat update for XFree86

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information, Privilege escalation,
DoS
Released:    2007-04-04

Red Hat has issued an update for XFree86. This fixes some
vulnerabilities, which potentially can be exploited by malicious, local
users to disclose potentially sensitive information, cause a DoS (Denial
of Service), and gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/24771/

 --

[SA24770] Ubuntu update for freetype, libxfont, xorg, and xorg-server

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-04-04

Ubuntu has issued an update for freetype, libxfont, xorg, and
xorg-server. This fixes some vulnerabilities, which potentially can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/24770/

 --

[SA24765] Mandriva update for xorg-x11

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information, Privilege escalation,
DoS
Released:    2007-04-05

Mandriva has issued an update for xorg-x11. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
disclose sensitive information, cause a DoS (Denial of Service), and
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/24765/

 --

[SA24758] XFree86 Multiple Vulnerabilities

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information, Privilege escalation,
DoS
Released:    2007-04-04

Some vulnerabilities have been reported in XFree86, which can be
exploited by malicious, local users to disclose sensitive information,
cause a DoS (Denial of Service), and gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/24758/

 --

[SA24756] rPath update for freetype, xorg-x11, xorg-x11-fonts,
xorg-x11-tools, and xorg-x11-xfs

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information, Privilege escalation,
DoS
Released:    2007-04-04

rPath has issued an update for freetype, xorg-x11, xorg-x11-fonts,
xorg-x11-tools, and xorg-x11-xfs. This fixes some vulnerabilities,
which potentially can be exploited by malicious, local users to
disclose potentially sensitive information, cause a DoS (Denial of
Service), and gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/24756/

 --

[SA24745] Red Hat update for xorg-x11

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information, Privilege escalation,
DoS
Released:    2007-04-04

Red Hat has issued an update for xorg-x11. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
disclose sensitive information, cause a DoS (Denial of Service), and
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/24745/

 --

[SA24741] X.Org X11 Multiple Vulnerabilities

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information, Privilege escalation,
DoS
Released:    2007-04-04

Some vulnerabilities have been reported in X.Org X11, which potentially
can be exploited by malicious, local users to disclose sensitive
information, cause a DoS (Denial of Service), and gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/24741/

 --

[SA24744] Red Hat update for mysql

Critical:    Not critical
Where:       From local network
Impact:      Security Bypass
Released:    2007-04-04

Red Hat has issued an update for MySQL. This fixes a vulnerability,
which can be exploited by malicious users to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/24744/


Other:


Cross Platform:--

[SA24773] AROUNDMe File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-05

kezzap66345 has discovered some vulnerabilities in AROUNDMe, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24773/

 --

[SA24760] MySpeach "chat.php" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-04-04

Xst3nZ has discovered a vulnerability in MySpeach, which can be
exploited by malicious people to compromise a vulnerable system or to
disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/24760/

 --

[SA24743] Mozilla Firefox Firebug Extension "console.log()"
Cross-Context Scripting

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, System access
Released:    2007-04-05

pdp has reported a vulnerability in the Firebug extension for Mozilla
Firefox, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/24743/

 --

[SA24729] Softerra Time-Assistant "inc_dir" / "lib_dir" File Inclusion
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-02

M.Hasran Addahroni has reported some vulnerabilities in Time-Assistant,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/24729/

 --

[SA24715] MapLab "gszAppPath" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-02

Mufti Rizal has discovered a vulnerability in MapLab, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24715/

 --

[SA24703] Sun Solaris and Java Enterprise System Network Security
Services Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-03-30

Sun has acknowledged some vulnerabilities in Sun Solaris and Sun Java
Enterprise System, which potentially can be exploited by malicious
people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24703/

 --

[SA24701] BT-Sondage "repertoire_visiteur" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-02

Crackers_Child has discovered a vulnerability in BT-Sondage, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24701/

 --

[SA24733] TinyMUX "fun_ladd()" Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-04-03

A vulnerability has been reported in TinyMUX, which can be exploited by
malicious users to cause a DoS (Denial of Service) and potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24733/

 --

[SA24718] PHP-Fusion Expanded Calendar Module "m_month" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-04-02

UniquE-Key has discovered a vulnerability in the Expanded Calendar
module for PHP-Fusion, which can be exploited by malicious people to
conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/24718/

 --

[SA24704] ScriptMagix FAQ Builder "catid" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-04-04

ajann has reported a vulnerability in ScriptMagix FAQ Builder, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/24704/

 --

[SA24702] Flyspray Unspecified Security Bypass and Information Disclose
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information
Released:    2007-03-30

Some vulnerabilities have been reported in Flyspray, which can be
exploited by malicious people to bypass certain security restrictions
and to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/24702/

 --

[SA24698] ScriptMagix Photo Rating "phid" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-04-04

ajann has reported a vulnerability in ScriptMagix Photo Rating, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/24698/

 --

[SA24697] PHP-Nuke Addressbook Module "module_name" Local File
Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-04-02

bd0rk has discovered a vulnerability in the Addressbook module for
PHP-Nuke, which can be exploited by malicious people to disclose
sensitive information.

Full Advisory:
http://secunia.com/advisories/24697/

 --

[SA24746] HP OpenView Network Node Manager Unspecified Unauthorized
Access

Critical:    Moderately critical
Where:       From local network
Impact:      Security Bypass
Released:    2007-04-03

A vulnerability has been reported in HP OpenView Network Node Manager
(OV NNM), which can be exploited by malicious people to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/24746/

 --

[SA24722] SAP RFC Library Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      Exposure of sensitive information, DoS, System access
Released:    2007-04-05

Mariano Nuez Di Croce has reported some vulnerabilities in SAP RFC
Library, which can be exploited by malicious people to disclose
potentially sensitive information, cause a DoS (Denial of Service), and
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24722/

 --

[SA24717] IBM Tivoli Provisioning Manager for OS Deployment
"multipart/form-data" Handling Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2007-04-03

Some vulnerabilities have been reported in IBM Tivoli Provisioning
Manager for OS Deployment, which can be exploited by malicious people
to cause a DoS (Denial of Service) or potentially compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/24717/

 --

[SA24751] WordPress XMLRPC SQL Injection and Security Bypass

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data, Exposure of
sensitive information
Released:    2007-04-04

Sumit Siddharth has discovered two vulnerabilities in WordPress, which
can be exploited by malicious users to conduct SQL injection attacks or
to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/24751/

 --

[SA24732] Apache Tomcat Directory Traversal Security Issue

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-04-02

D. Matscheko has reported a security issue in Apache Tomcat, which can
be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/24732/

 --

[SA24727] Qt Overlong UTF-8 Sequence Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-04-03

Andreas Nolden has reported a vulnerability in Qt, which potentially
can be exploited to conduct cross-site scripting attacks in
applications using the Qt libraries.

Full Advisory:
http://secunia.com/advisories/24727/

 --

[SA24707] ManageEngine Firewall Analyzer Information Disclosure

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-03-30

yearsilent has reported a security issue in ManageEngine Firewall
Analyzer, which can be exploited by malicious users to disclose
potentially sensitive information.

Full Advisory:
http://secunia.com/advisories/24707/

 --

[SA24763] IBM Tivoli Business Service Manager Password Disclosure

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2007-04-04

A security issue has been reported in IBM Tivoli Business Service
Manager, which can be exploited by malicious, local users to disclose
sensitive information.

Full Advisory:
http://secunia.com/advisories/24763/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


__________________________
Subscribe to InfoSec News
http://www.infosecnews.org



This archive was generated by hypermail 2.1.3 : Fri Apr 06 2007 - 00:36:48 PDT