[ISN] Secunia Weekly Summary - Issue: 2007-16

From: InfoSec News (alerts@private)
Date: Fri Apr 20 2007 - 00:24:39 PDT


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2007-04-12 - 2007-04-19                        

                       This week: 65 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Should you be interested in a career within Secunia, the current job
openings are available right now:

Security Sales Engineer:
http://corporate.secunia.com/about_secunia/54/

German Key Account Manager:
http://corporate.secunia.com/about_secunia/55/

International Account Manager - Enterprise Sales:
http://corporate.secunia.com/about_secunia/52/

International Sales Manager - IT Security Partner:
http://corporate.secunia.com/about_secunia/51/

Danish: Disassembling og Reversing
http://secunia.com/Disassembling_og_Reversing/

Linux Security Specialist:
http://secunia.com/Linux_Security_Specialist/

========================================================================
2) This Week in Brief:

Without skipping a beat, hackers have once again managed to take the
fun out of Microsoft Tuesday with the release of a new Microsoft
vulnerability, this time affecting the DNS service.

The vulnerability is due to a boundary error in an RPC interface of the
DNS service, and can be exploited to cause a stack-based buffer
overflow by creating an RPC request with specific parameters.
Successful exploitation allows an attacker to execute arbitrary code
with SYSTEM privileges.

While Microsoft has yet to issue a patch, they have already released a
security advisory for the vulnerability. Secunia has rated this
advisory as "Highly critical". All users are encouraged to implement
the vendor-recommended workarounds while a patch is being prepared.

For more information, please refer to:
http://secunia.com/advisories/24871/

 --

Two vulnerabilities have been reported in Clam Antivirus. The first is
an unspecified file descriptor leak error within the
libclamav/chmunpack.c file, and the other is a signedness error within
the "cab_unstore()" function in the libclamav/cab.c file.

The "cab_unstore()" vulnerability can be exploited to cause a stack
based buffer overflow via a specially crafted ".cab" file. This can
lead to a crash of the clamd process, or may allow an attacker to
execute arbitrary code in the system.

The vendor has released a patch for these vulnerabilities. For more
information, please refer to:
http://secunia.com/advisories/24891/

 --

Oracle has released a critical security patch covering 36
vulnerabilities. The vulnerabilities, allowing everything from
cross-site scripting attacks, to crashes, to execution of arbitrary
code, are reported in various Oracle products.

Users are advised to apply the patches for their affected products as
soon as possible. There is a publicly available exploit for at least
one of the patches, and more are sure to follow, as detailed analysis
of the patches are sure to come out in the days following the patch
release.

For more information:
http://secunia.com/advisories/24929/

 --

VIRUS ALERTS:

During the past week Secunia collected 174 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA24871] Microsoft Windows DNS Service Buffer Overflow
              Vulnerability
2.  [SA24659] Microsoft Windows Animated Cursor Buffer Overflow
              Vulnerability
3.  [SA22896] Microsoft Agent URL Parsing Memory Corruption
              Vulnerability
4.  [SA18787] Internet Explorer Drag-and-Drop Vulnerability
5.  [SA24891] Clam AntiVirus Two Vulnerabilities
6.  [SA24877] Opera Unspecified Flash Player Plug-In Vulnerability
7.  [SA24865] Cisco Products Multiple Vulnerabilities
8.  [SA24880] Aircrack-ng 802.11 Authentication Packet Processing
              Buffer Overflow
9.  [SA24857] Sun Solaris IP Packet Denial of Service
10. [SA23370] Debian update for kernel

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA24960] Second Sight ActiveGS ActiveX Control Buffer Overflow
Vulnerabilities
[SA24928] Second Sight ActiveMod ActiveX Control Buffer Overflow
Vulnerability
[SA24900] Akamai Download Manager ActiveX Control Buffer Overflow
Vulnerabilities
[SA24914] McAfee VirusScan Enterprise On-Access Scanner Unicode
Filename Buffer Overflow
[SA24898] MiniShare Multiple Connections Denial of Service
[SA24894] FileZilla Unspecified Format String Vulnerabilities
[SA24938] IBM Tivoli Monitoring Various Services Buffer Overflow
Vulnerabilities
[SA24937] BMC PATROL "bgs_sdservice.exe" Memory Corruption
[SA24892] LANDesk Management Suite Alert Service Buffer Overflow
[SA24882] MailBee WebMail Pro Cross-Site Scripting Vulnerabilities
[SA24881] eIQNetworks Enterprise Security Analyzer Command Processing
Vulnerabilities

UNIX/Linux:
[SA24948] Sun Solaris Mozilla 1.7 Vulnerabilities
[SA24930] HP UX Tru64 Multiple SSL and BIND Vulnerabilities
[SA24906] Gentoo update for openoffice and openoffice-bin
[SA24897] Gentoo update for xine-lib
[SA24947] rPath update for lighttpd
[SA24945] rPath update for php, php-mysql, and php-pgsql
[SA24931] Gentoo update for madwifi-ng
[SA24924] Red Hat update for php
[SA24911] Red Hat update for squid
[SA24910] Red Hat update for php
[SA24889] SUSE Update for Multiple Packages
[SA24887] PHP-Nuke vWar Module SQL Injection and Cross-Site Scripting
[SA24886] lighttpd "mtime" and "\r\n\r\n\" Denial of Service
Vulnerabilities
[SA24885] Red Hat update for freetype
[SA24884] VCDGear Cue File Buffer Overflow Vulnerability
[SA24950] HP Insight Management Agents SSL Vulnerabilities
[SA24951] WordPress Pingback Denial of Service Security Issue
[SA24919] oe2edit "q" Cross-Site Scripting Vulnerability
[SA24918] Gentoo file Denial of Service Security Issue
[SA24917] Gentoo update for freeradius
[SA24909] Mandriva update for php
[SA24907] Mandriva update for freeradius
[SA24901] rPath update for kernel
[SA24895] Mandriva update for cups
[SA24953] Ubuntu update for libx11
[SA24916] SSH Tectia Server Insecure Permissions
[SA24903] ScramDisk 4 Linux Privilege Escalation Security Issues
[SA24905] Gentoo update for vixie-cron

Other:
[SA24940] Canon Network Camera Server VB100 Series Cross-Site Scripting
Vulnerability

Cross Platform:
[SA24956] jGallery "G_JGALL[inc_path]" File Inclusion Vulnerability
[SA24955] AimStats "process.php" PHP Code Injection
[SA24944] Novell GroupWise WebAccess Base64 Decoding Buffer Overflow
[SA24939] ShoutPro "shout" PHP Code Injection Vulnerability
[SA24929] Oracle Products Multiple Vulnerabilities
[SA24927] Sun Solaris and Java Web Console Format String Vulnerability
[SA24926] Rezervi Generic "root" File Inclusion Vulnerabilities
[SA24915] Opensurveypilot Two File Inclusion Vulnerabilities
[SA24913] Mozilla Firefox Wizz RSS News Reader Extension Cross-Context
Scripting
[SA24912] Simple PHP Scripts Gallery "gallery" File Inclusion
[SA24908] Anthologia "ads_file" File Inclusion Vulnerability
[SA24904] LS simple guestbook "message" PHP Code Execution
[SA24902] CNStats File Inclusion Vulnerabilities
[SA24891] Clam AntiVirus Two Vulnerabilities
[SA24890] StoreFront for Gallery "GALLERY_BASEDIR" File Inclusion
Vulnerabilities
[SA24888] PhpWiki "UpLoad" PHP Script Upload Vulnerability
[SA24933] webMethods Glue "resource" Directory Traversal Vulnerability
[SA24899] Zomplog "file" Directory Traversal Vulnerability
[SA24896] NMDeluxe "template" Local File Inclusion Vulnerability
[SA24880] Aircrack-ng 802.11 Authentication Packet Processing Buffer
Overflow
[SA24943] Wabbit PHP Gallery Script Two Cross-Site Scripting
Vulnerabilities
[SA24942] my little weblog "id" Cross-Site Scripting
[SA24922] JEX-Treme Einfacher Passwortschutz "msg"
Cross-Site-Scripting
[SA24879] chCounter "login_name" Cross-Site Scripting
[SA24893] McAfee e-Business Server Authentication Packet Processing
Denial Of Service

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA24960] Second Sight ActiveGS ActiveX Control Buffer Overflow
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-19

Will Dormann has reported some vulnerabilities in Second Sight ActiveGS
ActiveX control, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24960/

 --

[SA24928] Second Sight ActiveMod ActiveX Control Buffer Overflow
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-19

Will Dormann has reported a vulnerability in Second Sight ActiveMod
ActiveX control, which can be exploited by malicious people to
potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24928/

 --

[SA24900] Akamai Download Manager ActiveX Control Buffer Overflow
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-17

Two vulnerabilities have been reported in Akamai Download Manager
ActiveX control, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24900/

 --

[SA24914] McAfee VirusScan Enterprise On-Access Scanner Unicode
Filename Buffer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-04-18

A vulnerability has been reported in McAfee VirusScan Enterprise, which
can be exploited by malicious people to cause a DoS or to potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24914/

 --

[SA24898] MiniShare Multiple Connections Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-04-16

device has reported a vulnerability in MiniShare, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24898/

 --

[SA24894] FileZilla Unspecified Format String Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-04-16

Some vulnerabilities have been reported in FileZilla, which potentially
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24894/

 --

[SA24938] IBM Tivoli Monitoring Various Services Buffer Overflow
Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-04-19

Some vulnerabilities have been reported in IBM Tivoli Monitoring, which
can be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24938/

 --

[SA24937] BMC PATROL "bgs_sdservice.exe" Memory Corruption

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-04-19

A vulnerability has been reported in BMC PATROL, which can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24937/

 --

[SA24892] LANDesk Management Suite Alert Service Buffer Overflow

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-04-16

Aaron Portnoy has reported a vulnerability in LANDesk Management Suite,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/24892/

 --

[SA24882] MailBee WebMail Pro Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-04-17

Some vulnerabilities have been reported in MailBee WebMail Pro, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/24882/

 --

[SA24881] eIQNetworks Enterprise Security Analyzer Command Processing
Vulnerabilities

Critical:    Less critical
Where:       From local network
Impact:      DoS, System access
Released:    2007-04-13

Leon Juranic has discovered some vulnerabilities in eIQNetworks
Enterprise Security Analyzer, which can be exploited by malicious
people to cause a DoS (Denial of Service) or to potentially compromise
a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24881/


UNIX/Linux:--

[SA24948] Sun Solaris Mozilla 1.7 Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-04-19

Sun has acknowledged some vulnerabilities in Mozilla 1.7 for Sun
Solaris, which potentially can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24948/

 --

[SA24930] HP UX Tru64 Multiple SSL and BIND Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-04-18

HP has acknowledged some vulnerabilities in HP Tru64 Unix.

Full Advisory:
http://secunia.com/advisories/24930/

 --

[SA24906] Gentoo update for openoffice and openoffice-bin

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-17

Gentoo has issued an update for openoffice and openoffice-bin. This
fixes some vulnerabilities, which can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24906/

 --

[SA24897] Gentoo update for xine-lib

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-04-16

Gentoo has issued an update for xine-lib. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/24897/

 --

[SA24947] rPath update for lighttpd

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-04-19

rPath has issued an update for lighttpd. This fixes some
vulnerabilities, which can be exploited by malicious users and
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24947/

 --

[SA24945] rPath update for php, php-mysql, and php-pgsql

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2007-04-19

rPath has issued an update for php, php-mysql, and php-pgsql. This
fixes some vulnerabilities, which can be exploited by malicious, local
users to bypass certain security restrictions, and by malicious people
to cause a DoS (Denial of Service) and potentially compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/24945/

 --

[SA24931] Gentoo update for madwifi-ng

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, DoS
Released:    2007-04-18

Gentoo has issued an update for madwifi-ng. This fixes some
vulnerabilities, which can be exploited by malicious people to gain
knowledge of potentially sensitive information or cause a DoS (Denial
of Service).

Full Advisory:
http://secunia.com/advisories/24931/

 --

[SA24924] Red Hat update for php

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2007-04-17

Red Hat has issued an update for php. This fixes some vulnerabilities,
which can be exploited by malicious, local users to bypass certain
security restrictions, and by malicious people to cause a DoS (Denial
of Service) and potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24924/

 --

[SA24911] Red Hat update for squid

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-04-16

Red Hat has issued an update for squid. This fixes a  vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/24911/

 --

[SA24910] Red Hat update for php

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2007-04-17

Red Hat has issued an update for php. This fixes some vulnerabilities,
which can be exploited by malicious, local users to bypass certain
security restrictions, and by malicious people to potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24910/

 --

[SA24889] SUSE Update for Multiple Packages

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Privilege escalation, DoS, System
access
Released:    2007-04-16

SUSE has issued an update for various packages. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges and by malicious people to conduct cross-site
scripting attacks, cause a DoS (Denial of Service), and compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/24889/

 --

[SA24887] PHP-Nuke vWar Module SQL Injection and Cross-Site Scripting

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
sensitive information
Released:    2007-04-18

Janek Vind has discovered some vulnerabilities in the vWar module for
PHP-Nuke, which can be exploited by malicious people to conduct SQL
injection attacks and cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/24887/

 --

[SA24886] lighttpd "mtime" and "\r\n\r\n\" Denial of Service
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-04-16

Some vulnerabilities have been reported in lighttpd, which can be
exploited by malicious users and malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/24886/

 --

[SA24885] Red Hat update for freetype

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-04-16

Red Hat has issued an update for freetype. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/24885/

 --

[SA24884] VCDGear Cue File Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-04-16

A vulnerability has been discovered in VCDGear, which can be exploited
by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24884/

 --

[SA24950] HP Insight Management Agents SSL Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      Security Bypass, DoS, System access
Released:    2007-04-18

HP has acknowledged some vulnerabilities in HP Insight Management
Agents, which can be exploited by malicious people to bypass certain
security restrictions, cause a DoS (Denial of Service) or compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/24950/

 --

[SA24951] WordPress Pingback Denial of Service Security Issue

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-04-19

foobarwp12 has reported a security issue in WordPress, which
potentially can be exploited by malicious people to cause a DoS (Denial
of Service).

Full Advisory:
http://secunia.com/advisories/24951/

 --

[SA24919] oe2edit "q" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-04-17

David Vieira-Kurz has reported a vulnerability in oe2edit, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/24919/

 --

[SA24918] Gentoo file Denial of Service Security Issue

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-04-18

Gentoo has acknowledged a security issue in file, which potentially can
be exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24918/

 --

[SA24917] Gentoo update for freeradius

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-04-18

Gentoo has issued an update for freeradius. This fixes a security
issue, which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/24917/

 --

[SA24909] Mandriva update for php

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, DoS
Released:    2007-04-19

Mandriva has issued an update for php. This fixes some vulnerabilities,
which can be exploited by malicious users to bypass certain security
restrictions and by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/24909/

 --

[SA24907] Mandriva update for freeradius

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-04-17

Mandriva has issued an update for freeradius. This fixes a security
issue, which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/24907/

 --

[SA24901] rPath update for kernel

Critical:    Less critical
Where:       From local network
Impact:      Exposure of sensitive information, Privilege escalation,
DoS
Released:    2007-04-17

rPath has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service), disclose potentially sensitive
information, gain escalated privileges, and by malicious people to
cause a DoS.

Full Advisory:
http://secunia.com/advisories/24901/

 --

[SA24895] Mandriva update for cups

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-04-17

Mandriva has issued an update for cups. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/24895/

 --

[SA24953] Ubuntu update for libx11

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information, DoS
Released:    2007-04-19

Ubuntu has issued an update for libx11. This fixes a vulnerability,
which can be exploited by malicious, local users to disclose sensitive
information or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24953/

 --

[SA24916] SSH Tectia Server Insecure Permissions

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-04-16

A security issue has been reported in SSH Tectia Server for IBM z/OS,
which potentially can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/24916/

 --

[SA24903] ScramDisk 4 Linux Privilege Escalation Security Issues

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-04-16

Two security issues have been reported in ScramDisk 4 Linux. These can
be exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/24903/

 --

[SA24905] Gentoo update for vixie-cron

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-04-17

Gentoo has issued an update for vixie-cron. This fixes a vulnerability,
which can be exploited by malicious, local users to cause a DoS (Denial
of Service).

Full Advisory:
http://secunia.com/advisories/24905/


Other:--

[SA24940] Canon Network Camera Server VB100 Series Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-04-19

A vulnerability has been reported in Canon Network Camera Server VB100
Series, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/24940/


Cross Platform:--

[SA24956] jGallery "G_JGALL[inc_path]" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-19

Dj7xpl has discovered a vulnerability in jGallery, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24956/

 --

[SA24955] AimStats "process.php" PHP Code Injection

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-19

Dj7xpl has discovered some vulnerabilities in AimStats, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24955/

 --

[SA24944] Novell GroupWise WebAccess Base64 Decoding Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-19

A vulnerability has been reported in Novell GroupWise, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24944/

 --

[SA24939] ShoutPro "shout" PHP Code Injection Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-18

Gammarays has discovered a vulnerability in ShoutPro, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24939/

 --

[SA24929] Oracle Products Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Unknown, Security Bypass, Cross Site Scripting,
Manipulation of data, Exposure of sensitive information, Privilege
escalation, DoS, System access
Released:    2007-04-18

Multiple vulnerabilities have been reported in various Oracle products.
Some of these vulnerabilities have unknown impacts, while others can be
exploited to bypass certain security restrictions, gain knowledge of 
sensitive information, gain escalated privileges, cause a DoS (Denial
of Service), conduct cross-site scripting and SQL injection attacks, or
potentially compromise a vulnerable system..

Full Advisory:
http://secunia.com/advisories/24929/

 --

[SA24927] Sun Solaris and Java Web Console Format String Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-18

Frank Dick has reported a vulnerability in Sun Solaris and Java Web
Console, which potentially can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24927/

 --

[SA24926] Rezervi Generic "root" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-19

GolD_M has discovered some vulnerabilities in Rezervi Generic, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/24926/

 --

[SA24915] Opensurveypilot Two File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-04-19

Two vulnerabilities have been discovered in Opensurveypilot, which can
be exploited by malicious people to compromise a vulnerable system or
to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/24915/

 --

[SA24913] Mozilla Firefox Wizz RSS News Reader Extension Cross-Context
Scripting

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, System access
Released:    2007-04-17

A vulnerability has been reported in the Wizz RSS News Reader extension
for Mozilla Firefox, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24913/

 --

[SA24912] Simple PHP Scripts Gallery "gallery" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-04-17

A vulnerability has been discovered in Simple PHP Scripts Gallery,
which can be exploited by malicious people to compromise a vulnerable
system or to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/24912/

 --

[SA24908] Anthologia "ads_file" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-04-18

Dj7xpl has discovered a vulnerability in Anthologia, which can be
exploited by malicious people to compromise a vulnerable system or to
disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/24908/

 --

[SA24904] LS simple guestbook "message" PHP Code Execution

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-16

Gammarays has discovered a vulnerability in LS simple guestbook, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/24904/

 --

[SA24902] CNStats File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-16

Some vulnerabilities have been discovered in CNStats, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24902/

 --

[SA24891] Clam AntiVirus Two Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Unknown, DoS, System access
Released:    2007-04-13

Two vulnerabilities have been reported in Clam AntiVirus. One has an
unknown impact, while the other can be exploited by malicious people to
cause a DoS (Denial of Service) or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24891/

 --

[SA24890] StoreFront for Gallery "GALLERY_BASEDIR" File Inclusion
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-17

Alkomandoz Hacker has reported a vulnerability in StoreFront for
Gallery, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/24890/

 --

[SA24888] PhpWiki "UpLoad" PHP Script Upload Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-04-13

A vulnerability has been discovered in PhpWiki, which can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24888/

 --

[SA24933] webMethods Glue "resource" Directory Traversal Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-04-18

Patrick Webster has reported a vulnerability in webMethods Glue, which
can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/24933/

 --

[SA24899] Zomplog "file" Directory Traversal Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-04-19

Dj7xpl has discovered a vulnerability in Zomplog, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/24899/

 --

[SA24896] NMDeluxe "template" Local File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-04-16

BeyazKurt has reported a vulnerability in NMDeluxe, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/24896/

 --

[SA24880] Aircrack-ng 802.11 Authentication Packet Processing Buffer
Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-04-13

Jonathan So has reported a vulnerability in Aircrack-ng, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24880/

 --

[SA24943] Wabbit PHP Gallery Script Two Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-04-18

the_Edit0r has reported some vulnerabilities in Wabbit PHP Gallery
Script, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/24943/

 --

[SA24942] my little weblog "id" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-04-18

the_Edit0r has discovered a vulnerability in my little weblog, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/24942/

 --

[SA24922] JEX-Treme Einfacher Passwortschutz "msg"
Cross-Site-Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-04-19

hackberry has discovered a vulnerability in Einfacher Passwortschutz,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/24922/

 --

[SA24879] chCounter "login_name" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-04-13

Hanno Bck has discovered a vulnerability in chCounter, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/24879/

 --

[SA24893] McAfee e-Business Server Authentication Packet Processing
Denial Of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-04-18

A vulnerability has been reported in McAfee e-Business Server, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/24893/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


__________________________
Subscribe to InfoSec News
http://www.infosecnews.org



This archive was generated by hypermail 2.1.3 : Fri Apr 20 2007 - 00:34:15 PDT