======================================================================== The Secunia Weekly Advisory Summary 2007-05-10 - 2007-05-17 This week: 68 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. -- NEW BLOG ENTRY Since its release in December of last year, the free, online Secunia Software Inspector has conducted over 350,000 inspections. These inspections have identified 4.9 million popular applications, and out of those, 1.4 million applications were found to be lacking critical security patches from the vendors. While most people are aware of the need to update their anti-virus patterns and to raise their firewall shields, it appears that too many users either don't know that their systems are vulnerable to significant issues or that they simply don't want to spend the necessary time scouring for vulnerability information and the relevant vendor patches to properly address the issues. This fact is further highlighted if we dig deeper into the figures behind the fact that 28% of all detected applications by the Software Inspector are vulnerable... Read More: http://secunia.com/blog/11/ ======================================================================== 2) This Week in Brief: Secunia Research has discovered two vulnerabilities in Centennial Discovery, which can be exploited by malicious people to compromise a vulnerable system. Successful exploitation allows execution of arbitrary code with SYSTEM privileges. The same vulnerabilities also affect: - Symantec Discovery 6.x - Numara Asset Manager 8.x References: http://secunia.com/advisories/24090/ http://secunia.com/advisories/24281/ http://secunia.com/advisories/24329/ -- Will Dorman has reported a vulnerability in Norton Personal Firewall, which can be exploited by malicious people to compromise a user's system. Successful exploitation allows execution of arbitrary code. Product updates to correct the problem are available through LiveUpdate. Reference: http://secunia.com/advisories/25290/ -- VIRUS ALERTS: During the past week Secunia collected 178 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA24535] Internet Explorer 7 navcancl.htm Cross-Site Scripting Vulnerability 2. [SA23769] Internet Explorer Multiple Vulnerabilities 3. [SA25188] MySQL IF Query Denial of Service Vulnerability 4. [SA25199] Cisco IOS FTP Server Multiple Vulnerabilities 5. [SA25244] ClamAV OLE2 Parser Denial of Service 6. [SA25172] Symantec Products NAVOpts.dll ActiveX Control Security Bypass Vulnerability 7. [SA25226] SUSE update for kernel 8. [SA25183] Microsoft Exchange Multiple Vulnerabilities 9. [SA25202] CA Products Buffer Overflow and Privilege Escalation Vulnerabilities 10. [SA25224] AForum "CommonAbsDir" and "header" File Inclusion ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA25290] Norton Personal Firewall ISAlertDataCOM ActiveX Control Buffer Overflow [SA25258] PrecisionID Data Matrix ActiveX Barcode Control Buffer Overflow [SA25253] PrecisionID Linear Barcode ActiveX Control Buffer Overflow [SA25248] TinyIdentD Long Query Request Buffer Overflow Vulnerability [SA25245] Notepad++ Ruby Source File Buffer Overflow Vulnerability [SA25231] IDAutomation Linear Barcode ActiveX Control Buffer Overflow [SA25286] Caucho Resin Multiple Information Disclosure Vulnerabilities [SA25277] WinImage FAT Image Long Pathname Buffer Overflow Vulnerabilities [SA25265] W1L3D4 Philboard "forumid" SQL Injection Vulnerability [SA25252] yEnc32 NTX Decoding Filename Buffer Overflow Vulnerability [SA25247] EfesTECH Haber "id" SQL Injection [SA25282] Eudora SMTP Server Reply Processing Buffer Overflow Vulnerability [SA25275] HP Systems Insight Manager Session Fixation Vulnerability [SA25300] CA BrightStor ARCserve Backup Two Denial of Service Vulnerabilities UNIX/Linux: [SA25274] NagiosQL "functions/prepend_adm.php" File Inclusion [SA25260] MonAlbum "admin_configuration.php" PHP Code Injection [SA25255] Trustix Updates for Multiple Packages [SA25254] YAAP "root_path" File Inclusion Vulnerability [SA25288] Red Hat update for kernel [SA25239] SUSE Updates for Multiple Packages [SA25270] Debian update for samba [SA25259] Gentoo update for samba [SA25257] Red Hat update for samba [SA25256] Mandriva update for samba [SA25251] Ubuntu update for samba [SA25246] Slackware update for samba [SA25241] rPath update for samba and samba-swat [SA25232] Samba Multiple Vulnerabilities [SA25293] Debian update for quagga [SA25281] Ayava Products Gnu GCC fastjar Directory Traversal [SA25280] Red Hat update for tomcat [SA25273] Slackware update for libpng [SA25268] rPath update for libpng [SA25264] Red Hat update for bluez-utils [SA25263] Debian update for qt4-x11 [SA25236] Debian update for squirrelmail [SA25238] Gentoo update for postgresql [SA25291] Adobe Version Cue Installation Disables Firewall Security Issue [SA25267] rPath update for shadow Other: [SA25302] 3Com TippingPoint IPS HTTP Unicode Encoding Detection Bypass [SA25285] Cisco Products HTTP Unicode Encoding Detection Bypass [SA25266] T-Com Speedport Login Brute Force Weakness Cross Platform: [SA25303] Glossword "sys[path_addon]" File Inclusion Vulnerability [SA25295] Sun JDK ICC and BMP Parser Vulnerabilities [SA25283] BEA JRockit Multiple Vulnerabilities [SA25272] Geeklog Media Gallery Module "_MG_CONF[path_html]" File Inclusion [SA25271] Linksnet Newsfeed "dirpath_linksnet_newsfeed" File Inclusion [SA25297] FAQEngine "questionref" SQL Injection Vulnerability [SA25296] SimpNews "newsnr" SQL Injection Vulnerability [SA25294] Little cms ICC Profile Parsing Buffer Overflow Vulnerability [SA25284] BEA Products Multiple Vulnerabilities [SA25279] SonicBB SQL Injection and Cross-Site Scripting [SA25262] PinkCrow Designs Gallery "src" Directory Traversal [SA25261] R2K Gallery "lang2" Local File Inclusion [SA25250] CommuniGate Pro WebMail Script Insertion Vulnerability [SA25243] H-Sphere SiteStudio "template" Information Disclosure [SA25240] Connect Daily Unspecified Security Issue [SA25237] iFdate Administrative Section Security Bypass [SA25235] libexif EXIF Information Handling Vulnerability [SA25234] Thyme "eid" SQL Injection Vulnerability [SA25306] PHP SOAP Extension HTTP Authentication Weak Nonce [SA25299] xajax Unspecified Cross-Site Scripting Vulnerability [SA25298] Xoops Resmanager Module "id_reserv" SQL Injection [SA25292] libpng tRNS Chunk Denial of Service [SA25249] EQdkp "show" Cross-Site Scripting [SA25244] ClamAV OLE2 Parser Denial of Service [SA25242] TeamSpeak Server Privilege Escalation and Cross-Site Scripting [SA25301] MySQL Two Privilege Escalation Security Issues ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA25290] Norton Personal Firewall ISAlertDataCOM ActiveX Control Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2007-05-17 Will Dorman has reported a vulnerability in Norton Personal Firewall, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25290/ -- [SA25258] PrecisionID Data Matrix ActiveX Barcode Control Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2007-05-14 shinnai has discovered a vulnerability in PrecisionID Data Matrix ActiveX Barcode Control, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25258/ -- [SA25253] PrecisionID Linear Barcode ActiveX Control Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2007-05-16 shinnai has discovered a vulnerability in PrecisionID Linear Barcode ActiveX Control, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25253/ -- [SA25248] TinyIdentD Long Query Request Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-05-15 Maarten Boone has discovered a vulnerability in TinyIdentD, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25248/ -- [SA25245] Notepad++ Ruby Source File Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-05-14 vade79 has discovered a vulnerability in Notepad++, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25245/ -- [SA25231] IDAutomation Linear Barcode ActiveX Control Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2007-05-14 shinnai has discovered a vulnerability in IDAutomation Linear Barcode ActiveX Control, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25231/ -- [SA25286] Caucho Resin Multiple Information Disclosure Vulnerabilities Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-05-15 Derek Abdine has reported some vulnerabilities in Caucho Resin, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/25286/ -- [SA25277] WinImage FAT Image Long Pathname Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From remote Impact: System access Released: 2007-05-17 Tan Chew Keong has reported two vulnerabilities in WinImage, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25277/ -- [SA25265] W1L3D4 Philboard "forumid" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-05-14 gsy and kerem125 have discovered a vulnerability in W1L3D4 Philboard, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25265/ -- [SA25252] yEnc32 NTX Decoding Filename Buffer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2007-05-14 Tan Chew Keong has reported a vulnerability in yEnc32, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25252/ -- [SA25247] EfesTECH Haber "id" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-05-14 CyberGhost has reported a vulnerability in EfesTECH Haber, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25247/ -- [SA25282] Eudora SMTP Server Reply Processing Buffer Overflow Vulnerability Critical: Less critical Where: From remote Impact: System access Released: 2007-05-16 Krystian Kloskowski has discovered a vulnerability in Eudora, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25282/ -- [SA25275] HP Systems Insight Manager Session Fixation Vulnerability Critical: Less critical Where: From remote Impact: Hijacking Released: 2007-05-15 Luka Treiber and Aljosa Ocepek have reported a vulnerability in HP Systems Insight Manager, which can be exploited by malicious people to conduct session fixation attacks. Full Advisory: http://secunia.com/advisories/25275/ -- [SA25300] CA BrightStor ARCserve Backup Two Denial of Service Vulnerabilities Critical: Less critical Where: From local network Impact: DoS Released: 2007-05-17 M. Shirk has reported two vulnerabilities in BrightStor ARCserve Backup, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25300/ UNIX/Linux:-- [SA25274] NagiosQL "functions/prepend_adm.php" File Inclusion Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2007-05-15 Some vulnerabilities have been discovered in NagiosQL, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25274/ -- [SA25260] MonAlbum "admin_configuration.php" PHP Code Injection Critical: Highly critical Where: From remote Impact: System access Released: 2007-05-14 Dj7xpl has reported some vulnerabilities in MonAlbum, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25260/ -- [SA25255] Trustix Updates for Multiple Packages Critical: Highly critical Where: From remote Impact: Unknown, Security Bypass, Manipulation of data, Brute force, Exposure of system information, Exposure of sensitive information, Privilege escalation, DoS, System access Released: 2007-05-17 Trustix has issued updates for multiple packages. These fix some vulnerabilities where some have unknown impact and others can be exploited by malicious, local users to gain escalated privileges, by malicious users to perform actions with escalated privileges, manipulate certain data, disclose potentially sensitive information, bypass certain security restrictions, to cause a DoS (Denial of Service) and to compromise a vulnerable system, and by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25255/ -- [SA25254] YAAP "root_path" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2007-05-15 3l3ctric-Cracker has reported a vulnerability in YAAP, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25254/ -- [SA25288] Red Hat update for kernel Critical: Moderately critical Where: From remote Impact: Security Bypass, DoS Released: 2007-05-17 Red Hat has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to potentially bypass certain security restrictions or to cause a DoS. Full Advisory: http://secunia.com/advisories/25288/ -- [SA25239] SUSE Updates for Multiple Packages Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, System access Released: 2007-05-16 SUSE has issued updates for multiple packages. These fix some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25239/ -- [SA25270] Debian update for samba Critical: Moderately critical Where: From local network Impact: Privilege escalation, System access Released: 2007-05-16 Debian has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious users to perform certain actions with escalated privileges and to compromise a vulnerable system, and by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25270/ -- [SA25259] Gentoo update for samba Critical: Moderately critical Where: From local network Impact: Privilege escalation, System access Released: 2007-05-16 Gentoo has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious users to perform certain actions with escalated privileges and to compromise a vulnerable system, and by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25259/ -- [SA25257] Red Hat update for samba Critical: Moderately critical Where: From local network Impact: System access Released: 2007-05-15 Red Hat has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious users and by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25257/ -- [SA25256] Mandriva update for samba Critical: Moderately critical Where: From local network Impact: Privilege escalation, System access Released: 2007-05-15 Mandriva has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious users to perform certain actions with escalated privileges and to compromise a vulnerable system, and by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25256/ -- [SA25251] Ubuntu update for samba Critical: Moderately critical Where: From local network Impact: Privilege escalation, System access Released: 2007-05-16 Ubuntu has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious users to perform certain actions with escalated privileges and to compromise a vulnerable system, and by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25251/ -- [SA25246] Slackware update for samba Critical: Moderately critical Where: From local network Impact: Privilege escalation, System access Released: 2007-05-15 Slackware has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious users to perform certain actions with escalated privileges and to compromise a vulnerable system, and by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25246/ -- [SA25241] rPath update for samba and samba-swat Critical: Moderately critical Where: From local network Impact: Privilege escalation, System access Released: 2007-05-15 rPath has issued an update for samba and samba-swat. This fixes some vulnerabilities, which can be exploited by malicious users to perform certain actions with escalated privileges and to compromise a vulnerable system, and by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25241/ -- [SA25232] Samba Multiple Vulnerabilities Critical: Moderately critical Where: From local network Impact: Privilege escalation, System access Released: 2007-05-15 Some vulnerabilities have been reported in Samba, which can be exploited by malicious users to perform certain actions with escalated privileges and to compromise a vulnerable system, and by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25232/ -- [SA25293] Debian update for quagga Critical: Less critical Where: From remote Impact: DoS Released: 2007-05-17 Debian has issued an update for quagga. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25293/ -- [SA25281] Ayava Products Gnu GCC fastjar Directory Traversal Critical: Less critical Where: From remote Impact: System access Released: 2007-05-16 Avaya has acknowledged some vulnerabilities in various Avaya products, which can potentially be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25281/ -- [SA25280] Red Hat update for tomcat Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-05-15 Red Hat has issued an update for tomcat. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/25280/ -- [SA25273] Slackware update for libpng Critical: Less critical Where: From remote Impact: DoS Released: 2007-05-17 Slackware has issued an update for libpng. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25273/ -- [SA25268] rPath update for libpng Critical: Less critical Where: From remote Impact: DoS Released: 2007-05-17 rPath has issued an update for libpng. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25268/ -- [SA25264] Red Hat update for bluez-utils Critical: Less critical Where: From remote Impact: System access Released: 2007-05-15 Red Hat has issued an update for bluez-utils. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25264/ -- [SA25263] Debian update for qt4-x11 Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-05-16 Debian has issued an update for qt4-x11. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct cross-site scripting attacks in applications using the library. Full Advisory: http://secunia.com/advisories/25263/ -- [SA25236] Debian update for squirrelmail Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-05-15 Debian has issued an update for squirrelmail. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks. Full Advisory: http://secunia.com/advisories/25236/ -- [SA25238] Gentoo update for postgresql Critical: Less critical Where: From local network Impact: Privilege escalation Released: 2007-05-11 Gentoo has issued an update for postgresql. This fixes a security issue, which potentially can be exploited by malicious users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/25238/ -- [SA25291] Adobe Version Cue Installation Disables Firewall Security Issue Critical: Less critical Where: Local system Impact: Security Bypass Released: 2007-05-17 A security issue has been reported in Adobe Version Cue, which may result in the firewall being disabled. Full Advisory: http://secunia.com/advisories/25291/ -- [SA25267] rPath update for shadow Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-05-14 rPath has issued an update for shadow. This fixes a security issue, which can potentially be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/25267/ Other:-- [SA25302] 3Com TippingPoint IPS HTTP Unicode Encoding Detection Bypass Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-05-16 A vulnerability has been reported in TippingPoint IPS, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/25302/ -- [SA25285] Cisco Products HTTP Unicode Encoding Detection Bypass Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-05-15 A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/25285/ -- [SA25266] T-Com Speedport Login Brute Force Weakness Critical: Not critical Where: From local network Impact: Brute force Released: 2007-05-14 Michael Domberg has reported a weakness in T-Com Speedport, which can be exploited by malicious people to brute force an administrative user's password. Full Advisory: http://secunia.com/advisories/25266/ Cross Platform:-- [SA25303] Glossword "sys[path_addon]" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-05-17 BeyazKurt has discovered a vulnerability in Glossword, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25303/ -- [SA25295] Sun JDK ICC and BMP Parser Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-05-16 Chris Evans has reported some vulnerabilities in Sun JDK, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25295/ -- [SA25283] BEA JRockit Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Security Bypass, Privilege escalation, System access Released: 2007-05-15 Some vulnerabilities have been reported in JRockit, which can be exploited by malicious people to bypass certain security restrictions or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25283/ -- [SA25272] Geeklog Media Gallery Module "_MG_CONF[path_html]" File Inclusion Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2007-05-15 ThE TiGeR has discovered a vulnerability in the Media Gallery module for Geeklog, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25272/ -- [SA25271] Linksnet Newsfeed "dirpath_linksnet_newsfeed" File Inclusion Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2007-05-15 ThE TiGeR has discovered a vulnerability in Linksnet Newsfeed, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25271/ -- [SA25297] FAQEngine "questionref" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-05-17 Silentz has reported a vulnerability in FAQEngine, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25297/ -- [SA25296] SimpNews "newsnr" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-05-17 Silentz has reported a vulnerability in SimpNews, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25296/ -- [SA25294] Little cms ICC Profile Parsing Buffer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2007-05-16 Chris Evans has reported a vulnerability in Little cms, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25294/ -- [SA25284] BEA Products Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Brute force, Exposure of sensitive information, DoS Released: 2007-05-15 Some vulnerabilities and two security issues have been reported in BEA WebLogic, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and conduct script insertion attacks, and by malicious people to bypass certain security restrictions, brute force an administrator's password, conduct cross-site scripting attacks, and cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25284/ -- [SA25279] SonicBB SQL Injection and Cross-Site Scripting Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data, Exposure of sensitive information Released: 2007-05-15 Jesper Jurcenoks has discovered some vulnerabilities in SonicBB, which can be exploited by malicious people to conduct SQL injection attacks or cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25279/ -- [SA25262] PinkCrow Designs Gallery "src" Directory Traversal Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-05-14 Dj7xpl has discovered a vulnerability in PinkCrow Designs Gallery, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/25262/ -- [SA25261] R2K Gallery "lang2" Local File Inclusion Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-05-14 Dj7xpl has discovered a vulnerability in R2K Gallery, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/25261/ -- [SA25250] CommuniGate Pro WebMail Script Insertion Vulnerability Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2007-05-14 Alla Bezroutchko has reported a vulnerability in CommuniGate Pro, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/25250/ -- [SA25243] H-Sphere SiteStudio "template" Information Disclosure Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2007-05-11 A vulnerability has been reported in H-Sphere SiteStudio, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/25243/ -- [SA25240] Connect Daily Unspecified Security Issue Critical: Moderately critical Where: From remote Impact: Unknown Released: 2007-05-14 A security issue with an unknown impact has been reported in Connect Daily. Full Advisory: http://secunia.com/advisories/25240/ -- [SA25237] iFdate Administrative Section Security Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2007-05-16 Liz0zim has reported a vulnerability in iFdate, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/25237/ -- [SA25235] libexif EXIF Information Handling Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2007-05-11 Victor Stinner has reported a vulnerability in libexif, which can be exploited by malicious people to cause a DoS and potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/25235/ -- [SA25234] Thyme "eid" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-05-11 Warlord has reported a vulnerability in Thyme, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25234/ -- [SA25306] PHP SOAP Extension HTTP Authentication Weak Nonce Critical: Less critical Where: From remote Impact: Security Bypass, Brute force Released: 2007-05-16 Stefan Esser has reported a weakness in PHP, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/25306/ -- [SA25299] xajax Unspecified Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-05-16 A vulnerability has been reported in xajax, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25299/ -- [SA25298] Xoops Resmanager Module "id_reserv" SQL Injection Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2007-05-16 ajann has discovered a vulnerability in the Resmanager module for Xoops, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25298/ -- [SA25292] libpng tRNS Chunk Denial of Service Critical: Less critical Where: From remote Impact: DoS Released: 2007-05-16 A vulnerability has been reported in libpng, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25292/ -- [SA25249] EQdkp "show" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-05-15 kefka has discovered some vulnerabilities in EQdkp, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25249/ -- [SA25244] ClamAV OLE2 Parser Denial of Service Critical: Less critical Where: From remote Impact: DoS Released: 2007-05-11 Victor Stinner has reported a vulnerability in ClamAV, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25244/ -- [SA25242] TeamSpeak Server Privilege Escalation and Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting, Privilege escalation Released: 2007-05-14 Gilberto Ficara has reported a security issue and some vulnerabilities in TeamSpeak, which can be exploited by malicious users to gain escalated privileges and by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25242/ -- [SA25301] MySQL Two Privilege Escalation Security Issues Critical: Less critical Where: From local network Impact: Privilege escalation Released: 2007-05-17 Two security issues have been reported in MySQL, which can be exploited by malicious users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/25301/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _____________________________________________________ Attend Black Hat USA, July 28-August 2 in Las Vegas, the world's premier technical event for ICT security experts. Featuring 30 hands-on training courses and 90 Briefings presentations with lots of new content and new tools. Network with 4,000 delegates from 70 nations. Visit product displays by 30 top sponsors in a relaxed setting. Rates increase on June 1 so register today. http://www.blackhat.com
This archive was generated by hypermail 2.1.3 : Thu May 17 2007 - 23:39:14 PDT