======================================================================== The Secunia Weekly Advisory Summary 2007-05-31 - 2007-06-07 This week: 76 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ======================================================================== 2) This Week in Brief: Two extremely critical vulnerabilities in Yahoo! Messenger were made public this week, which could allow an attacker to gain control of a vulnerable system. The vulnerabilities are due to boundary errors within two Yahoo! Messenger ActiveX controls: the Yahoo! Webcam Upload and the Yahoo! Webcam Viewer controls. These vulnerabilities could be exploited by assigning an overly long string to the Server property and then calling the Send() or Receive() method, respectively. Successful exploitation allows an attacker to execute arbitrary code on the system. Yahoo! has yet to release a patch for these vulnerabilities; hence users are urged to refrain from browsing untrusted sites that may host exploit code for these vulnerabilities, or modify their system registries to set the kill-bit for the affected ActiveX controls. For more information, please refer to: http://secunia.com/advisories/25547/ -- Two vulnerabilities were reported in the Computer Associates (CA) Anti-virus engine, which could be exploited by malicious people to gain access to a vulnerable system. A boundary error in a library file when processing CAB files can be exploited to cause a stack-based buffer overflow via a specially crafted CAB file with an overly long filename. An input validation error when processing the coffFiles field in CAB files can also be exploited to cause a stack-based buffer overflow. Various CA products are affected. The vendor has released a patch for these vulnerabilities via content update 3.60. Users are strongly encouraged to check that their systems have been patched. For more information, and a complete list of affected products: http://secunia.com/advisories/25570/ -- Secunia Research has discovered several vulnerabilities in Mplayer, which can be exploited by malicious people to compromise a user's system. A boundary error within the "cddb_query_parse()" function in stream/stream_cddb.c when parsing album titles can be exploited to cause a stack-based buffer overflow. This can be exploited by tricking a user into parsing malicious CDDB entries with overly long album titles. Successful exploitation allows execution of arbitrary code. Boundary errors within the "cddb_parse_matches_list()" and "cddb_read_parse()" functions in stream/stream_cddb.c when parsing album and category titles can be exploited to cause stack-based buffer overflows. These can be exploited by tricking a user into parsing malicious CDDB entries with overly long album or category titles. Successful exploitation allows execution of arbitrary code, but may require that the user connects to a malicious server. The vendor has released a patch for version 1.0rc1. Users are advised to apply the patch immediately. For more information: http://secunia.com/advisories/24302/ -- VIRUS ALERTS: During the past week Secunia collected 356 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA25481] Mozilla Firefox / Seamonkey "resource://" Information Disclosure 2. [SA25469] Mozilla Firefox Multiple Vulnerabilities 3. [SA25456] PHP Integer Overflow Vulnerability and Security Bypass 4. [SA25130] Apple QuickTime Java Extension Two Vulnerabilities 5. [SA23769] Internet Explorer Multiple Vulnerabilities 6. [SA25514] Logitech VideoCall Multiple ActiveX Controls Buffer Overflows 7. [SA25505] Linux Kernel VFAT IOCTLs Denial of Service 8. [SA25498] Novell GroupWise Authentication Credentials Disclosure Security Issue 9. [SA25434] PHP crypt() Race Condition Vulnerability 10. [SA25487] PHP JackKnife Gallery System Two SQL Injection Vulnerabilities ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA25547] Yahoo! Messenger Two ActiveX Controls Buffer Overflows [SA25570] CA Anti-Virus Engine CAB Archive Processing Buffer Overflows [SA25568] FlipViewer FViewerLoading ActiveX Control Buffer Overflows [SA25514] Logitech VideoCall Multiple ActiveX Controls Buffer Overflows [SA25509] Macrovision FLEXnet boisweb.dll ActiveX Control Buffer Overflows [SA25508] DVD X Player PLF File Parsing Buffer Overflow Vulnerability [SA25501] Macrovision FLEXnet Connect DWUpdateService ActiveX Control Insecure Methods [SA25500] Authentium Command Antivirus ActiveX Controls Buffer Overflows [SA25565] Free-PayPal-Shopping-Cart "news_id" SQL Injection Vulnerability [SA25545] Omegasoft Insel Cross-Site Scripting and SQL Injection [SA25543] Symantec Reporting Server Three Vulnerabilities [SA25537] Symantec Veritas Storage Foundation Scheduler Service Authentication Bypass [SA25564] Internet Explorer Page Loading Race Condition and URL Spoofing [SA25527] ADPLAN SEO Cross-Site Scripting Vulnerability [SA25507] Hitachi Products Collaboration-File Sharing Cross-Site Scripting Vulnerability [SA25539] Symantec Ghost Solution Suite Three Denial of Service Vulnerabilities UNIX/Linux: [SA25578] Amavis file Integer Underflow and Denial of Service [SA25555] Mandriva update for mplayer [SA25534] Slackware update for Mozilla products [SA25533] Ubuntu update for firefox [SA25522] Xoops iContent Module "spaw_root" File Inclusion [SA25582] SUSE update for asterisk [SA25569] Gentoo update for libexif [SA25562] Atom PhotoBlog Script Insertion and Cross-Site Scripting [SA25553] Mandriva update for clamav [SA25551] Gentoo update for evolution [SA25540] rPath update for libexif [SA25535] Slackware update for php5 [SA25525] Kolab Server ClamAV Denial of Service [SA25523] SUSE update for clamav [SA25511] Hitachi TP1/NET/OSI-TP-Extended Denial of Service Vulnerability [SA25496] Ubuntu update for mozilla-thunderbird [SA25495] Avaya Products FreeType BDF Font Integer Overflow Vulnerability [SA25567] HP-UX update for CIFS Server [SA25561] LightBlog "id" Cross-Site Scripting Vulnerability [SA25554] Mandriva update for libpng [SA25544] Mandriva update for file [SA25530] Mandriva update for util-linux [SA25566] Sun Solaris Management Console Privilege Escalation [SA25497] Avaya Products CUPS Incomplete SSL Negotiation Denial of Service [SA25494] Hitachi XP/W Map I/O Service Denial of Service Vulnerability [SA25519] Mandriva update for lha [SA25550] Gentoo update for elinks [SA25546] rPath update for mutt [SA25531] Sun Solaris xscreensaver Arbitrary Command Execution [SA25529] Red Hat update for mutt [SA25515] Mandriva update for mutt [SA25505] Linux Kernel VFAT IOCTLs Denial of Service Other: [SA25563] F5 FirePass 4100 SSL VPN "username" Command Injection [SA25499] Apple Xserve Lights-Out Management Firmware IPMI Vulnerability Cross Platform: [SA25572] PBLang "lang" Local File Inclusion Vulnerability [SA25548] EQdkp "rank" SQL Injection Vulnerability [SA25542] IBM Lotus Domino Unspecified Denial of Service Vulnerability [SA25524] Particle Gallery "editcomment" SQL Injection Vulnerability [SA25518] Basic Analysis and Security Engine Multiple Security Bypass [SA25513] Quick.Cart "sLanguage" Local File Inclusion Vulnerability [SA25584] AIOCP "aiocp_dp" Cross-Site Scripting Vulnerability [SA25557] Cacti "graph_image.php" Denial of Service [SA25552] WordPress XMLRPC "wp.suggestCategories" SQL Injection [SA25549] Beatnik Extension for Firefox Feed Script Insertion Vulnerability [SA25538] EQDKP Attunement and Key Tracker Plugin Cross-Site Scripting [SA25532] WebSVN Cross-Site Scripting Vulnerability [SA25526] Chameleon CMS Session Fixation Vulnerability [SA25521] Calimero.CMS Session Fixation Vulnerability [SA25517] Codelib Linker "cat" and "kword" Cross-Site Scripting Vulnerabilities [SA25512] SSL-Explorer Multiple Vulnerabilities [SA25510] Meneame Cross-Site Scripting Vulnerability [SA25506] @Mail "ReadMsg.php" Cross-Site Scripting Vulnerability [SA25503] Aigaion Authors and Publications Script Insertion Vulnerabilities [SA25502] WebStudio CMS "pageid" Cross-Site Scripting [SA25498] Novell GroupWise Authentication Credentials Disclosure Security Issue [SA25493] HP System Management Homepage Unspecified Cross-Site Scripting [SA25536] APC PowerChute Network Shutdown Directory Traversal [SA25520] IBM Lotus Domino Agent Signature Verification Vulnerability [SA25516] Symantec Veritas Storage Foundation Veritas Volume Replicator Denial of Service [SA25541] WordPress Unmoderated Comments Disclosure Security Issue ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA25547] Yahoo! Messenger Two ActiveX Controls Buffer Overflows Critical: Extremely critical Where: From remote Impact: System access Released: 2007-06-07 Danny has discovered two vulnerabilities in Yahoo! Messenger, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25547/ -- [SA25570] CA Anti-Virus Engine CAB Archive Processing Buffer Overflows Critical: Highly critical Where: From remote Impact: System access Released: 2007-06-06 Two vulnerabilities have been reported in the CA Anti-Virus engine, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25570/ -- [SA25568] FlipViewer FViewerLoading ActiveX Control Buffer Overflows Critical: Highly critical Where: From remote Impact: System access Released: 2007-06-06 Will Dormann has reported some vulnerabilities in FlipViewer, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25568/ -- [SA25514] Logitech VideoCall Multiple ActiveX Controls Buffer Overflows Critical: Highly critical Where: From remote Impact: System access Released: 2007-06-01 Will Dormann has discovered some vulnerabilities in Logitech VideoCall, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25514/ -- [SA25509] Macrovision FLEXnet boisweb.dll ActiveX Control Buffer Overflows Critical: Highly critical Where: From remote Impact: System access Released: 2007-06-05 TippingPoint has reported some vulnerabilities in Macrovision Update Service and FLEXnet Connect, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25509/ -- [SA25508] DVD X Player PLF File Parsing Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-06-04 n00b has discovered a vulnerability in DVD X Player, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25508/ -- [SA25501] Macrovision FLEXnet Connect DWUpdateService ActiveX Control Insecure Methods Critical: Highly critical Where: From remote Impact: System access Released: 2007-06-01 Will Dormann has reported some vulnerabilities in the Macrovision FLEXnet Connect Software Manager DWUpdateService ActiveX control, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25501/ -- [SA25500] Authentium Command Antivirus ActiveX Controls Buffer Overflows Critical: Highly critical Where: From remote Impact: System access Released: 2007-06-01 Will Dormann has reported some vulnerabilities in Authentium Command Antivirus, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25500/ -- [SA25565] Free-PayPal-Shopping-Cart "news_id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-06-07 kerem125 and gsy have reported a vulnerability in Free-PayPal-Shopping-Cart, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25565/ -- [SA25545] Omegasoft Insel Cross-Site Scripting and SQL Injection Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2007-06-06 MC.Iglo has reported some vulnerabilities in Omegasoft Insel, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/25545/ -- [SA25543] Symantec Reporting Server Three Vulnerabilities Critical: Moderately critical Where: From local network Impact: Security Bypass, Manipulation of data, Exposure of sensitive information Released: 2007-06-06 Three vulnerabilities have been reported in Symantec Reporting Server, which can be exploited by malicious people to gain knowledge of sensitive information, bypass certain security restrictions, or manipulate certain files. Full Advisory: http://secunia.com/advisories/25543/ -- [SA25537] Symantec Veritas Storage Foundation Scheduler Service Authentication Bypass Critical: Moderately critical Where: From local network Impact: Security Bypass Released: 2007-06-04 TippingPoint has reported a vulnerability in Symantec Veritas Storage Foundation, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/25537/ -- [SA25564] Internet Explorer Page Loading Race Condition and URL Spoofing Critical: Less critical Where: From remote Impact: Security Bypass, Spoofing Released: 2007-06-06 Michal Zalewski has reported two vulnerabilities in Internet Explorer, which potentially can be exploited by a malicious website to display a fake URL in the address bar or to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/25564/ -- [SA25527] ADPLAN SEO Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-07 A vulnerability has been reported in ADPLAN SEO, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25527/ -- [SA25507] Hitachi Products Collaboration-File Sharing Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-01 A vulnerability has been reported in various Hitachi products, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25507/ -- [SA25539] Symantec Ghost Solution Suite Three Denial of Service Vulnerabilities Critical: Less critical Where: From local network Impact: DoS Released: 2007-06-06 Three vulnerabilities have been reported in Symantec Ghost Solution Suite, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25539/ UNIX/Linux:-- [SA25578] Amavis file Integer Underflow and Denial of Service Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-06-06 A vulnerability and a security issue have been reported in Amavis, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25578/ -- [SA25555] Mandriva update for mplayer Critical: Highly critical Where: From remote Impact: System access Released: 2007-06-05 Mandriva has issued an update for mplayer. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25555/ -- [SA25534] Slackware update for Mozilla products Critical: Highly critical Where: From remote Impact: Security Bypass, Spoofing, Exposure of sensitive information, DoS, System access Released: 2007-06-04 Slackware has issued updates for mozilla-firefox, mozilla-thunderbird and seamonkey. These fix some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/25534/ -- [SA25533] Ubuntu update for firefox Critical: Highly critical Where: From remote Impact: Security Bypass, Spoofing, Exposure of sensitive information, DoS, System access Released: 2007-06-04 Ubuntu has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/25533/ -- [SA25522] Xoops iContent Module "spaw_root" File Inclusion Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2007-06-04 Mahmood_ali has discovered a vulnerability in the iContent Module for Xoops, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25522/ -- [SA25582] SUSE update for asterisk Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information, DoS Released: 2007-06-07 SUSE has issued an update for asterisk. This fixes some vulnerabilities, which can be exploited by malicious users to disclose potentially sensitive information or by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25582/ -- [SA25569] Gentoo update for libexif Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-06-06 Gentoo has issued an update for libexif. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/25569/ -- [SA25562] Atom PhotoBlog Script Insertion and Cross-Site Scripting Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-07 Some vulnerabilities have been discovered in Atom PhotoBlog, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25562/ -- [SA25553] Mandriva update for clamav Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-06-05 Mandriva has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25553/ -- [SA25551] Gentoo update for evolution Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-06-07 Gentoo has issued an update for evolution. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25551/ -- [SA25540] rPath update for libexif Critical: Moderately critical Where: From remote Impact: System access Released: 2007-06-05 rPath has issued an update for libexif. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS and potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/25540/ -- [SA25535] Slackware update for php5 Critical: Moderately critical Where: From remote Impact: Unknown, Security Bypass, DoS Released: 2007-06-04 Slackware has issued an update for php5. This fixes some vulnerabilities, where one has an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25535/ -- [SA25525] Kolab Server ClamAV Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-06-04 Some vulnerabilities have been reported in Kolab Server, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25525/ -- [SA25523] SUSE update for clamav Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-06-06 SUSE has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25523/ -- [SA25511] Hitachi TP1/NET/OSI-TP-Extended Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-06-01 A vulnerability has been reported in TP1/NET/OSI-TP-Extended, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25511/ -- [SA25496] Ubuntu update for mozilla-thunderbird Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-06-06 Ubuntu has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25496/ -- [SA25495] Avaya Products FreeType BDF Font Integer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-06-01 Avaya has acknowledged a vulnerability in various Avaya products, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/25495/ -- [SA25567] HP-UX update for CIFS Server Critical: Moderately critical Where: From local network Impact: System access Released: 2007-06-06 HP has issued an update for HP-UX. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25567/ -- [SA25561] LightBlog "id" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-07 ls has reported a vulnerability in LightBlog, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25561/ -- [SA25554] Mandriva update for libpng Critical: Less critical Where: From remote Impact: DoS Released: 2007-06-06 Mandriva has issued an update for libpng. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25554/ -- [SA25544] Mandriva update for file Critical: Less critical Where: From remote Impact: DoS, System access Released: 2007-06-06 Mandriva has issued an update for file. This fixes a vulnerability and a security issue, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25544/ -- [SA25530] Mandriva update for util-linux Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-06-05 Mandriva has issued an update for util-linux. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/25530/ -- [SA25566] Sun Solaris Management Console Privilege Escalation Critical: Less critical Where: From local network Impact: Privilege escalation Released: 2007-06-06 A vulnerability has been reported in Sun Solaris, which can be exploited by malicious users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/25566/ -- [SA25497] Avaya Products CUPS Incomplete SSL Negotiation Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2007-06-01 Avaya has acknowledged a vulnerability in various Avaya products, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25497/ -- [SA25494] Hitachi XP/W Map I/O Service Denial of Service Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2007-06-01 A vulnerability has been reported in XP/W, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25494/ -- [SA25519] Mandriva update for lha Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-06-06 Mandriva has issued an update for lha. This fixes a security issue, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/25519/ -- [SA25550] Gentoo update for elinks Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2007-06-07 Gentoo has issued an update for elinks. This fixes a weakness, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/25550/ -- [SA25546] rPath update for mutt Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2007-06-05 rPath has issued an update for mutt. This fixes a vulnerability, which can potentially be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/25546/ -- [SA25531] Sun Solaris xscreensaver Arbitrary Command Execution Critical: Not critical Where: Local system Impact: Security Bypass Released: 2007-06-05 A vulnerability has been reported in Sun Solaris, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/25531/ -- [SA25529] Red Hat update for mutt Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2007-06-04 Red Hat has issued an update for mutt. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges or gain escalated privileges. Full Advisory: http://secunia.com/advisories/25529/ -- [SA25515] Mandriva update for mutt Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2007-06-05 Mandriva has issued an update for mutt. This fixes a vulnerability, which can potentially be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/25515/ -- [SA25505] Linux Kernel VFAT IOCTLs Denial of Service Critical: Not critical Where: Local system Impact: DoS Released: 2007-06-01 A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25505/ Other:-- [SA25563] F5 FirePass 4100 SSL VPN "username" Command Injection Critical: Highly critical Where: From remote Impact: System access Released: 2007-06-06 Leonardo Nve has reported a vulnerability in F5 FirePass 4100 SSL VPN, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25563/ -- [SA25499] Apple Xserve Lights-Out Management Firmware IPMI Vulnerability Critical: Moderately critical Where: From local network Impact: System access Released: 2007-06-01 A vulnerability has been reported in the Xserve Lights-Out Management firmware, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25499/ Cross Platform:-- [SA25572] PBLang "lang" Local File Inclusion Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-06-06 Silentz has discovered a vulnerability in PBLang, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/25572/ -- [SA25548] EQdkp "rank" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-06-05 Silentz has discovered a vulnerability in EQdkp, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25548/ -- [SA25542] IBM Lotus Domino Unspecified Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-06-04 A vulnerability has been reported in IBM Lotus Domino, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25542/ -- [SA25524] Particle Gallery "editcomment" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-06-04 Silentz has discovered a vulnerability in Particle Gallery, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25524/ -- [SA25518] Basic Analysis and Security Engine Multiple Security Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2007-06-05 Johnny Storm has discovered some vulnerabilities in Basic Analysis and Security Engine (BASE), which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/25518/ -- [SA25513] Quick.Cart "sLanguage" Local File Inclusion Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2007-06-04 Kacper has discovered a vulnerability in Quick.Cart, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/25513/ -- [SA25584] AIOCP "aiocp_dp" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-07 A vulnerability has been reported in All In One Control Panel (AIOCP), which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25584/ -- [SA25557] Cacti "graph_image.php" Denial of Service Critical: Less critical Where: From remote Impact: DoS Released: 2007-06-06 A vulnerability has been discovered in Cacti, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25557/ -- [SA25552] WordPress XMLRPC "wp.suggestCategories" SQL Injection Critical: Less critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-06-07 Slappter has discovered a vulnerability in WordPress, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25552/ -- [SA25549] Beatnik Extension for Firefox Feed Script Insertion Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-05 CrYpTiC MauleR has discovered a vulnerability in the Beatnik extension for Firefox, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/25549/ -- [SA25538] EQDKP Attunement and Key Tracker Plugin Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-04 A vulnerability has been reported in the Attunement and Key Tracker Plugin for EQDKP, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25538/ -- [SA25532] WebSVN Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-04 A vulnerability has been reported in WebSVN, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25532/ -- [SA25526] Chameleon CMS Session Fixation Vulnerability Critical: Less critical Where: From remote Impact: Hijacking Released: 2007-06-04 David Vieira-Kurz has reported a vulnerability in Chameleon CMS, which can be exploited by malicious people to conduct session fixation attacks. Full Advisory: http://secunia.com/advisories/25526/ -- [SA25521] Calimero.CMS Session Fixation Vulnerability Critical: Less critical Where: From remote Impact: Hijacking Released: 2007-06-05 David Vieira-Kurz has discovered a vulnerability in Calimero.CMS, which can be exploited by malicious people to conduct session fixation attacks. Full Advisory: http://secunia.com/advisories/25521/ -- [SA25517] Codelib Linker "cat" and "kword" Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-04 Some vulnerabilities have been discovered in Codelib Linker, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25517/ -- [SA25512] SSL-Explorer Multiple Vulnerabilities Critical: Less critical Where: From remote Impact: Security Bypass, Cross Site Scripting Released: 2007-06-04 Some vulnerabilities have been reported in SSL-Explorer, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to conduct cross-site scripting and HTTP header injection attacks. Full Advisory: http://secunia.com/advisories/25512/ -- [SA25510] Meneame Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-04 A vulnerability has been reported in Meneame, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25510/ -- [SA25506] @Mail "ReadMsg.php" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-01 A vulnerability has been reported in @Mail, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25506/ -- [SA25503] Aigaion Authors and Publications Script Insertion Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-01 ephemeral_sta has reported some vulnerabilities in Aigaion, which can be exploited by malicious users to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/25503/ -- [SA25502] WebStudio CMS "pageid" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-05 Glafkos Charalambous has reported a vulnerability in WebStudio CMS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25502/ -- [SA25498] Novell GroupWise Authentication Credentials Disclosure Security Issue Critical: Less critical Where: From remote Impact: Exposure of sensitive information Released: 2007-06-01 A security issue has been reported in Novell GroupWise, which can be exploited by malicious people to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/25498/ -- [SA25493] HP System Management Homepage Unspecified Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-01 A vulnerability has been reported in HP System Management Homepage, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25493/ -- [SA25536] APC PowerChute Network Shutdown Directory Traversal Critical: Less critical Where: From local network Impact: Exposure of sensitive information Released: 2007-06-06 Chris Castaldo has reported a vulnerability in APC PowerChute Network Shutdown, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/25536/ -- [SA25520] IBM Lotus Domino Agent Signature Verification Vulnerability Critical: Less critical Where: From local network Impact: Privilege escalation Released: 2007-06-05 A vulnerability has been reported in IBM Lotus Domino, which can be exploited by malicious users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/25520/ -- [SA25516] Symantec Veritas Storage Foundation Veritas Volume Replicator Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2007-06-04 A vulnerability has been reported in Symantec Veritas Storage Foundation, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25516/ -- [SA25541] WordPress Unmoderated Comments Disclosure Security Issue Critical: Not critical Where: From remote Impact: Exposure of sensitive information Released: 2007-06-04 Sumit Siddharth has discovered a security issue in WordPress, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/25541/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _____________________________________________________ Attend Black Hat USA, July 28-August 2 in Las Vegas, the world's premier technical event for ICT security experts. Featuring 30 hands-on training courses and 90 Briefings presentations with lots of new content and new tools. Network with 4,000 delegates from 70 nations. Visit product displays by 30 top sponsors in a relaxed setting. Rates increase on June 1 so register today. http://www.blackhat.com
This archive was generated by hypermail 2.1.3 : Fri Jun 08 2007 - 07:15:17 PDT