[ISN] Secunia Weekly Summary - Issue: 2007-20

From: InfoSec News (alerts@private)
Date: Thu May 17 2007 - 23:30:24 PDT


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2007-05-10 - 2007-05-17                        

                       This week: 68 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.

The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.

 --

NEW BLOG ENTRY
 
Since its release in December of last year, the free, online Secunia
Software Inspector has conducted over 350,000 inspections. These
inspections have identified 4.9 million popular applications, and out
of those, 1.4 million applications were found to be lacking critical
security patches from the vendors.

While most people are aware of the need to update their anti-virus
patterns and to raise their firewall shields, it appears that too many
users either don't know that their systems are vulnerable to
significant issues or that they simply don't want to spend the
necessary time scouring for vulnerability information and the relevant
vendor patches to properly address the issues.

This fact is further highlighted if we dig deeper into the figures
behind the fact that 28% of all detected applications by the Software
Inspector are vulnerable...

Read More:
http://secunia.com/blog/11/

========================================================================
2) This Week in Brief:

Secunia Research has discovered two vulnerabilities in Centennial
Discovery, which can be exploited by malicious people to compromise a
vulnerable system.

Successful exploitation allows execution of arbitrary code with SYSTEM
privileges.

The same vulnerabilities also affect:
 - Symantec Discovery 6.x
 - Numara Asset Manager 8.x
 
References:
http://secunia.com/advisories/24090/
http://secunia.com/advisories/24281/
http://secunia.com/advisories/24329/

 --

Will Dorman has reported a vulnerability in Norton Personal Firewall,
which can be exploited by malicious people to compromise a user's
system.

Successful exploitation allows execution of arbitrary code.

Product updates to correct the problem are available through
LiveUpdate.

Reference:
http://secunia.com/advisories/25290/

 --

VIRUS ALERTS:

During the past week Secunia collected 178 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA24535] Internet Explorer 7 navcancl.htm Cross-Site Scripting
              Vulnerability
2.  [SA23769] Internet Explorer Multiple Vulnerabilities
3.  [SA25188] MySQL IF Query Denial of Service Vulnerability
4.  [SA25199] Cisco IOS FTP Server Multiple Vulnerabilities
5.  [SA25244] ClamAV OLE2 Parser Denial of Service
6.  [SA25172] Symantec Products NAVOpts.dll ActiveX Control Security
              Bypass Vulnerability
7.  [SA25226] SUSE update for kernel
8.  [SA25183] Microsoft Exchange Multiple Vulnerabilities
9.  [SA25202] CA Products Buffer Overflow and Privilege Escalation
              Vulnerabilities
10. [SA25224] AForum "CommonAbsDir" and "header" File Inclusion

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA25290] Norton Personal Firewall ISAlertDataCOM ActiveX Control
Buffer Overflow
[SA25258] PrecisionID Data Matrix ActiveX Barcode Control Buffer
Overflow
[SA25253] PrecisionID Linear Barcode ActiveX Control Buffer Overflow
[SA25248] TinyIdentD Long Query Request Buffer Overflow Vulnerability
[SA25245] Notepad++ Ruby Source File Buffer Overflow Vulnerability
[SA25231] IDAutomation Linear Barcode ActiveX Control Buffer Overflow
[SA25286] Caucho Resin Multiple Information Disclosure Vulnerabilities
[SA25277] WinImage FAT Image Long Pathname Buffer Overflow
Vulnerabilities
[SA25265] W1L3D4 Philboard "forumid" SQL Injection Vulnerability
[SA25252] yEnc32 NTX Decoding Filename Buffer Overflow Vulnerability
[SA25247] EfesTECH Haber "id" SQL Injection
[SA25282] Eudora SMTP Server Reply Processing Buffer Overflow
Vulnerability
[SA25275] HP Systems Insight Manager Session Fixation Vulnerability
[SA25300] CA BrightStor ARCserve Backup Two Denial of Service
Vulnerabilities

UNIX/Linux:
[SA25274] NagiosQL "functions/prepend_adm.php" File Inclusion
[SA25260] MonAlbum "admin_configuration.php" PHP Code Injection
[SA25255] Trustix Updates for Multiple Packages
[SA25254] YAAP "root_path" File Inclusion Vulnerability
[SA25288] Red Hat update for kernel
[SA25239] SUSE Updates for Multiple Packages
[SA25270] Debian update for samba
[SA25259] Gentoo update for samba
[SA25257] Red Hat update for samba
[SA25256] Mandriva update for samba
[SA25251] Ubuntu update for samba
[SA25246] Slackware update for samba
[SA25241] rPath update for samba and samba-swat
[SA25232] Samba Multiple Vulnerabilities
[SA25293] Debian update for quagga
[SA25281] Ayava Products Gnu GCC fastjar Directory Traversal
[SA25280] Red Hat update for tomcat
[SA25273] Slackware update for libpng
[SA25268] rPath update for libpng
[SA25264] Red Hat update for bluez-utils
[SA25263] Debian update for qt4-x11
[SA25236] Debian update for squirrelmail
[SA25238] Gentoo update for postgresql
[SA25291] Adobe Version Cue Installation Disables Firewall Security
Issue
[SA25267] rPath update for shadow

Other:
[SA25302] 3Com TippingPoint IPS HTTP Unicode Encoding Detection Bypass
[SA25285] Cisco Products HTTP Unicode Encoding Detection Bypass
[SA25266] T-Com Speedport Login Brute Force Weakness

Cross Platform:
[SA25303] Glossword "sys[path_addon]" File Inclusion Vulnerability
[SA25295] Sun JDK ICC and BMP Parser Vulnerabilities
[SA25283] BEA JRockit Multiple Vulnerabilities
[SA25272] Geeklog Media Gallery Module "_MG_CONF[path_html]" File
Inclusion
[SA25271] Linksnet Newsfeed "dirpath_linksnet_newsfeed" File Inclusion
[SA25297] FAQEngine "questionref" SQL Injection Vulnerability
[SA25296] SimpNews "newsnr" SQL Injection Vulnerability
[SA25294] Little cms ICC Profile Parsing Buffer Overflow Vulnerability
[SA25284] BEA Products Multiple Vulnerabilities
[SA25279] SonicBB SQL Injection and Cross-Site Scripting
[SA25262] PinkCrow Designs Gallery "src" Directory Traversal
[SA25261] R2K Gallery "lang2" Local File Inclusion
[SA25250] CommuniGate Pro WebMail Script Insertion Vulnerability
[SA25243] H-Sphere SiteStudio "template" Information Disclosure
[SA25240] Connect Daily Unspecified Security Issue
[SA25237] iFdate Administrative Section Security Bypass
[SA25235] libexif EXIF Information Handling Vulnerability
[SA25234] Thyme "eid" SQL Injection Vulnerability
[SA25306] PHP SOAP Extension HTTP Authentication Weak Nonce
[SA25299] xajax Unspecified Cross-Site Scripting Vulnerability
[SA25298] Xoops Resmanager Module "id_reserv" SQL Injection
[SA25292] libpng tRNS Chunk Denial of Service
[SA25249] EQdkp "show" Cross-Site Scripting
[SA25244] ClamAV OLE2 Parser Denial of Service
[SA25242] TeamSpeak Server Privilege Escalation and Cross-Site
Scripting
[SA25301] MySQL Two Privilege Escalation Security Issues

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA25290] Norton Personal Firewall ISAlertDataCOM ActiveX Control
Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-05-17

Will Dorman has reported a vulnerability in Norton Personal Firewall,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/25290/

 --

[SA25258] PrecisionID Data Matrix ActiveX Barcode Control Buffer
Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-05-14

shinnai has discovered a vulnerability in PrecisionID Data Matrix
ActiveX Barcode Control, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25258/

 --

[SA25253] PrecisionID Linear Barcode ActiveX Control Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-05-16

shinnai has discovered a vulnerability in PrecisionID Linear Barcode
ActiveX Control, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25253/

 --

[SA25248] TinyIdentD Long Query Request Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-05-15

Maarten Boone has discovered a vulnerability in TinyIdentD, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25248/

 --

[SA25245] Notepad++ Ruby Source File Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-05-14

vade79 has discovered a vulnerability in Notepad++, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25245/

 --

[SA25231] IDAutomation Linear Barcode ActiveX Control Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-05-14

shinnai has discovered a vulnerability in IDAutomation Linear Barcode
ActiveX Control, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25231/

 --

[SA25286] Caucho Resin Multiple Information Disclosure Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-05-15

Derek Abdine has reported some vulnerabilities in Caucho Resin, which
can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/25286/

 --

[SA25277] WinImage FAT Image Long Pathname Buffer Overflow
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-05-17

Tan Chew Keong has reported two vulnerabilities in WinImage, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25277/

 --

[SA25265] W1L3D4 Philboard "forumid" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-05-14

gsy and kerem125 have discovered a vulnerability in W1L3D4 Philboard,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/25265/

 --

[SA25252] yEnc32 NTX Decoding Filename Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-05-14

Tan Chew Keong has reported a vulnerability in yEnc32, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25252/

 --

[SA25247] EfesTECH Haber "id" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-05-14

CyberGhost has reported a vulnerability in EfesTECH Haber, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25247/

 --

[SA25282] Eudora SMTP Server Reply Processing Buffer Overflow
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2007-05-16

Krystian Kloskowski has discovered a vulnerability in Eudora, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25282/

 --

[SA25275] HP Systems Insight Manager Session Fixation Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Hijacking
Released:    2007-05-15

Luka Treiber and Aljosa Ocepek have reported a vulnerability in HP
Systems Insight Manager, which can be exploited by malicious people to
conduct session fixation attacks.

Full Advisory:
http://secunia.com/advisories/25275/

 --

[SA25300] CA BrightStor ARCserve Backup Two Denial of Service
Vulnerabilities

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-05-17

M. Shirk has reported two vulnerabilities in BrightStor ARCserve
Backup, which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/25300/


UNIX/Linux:--

[SA25274] NagiosQL "functions/prepend_adm.php" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-05-15

Some vulnerabilities have been discovered in NagiosQL, which can be
exploited by malicious people to disclose sensitive information or to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25274/

 --

[SA25260] MonAlbum "admin_configuration.php" PHP Code Injection

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-05-14

Dj7xpl has reported some vulnerabilities in MonAlbum, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25260/

 --

[SA25255] Trustix Updates for Multiple Packages

Critical:    Highly critical
Where:       From remote
Impact:      Unknown, Security Bypass, Manipulation of data, Brute
force, Exposure of system information, Exposure of sensitive
information, Privilege escalation, DoS, System access
Released:    2007-05-17

Trustix has issued updates for multiple packages. These fix some
vulnerabilities where some have unknown impact and others can be
exploited by malicious, local users to gain escalated privileges, by
malicious users to perform actions with escalated privileges,
manipulate certain data, disclose potentially sensitive information,
bypass certain security restrictions, to cause a DoS (Denial of
Service) and to compromise a vulnerable system, and by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25255/

 --

[SA25254] YAAP "root_path" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-05-15

3l3ctric-Cracker has reported a vulnerability in YAAP, which can be
exploited by malicious people to disclose sensitive information or to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25254/

 --

[SA25288] Red Hat update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS
Released:    2007-05-17

Red Hat has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service) and by malicious people to potentially
bypass certain security restrictions or to cause a DoS.

Full Advisory:
http://secunia.com/advisories/25288/

 --

[SA25239] SUSE Updates for Multiple Packages

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, System access
Released:    2007-05-16

SUSE has issued updates for multiple packages. These fix some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting attacks or potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/25239/

 --

[SA25270] Debian update for samba

Critical:    Moderately critical
Where:       From local network
Impact:      Privilege escalation, System access
Released:    2007-05-16

Debian has issued an update for samba. This fixes some vulnerabilities,
which can be exploited by malicious users to perform certain actions
with escalated privileges and to compromise a vulnerable system, and by
malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25270/

 --

[SA25259] Gentoo update for samba

Critical:    Moderately critical
Where:       From local network
Impact:      Privilege escalation, System access
Released:    2007-05-16

Gentoo has issued an update for samba. This fixes some vulnerabilities,
which can be exploited by malicious users to perform certain actions
with escalated privileges and to compromise a vulnerable system, and by
malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25259/

 --

[SA25257] Red Hat update for samba

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-05-15

Red Hat has issued an update for samba. This fixes some
vulnerabilities, which can be exploited by malicious users and by
malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25257/

 --

[SA25256] Mandriva update for samba

Critical:    Moderately critical
Where:       From local network
Impact:      Privilege escalation, System access
Released:    2007-05-15

Mandriva has issued an update for samba. This fixes some
vulnerabilities, which can be exploited by malicious users to perform
certain actions with escalated privileges and to compromise a
vulnerable system, and by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/25256/

 --

[SA25251] Ubuntu update for samba

Critical:    Moderately critical
Where:       From local network
Impact:      Privilege escalation, System access
Released:    2007-05-16

Ubuntu has issued an update for samba. This fixes some vulnerabilities,
which can be exploited by malicious users to perform certain actions
with escalated privileges and to compromise a vulnerable system, and by
malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25251/

 --

[SA25246] Slackware update for samba

Critical:    Moderately critical
Where:       From local network
Impact:      Privilege escalation, System access
Released:    2007-05-15

Slackware has issued an update for samba. This fixes some
vulnerabilities, which can be exploited by malicious users to perform
certain actions with escalated privileges and to compromise a
vulnerable system, and by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/25246/

 --

[SA25241] rPath update for samba and samba-swat

Critical:    Moderately critical
Where:       From local network
Impact:      Privilege escalation, System access
Released:    2007-05-15

rPath has issued an update for samba and samba-swat. This fixes some
vulnerabilities, which can be exploited by malicious users to perform
certain actions with escalated privileges and to compromise a
vulnerable system, and by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/25241/

 --

[SA25232] Samba Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      Privilege escalation, System access
Released:    2007-05-15

Some vulnerabilities have been reported in Samba, which can be
exploited by malicious users to perform certain actions with escalated
privileges and to compromise a vulnerable system, and by malicious
people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25232/

 --

[SA25293] Debian update for quagga

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-05-17

Debian has issued an update for quagga. This fixes a vulnerability,
which can be exploited by malicious users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/25293/

 --

[SA25281] Ayava Products Gnu GCC fastjar Directory Traversal

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2007-05-16

Avaya has acknowledged some vulnerabilities in various Avaya products,
which can potentially be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/25281/

 --

[SA25280] Red Hat update for tomcat

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-05-15

Red Hat has issued an update for tomcat. This fixes a security issue,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/25280/

 --

[SA25273] Slackware update for libpng

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-05-17

Slackware has issued an update for libpng. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/25273/

 --

[SA25268] rPath update for libpng

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-05-17

rPath has issued an update for libpng. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/25268/

 --

[SA25264] Red Hat update for bluez-utils

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2007-05-15

Red Hat has issued an update for bluez-utils. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25264/

 --

[SA25263] Debian update for qt4-x11

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-05-16

Debian has issued an update for qt4-x11. This fixes a vulnerability,
which potentially can be exploited by malicious people to conduct
cross-site scripting attacks in applications using the library.

Full Advisory:
http://secunia.com/advisories/25263/

 --

[SA25236] Debian update for squirrelmail

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-05-15

Debian has issued an update for squirrelmail. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting and cross-site request forgery attacks.

Full Advisory:
http://secunia.com/advisories/25236/

 --

[SA25238] Gentoo update for postgresql

Critical:    Less critical
Where:       From local network
Impact:      Privilege escalation
Released:    2007-05-11

Gentoo has issued an update for postgresql. This fixes a security
issue, which potentially can be exploited by malicious users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/25238/

 --

[SA25291] Adobe Version Cue Installation Disables Firewall Security
Issue

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2007-05-17

A security issue has been reported in Adobe Version Cue, which may
result in the firewall being disabled.

Full Advisory:
http://secunia.com/advisories/25291/

 --

[SA25267] rPath update for shadow

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-05-14

rPath has issued an update for shadow. This fixes a security issue,
which can potentially be exploited by malicious, local users to perform
certain actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/25267/


Other:--

[SA25302] 3Com TippingPoint IPS HTTP Unicode Encoding Detection Bypass

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-05-16

A vulnerability has been reported in TippingPoint IPS, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/25302/

 --

[SA25285] Cisco Products HTTP Unicode Encoding Detection Bypass

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-05-15

A vulnerability has been reported in various Cisco products, which can
be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/25285/

 --

[SA25266] T-Com Speedport Login Brute Force Weakness

Critical:    Not critical
Where:       From local network
Impact:      Brute force
Released:    2007-05-14

Michael Domberg has reported a weakness in T-Com Speedport, which can
be exploited by malicious people to brute force an administrative
user's password.

Full Advisory:
http://secunia.com/advisories/25266/


Cross Platform:--

[SA25303] Glossword "sys[path_addon]" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-05-17

BeyazKurt has discovered a vulnerability in Glossword, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25303/

 --

[SA25295] Sun JDK ICC and BMP Parser Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-05-16

Chris Evans has reported some vulnerabilities in Sun JDK, which
potentially can be exploited by malicious people to cause a DoS (Denial
of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25295/

 --

[SA25283] BEA JRockit Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Privilege escalation, System access
Released:    2007-05-15

Some vulnerabilities have been reported in JRockit, which can be
exploited by malicious people to bypass certain security restrictions
or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25283/

 --

[SA25272] Geeklog Media Gallery Module "_MG_CONF[path_html]" File
Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-05-15

ThE TiGeR has discovered a vulnerability in the Media Gallery module
for Geeklog, which can be exploited by malicious people to disclose
sensitive information or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25272/

 --

[SA25271] Linksnet Newsfeed "dirpath_linksnet_newsfeed" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-05-15

ThE TiGeR has discovered a vulnerability in Linksnet Newsfeed, which
can be exploited by malicious people to disclose sensitive information
or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25271/

 --

[SA25297] FAQEngine "questionref" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-05-17

Silentz has reported a vulnerability in FAQEngine, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25297/

 --

[SA25296] SimpNews "newsnr" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-05-17

Silentz has reported a vulnerability in SimpNews, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25296/

 --

[SA25294] Little cms ICC Profile Parsing Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-05-16

Chris Evans has reported a vulnerability in Little cms, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25294/

 --

[SA25284] BEA Products Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Brute force,
Exposure of sensitive information, DoS
Released:    2007-05-15

Some vulnerabilities and two security issues have been reported in BEA
WebLogic, which can be exploited by malicious users to disclose
sensitive information, bypass certain security restrictions, and
conduct script insertion attacks, and by malicious people to bypass
certain security restrictions, brute force an administrator's password,
conduct cross-site scripting attacks, and cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/25284/

 --

[SA25279] SonicBB SQL Injection and Cross-Site Scripting

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
sensitive information
Released:    2007-05-15

Jesper Jurcenoks has discovered some vulnerabilities in SonicBB, which
can be exploited by malicious people to conduct SQL injection attacks
or cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25279/

 --

[SA25262] PinkCrow Designs Gallery "src" Directory Traversal

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-05-14

Dj7xpl has discovered a vulnerability in PinkCrow Designs Gallery,
which can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/25262/

 --

[SA25261] R2K Gallery "lang2" Local File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-05-14

Dj7xpl has discovered a vulnerability in R2K Gallery, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/25261/

 --

[SA25250] CommuniGate Pro WebMail Script Insertion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-05-14

Alla Bezroutchko has reported a vulnerability in CommuniGate Pro, which
can be exploited by malicious people to conduct script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/25250/

 --

[SA25243] H-Sphere SiteStudio "template" Information Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-05-11

A vulnerability has been reported in H-Sphere SiteStudio, which can be
exploited by malicious people to disclose potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/25243/

 --

[SA25240] Connect Daily Unspecified Security Issue

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown
Released:    2007-05-14

A security issue with an unknown impact has been reported in Connect
Daily.

Full Advisory:
http://secunia.com/advisories/25240/

 --

[SA25237] iFdate Administrative Section Security Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-05-16

Liz0zim has reported a vulnerability in iFdate, which can be exploited
by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/25237/

 --

[SA25235] libexif EXIF Information Handling Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-05-11

Victor Stinner has reported a vulnerability in libexif, which can be
exploited by malicious people to cause a DoS and potentially compromise
an application using the library.

Full Advisory:
http://secunia.com/advisories/25235/

 --

[SA25234] Thyme "eid" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-05-11

Warlord has reported a vulnerability in Thyme, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25234/

 --

[SA25306] PHP SOAP Extension HTTP Authentication Weak Nonce

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Brute force
Released:    2007-05-16

Stefan Esser has reported a weakness in PHP, which can be exploited by
malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/25306/

 --

[SA25299] xajax Unspecified Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-05-16

A vulnerability has been reported in xajax, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25299/

 --

[SA25298] Xoops Resmanager Module "id_reserv" SQL Injection

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-05-16

ajann has discovered a vulnerability in the Resmanager module for
Xoops, which can be exploited by malicious users to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/25298/

 --

[SA25292] libpng tRNS Chunk Denial of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-05-16

A vulnerability has been reported in libpng, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25292/

 --

[SA25249] EQdkp "show" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-05-15

kefka has discovered some vulnerabilities in EQdkp, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25249/

 --

[SA25244] ClamAV OLE2 Parser Denial of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-05-11

Victor Stinner has reported a vulnerability in ClamAV, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25244/

 --

[SA25242] TeamSpeak Server Privilege Escalation and Cross-Site
Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, Privilege escalation
Released:    2007-05-14

Gilberto Ficara has reported a security issue and some vulnerabilities
in TeamSpeak, which can be exploited by malicious users to gain
escalated privileges and by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/25242/

 --

[SA25301] MySQL Two Privilege Escalation Security Issues

Critical:    Less critical
Where:       From local network
Impact:      Privilege escalation
Released:    2007-05-17

Two security issues have been reported in MySQL, which can be exploited
by malicious users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/25301/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_____________________________________________________
Attend Black Hat USA, July 28-August 2 in Las Vegas, 
the world's premier technical event for ICT security 
experts. Featuring 30 hands-on training courses and 
90 Briefings presentations with lots of new content 
and new tools. Network with 4,000 delegates from 
70 nations.   Visit product displays by 30 top
sponsors in a relaxed setting. Rates increase on 
June 1 so register today. http://www.blackhat.com



This archive was generated by hypermail 2.1.3 : Thu May 17 2007 - 23:39:14 PDT