[ISN] Secunia Weekly Summary - Issue: 2007-23

From: InfoSec News (alerts@private)
Date: Fri Jun 08 2007 - 07:05:29 PDT


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2007-05-31 - 2007-06-07                        

                       This week: 76 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.

The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.

========================================================================
2) This Week in Brief:

Two extremely critical vulnerabilities in Yahoo! Messenger were made
public this week, which could allow an attacker to gain control of a
vulnerable system.

The vulnerabilities are due to boundary errors within two Yahoo!
Messenger ActiveX controls: the Yahoo! Webcam Upload and the Yahoo!
Webcam Viewer controls. These vulnerabilities could be exploited by
assigning an overly long string to the Server property and then calling
the Send() or Receive() method, respectively.

Successful exploitation allows an attacker to execute arbitrary code on
the system. Yahoo! has yet to release a patch for these
vulnerabilities; hence users are urged to refrain from browsing
untrusted sites that may host exploit code for these vulnerabilities,
or modify their system registries to set the kill-bit for the affected
ActiveX controls.

For more information, please refer to:
http://secunia.com/advisories/25547/

 --

Two vulnerabilities were reported in the Computer Associates (CA) 
Anti-virus engine, which could be exploited by malicious people to
gain access to a vulnerable system.

A boundary error in a library file when processing CAB files can be
exploited to cause a stack-based buffer overflow via a specially
crafted CAB file with an overly long filename.

An input validation error when processing the coffFiles field in CAB
files can also be exploited to cause a stack-based buffer overflow.

Various CA products are affected. The vendor has released a patch for
these vulnerabilities via content update 3.60. Users are strongly
encouraged to check that their systems have been patched.

For more information, and a complete list of affected products:
http://secunia.com/advisories/25570/

 --

Secunia Research has discovered several vulnerabilities in Mplayer,
which can be exploited by malicious people to compromise a user's
system.

A boundary error within the "cddb_query_parse()" function in
stream/stream_cddb.c when parsing album titles can be exploited to
cause a stack-based buffer overflow. This can be exploited by
tricking a user into parsing malicious CDDB entries with overly long
album titles. Successful exploitation allows execution of arbitrary
code.

Boundary errors within the "cddb_parse_matches_list()" and
"cddb_read_parse()" functions in stream/stream_cddb.c when parsing
album and category titles can be exploited to cause stack-based
buffer overflows. These can be exploited  by tricking a user into
parsing malicious CDDB entries with overly long album or category
titles. Successful exploitation allows execution of arbitrary code,
 but may require that the user connects to a malicious server.

The vendor has released a patch for version 1.0rc1. Users are
advised to apply the patch immediately.

For more information:
http://secunia.com/advisories/24302/

 --

VIRUS ALERTS:

During the past week Secunia collected 356 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA25481] Mozilla Firefox / Seamonkey "resource://" Information
              Disclosure
2.  [SA25469] Mozilla Firefox Multiple Vulnerabilities
3.  [SA25456] PHP Integer Overflow Vulnerability and Security Bypass
4.  [SA25130] Apple QuickTime Java Extension Two Vulnerabilities
5.  [SA23769] Internet Explorer Multiple Vulnerabilities
6.  [SA25514] Logitech VideoCall Multiple ActiveX Controls Buffer
              Overflows
7.  [SA25505] Linux Kernel VFAT IOCTLs Denial of Service
8.  [SA25498] Novell GroupWise Authentication Credentials Disclosure
              Security Issue
9.  [SA25434] PHP crypt() Race Condition Vulnerability
10. [SA25487] PHP JackKnife Gallery System Two SQL Injection
              Vulnerabilities

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA25547] Yahoo! Messenger Two ActiveX Controls Buffer Overflows
[SA25570] CA Anti-Virus Engine CAB Archive Processing Buffer Overflows
[SA25568] FlipViewer FViewerLoading ActiveX Control Buffer Overflows
[SA25514] Logitech VideoCall Multiple ActiveX Controls Buffer
Overflows
[SA25509] Macrovision FLEXnet boisweb.dll ActiveX Control Buffer
Overflows
[SA25508] DVD X Player PLF File Parsing Buffer Overflow Vulnerability
[SA25501] Macrovision FLEXnet Connect DWUpdateService ActiveX Control
Insecure Methods
[SA25500] Authentium Command Antivirus ActiveX Controls Buffer
Overflows
[SA25565] Free-PayPal-Shopping-Cart "news_id" SQL Injection
Vulnerability
[SA25545] Omegasoft Insel Cross-Site Scripting and SQL Injection
[SA25543] Symantec Reporting Server Three Vulnerabilities
[SA25537] Symantec Veritas Storage Foundation Scheduler Service
Authentication Bypass
[SA25564] Internet Explorer Page Loading Race Condition and URL
Spoofing
[SA25527] ADPLAN SEO Cross-Site Scripting Vulnerability
[SA25507] Hitachi Products Collaboration-File Sharing Cross-Site
Scripting Vulnerability
[SA25539] Symantec Ghost Solution Suite Three Denial of Service
Vulnerabilities

UNIX/Linux:
[SA25578] Amavis file Integer Underflow and Denial of Service
[SA25555] Mandriva update for mplayer
[SA25534] Slackware update for Mozilla products
[SA25533] Ubuntu update for firefox
[SA25522] Xoops iContent Module "spaw_root" File Inclusion
[SA25582] SUSE update for asterisk
[SA25569] Gentoo update for libexif
[SA25562] Atom PhotoBlog Script Insertion and Cross-Site Scripting
[SA25553] Mandriva update for clamav
[SA25551] Gentoo update for evolution
[SA25540] rPath update for libexif
[SA25535] Slackware update for php5
[SA25525] Kolab Server ClamAV Denial of Service
[SA25523] SUSE update for clamav
[SA25511] Hitachi TP1/NET/OSI-TP-Extended Denial of Service
Vulnerability
[SA25496] Ubuntu update for mozilla-thunderbird
[SA25495] Avaya Products FreeType BDF Font Integer Overflow
Vulnerability
[SA25567] HP-UX update for CIFS Server
[SA25561] LightBlog "id" Cross-Site Scripting Vulnerability
[SA25554] Mandriva update for libpng
[SA25544] Mandriva update for file
[SA25530] Mandriva update for util-linux
[SA25566] Sun Solaris Management Console Privilege Escalation
[SA25497] Avaya Products CUPS Incomplete SSL Negotiation Denial of
Service
[SA25494] Hitachi XP/W Map I/O Service Denial of Service Vulnerability
[SA25519] Mandriva update for lha
[SA25550] Gentoo update for elinks
[SA25546] rPath update for mutt
[SA25531] Sun Solaris xscreensaver Arbitrary Command Execution
[SA25529] Red Hat update for mutt
[SA25515] Mandriva update for mutt
[SA25505] Linux Kernel VFAT IOCTLs Denial of Service

Other:
[SA25563] F5 FirePass 4100 SSL VPN "username" Command Injection
[SA25499] Apple Xserve Lights-Out Management Firmware IPMI
Vulnerability

Cross Platform:
[SA25572] PBLang "lang" Local File Inclusion Vulnerability
[SA25548] EQdkp "rank" SQL Injection Vulnerability
[SA25542] IBM Lotus Domino Unspecified Denial of Service Vulnerability
[SA25524] Particle Gallery "editcomment" SQL Injection Vulnerability
[SA25518] Basic Analysis and Security Engine Multiple Security Bypass
[SA25513] Quick.Cart "sLanguage" Local File Inclusion Vulnerability
[SA25584] AIOCP "aiocp_dp" Cross-Site Scripting Vulnerability
[SA25557] Cacti "graph_image.php" Denial of Service
[SA25552] WordPress XMLRPC "wp.suggestCategories" SQL Injection
[SA25549] Beatnik Extension for Firefox Feed Script Insertion
Vulnerability
[SA25538] EQDKP Attunement and Key Tracker Plugin Cross-Site Scripting
[SA25532] WebSVN Cross-Site Scripting Vulnerability
[SA25526] Chameleon CMS Session Fixation Vulnerability
[SA25521] Calimero.CMS Session Fixation Vulnerability
[SA25517] Codelib Linker "cat" and "kword" Cross-Site Scripting
Vulnerabilities
[SA25512] SSL-Explorer Multiple Vulnerabilities
[SA25510] Meneame Cross-Site Scripting Vulnerability
[SA25506] @Mail "ReadMsg.php" Cross-Site Scripting Vulnerability
[SA25503] Aigaion Authors and Publications Script Insertion
Vulnerabilities
[SA25502] WebStudio CMS "pageid" Cross-Site Scripting
[SA25498] Novell GroupWise Authentication Credentials Disclosure
Security Issue
[SA25493] HP System Management Homepage Unspecified Cross-Site
Scripting
[SA25536] APC PowerChute Network Shutdown Directory Traversal
[SA25520] IBM Lotus Domino Agent Signature Verification Vulnerability
[SA25516] Symantec Veritas Storage Foundation Veritas Volume Replicator
Denial of Service
[SA25541] WordPress Unmoderated Comments Disclosure Security Issue

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA25547] Yahoo! Messenger Two ActiveX Controls Buffer Overflows

Critical:    Extremely critical
Where:       From remote
Impact:      System access
Released:    2007-06-07

Danny has discovered two vulnerabilities in Yahoo! Messenger, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25547/

 --

[SA25570] CA Anti-Virus Engine CAB Archive Processing Buffer Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-06

Two vulnerabilities have been reported in the CA Anti-Virus engine,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/25570/

 --

[SA25568] FlipViewer FViewerLoading ActiveX Control Buffer Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-06

Will Dormann has reported some vulnerabilities in FlipViewer, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25568/

 --

[SA25514] Logitech VideoCall Multiple ActiveX Controls Buffer
Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-01

Will Dormann has discovered some vulnerabilities in Logitech VideoCall,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/25514/

 --

[SA25509] Macrovision FLEXnet boisweb.dll ActiveX Control Buffer
Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-05

TippingPoint has reported some vulnerabilities in Macrovision Update
Service and FLEXnet Connect, which can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25509/

 --

[SA25508] DVD X Player PLF File Parsing Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-04

n00b has discovered a vulnerability in DVD X Player, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25508/

 --

[SA25501] Macrovision FLEXnet Connect DWUpdateService ActiveX Control
Insecure Methods

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-01

Will Dormann has reported some vulnerabilities in the Macrovision
FLEXnet Connect Software Manager DWUpdateService ActiveX control, which
can be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25501/

 --

[SA25500] Authentium Command Antivirus ActiveX Controls Buffer
Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-01

Will Dormann has reported some vulnerabilities in Authentium Command
Antivirus, which can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/25500/

 --

[SA25565] Free-PayPal-Shopping-Cart "news_id" SQL Injection
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-06-07

kerem125 and gsy have reported a vulnerability in
Free-PayPal-Shopping-Cart, which can be exploited by malicious people
to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25565/

 --

[SA25545] Omegasoft Insel Cross-Site Scripting and SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2007-06-06

MC.Iglo has reported some vulnerabilities in Omegasoft Insel, which can
be exploited by malicious people to conduct cross-site scripting and SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/25545/

 --

[SA25543] Symantec Reporting Server Three Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      Security Bypass, Manipulation of data, Exposure of
sensitive information
Released:    2007-06-06

Three vulnerabilities have been reported in Symantec Reporting Server,
which can be exploited by malicious people to gain knowledge of
sensitive information, bypass certain security restrictions, or
manipulate certain files.

Full Advisory:
http://secunia.com/advisories/25543/

 --

[SA25537] Symantec Veritas Storage Foundation Scheduler Service
Authentication Bypass

Critical:    Moderately critical
Where:       From local network
Impact:      Security Bypass
Released:    2007-06-04

TippingPoint has reported a vulnerability in Symantec Veritas Storage
Foundation, which can be exploited by malicious people to bypass
certain security restrictions.

Full Advisory:
http://secunia.com/advisories/25537/

 --

[SA25564] Internet Explorer Page Loading Race Condition and URL
Spoofing

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Spoofing
Released:    2007-06-06

Michal Zalewski has reported two vulnerabilities in Internet Explorer,
which potentially can be exploited by a malicious website to display a
fake URL in the address bar or to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/25564/

 --

[SA25527] ADPLAN SEO Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-07

A vulnerability has been reported in ADPLAN SEO, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25527/

 --

[SA25507] Hitachi Products Collaboration-File Sharing Cross-Site
Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-01

A vulnerability has been reported in various Hitachi products, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/25507/

 --

[SA25539] Symantec Ghost Solution Suite Three Denial of Service
Vulnerabilities

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-06-06

Three vulnerabilities have been reported in Symantec Ghost Solution
Suite, which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/25539/


UNIX/Linux:--

[SA25578] Amavis file Integer Underflow and Denial of Service

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-06

A vulnerability and a security issue have been reported in Amavis,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25578/

 --

[SA25555] Mandriva update for mplayer

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-05

Mandriva has issued an update for mplayer. This fixes a vulnerability,
which can potentially be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/25555/

 --

[SA25534] Slackware update for Mozilla products

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Spoofing, Exposure of sensitive
information, DoS, System access
Released:    2007-06-04

Slackware has issued updates for mozilla-firefox, mozilla-thunderbird
and seamonkey. These fix some vulnerabilities, which can be exploited
by malicious people to conduct spoofing attacks, bypass certain
security restrictions, and potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25534/

 --

[SA25533] Ubuntu update for firefox

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Spoofing, Exposure of sensitive
information, DoS, System access
Released:    2007-06-04

Ubuntu has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing attacks, bypass certain security restrictions, and potentially
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25533/

 --

[SA25522] Xoops iContent Module "spaw_root" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-06-04

Mahmood_ali has discovered a vulnerability in the iContent Module for
Xoops, which can be exploited by malicious people to disclose sensitive
information or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25522/

 --

[SA25582] SUSE update for asterisk

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, DoS
Released:    2007-06-07

SUSE has issued an update for asterisk. This fixes some
vulnerabilities, which can be exploited by malicious users to disclose
potentially sensitive information or by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/25582/

 --

[SA25569] Gentoo update for libexif

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-06

Gentoo has issued an update for libexif. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/25569/

 --

[SA25562] Atom PhotoBlog Script Insertion and Cross-Site Scripting

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-07

Some vulnerabilities have been discovered in Atom PhotoBlog, which can
be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/25562/

 --

[SA25553] Mandriva update for clamav

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-06-05

Mandriva has issued an update for clamav. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25553/

 --

[SA25551] Gentoo update for evolution

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-07

Gentoo has issued an update for evolution. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/25551/

 --

[SA25540] rPath update for libexif

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-06-05

rPath has issued an update for libexif. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS and
potentially compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/25540/

 --

[SA25535] Slackware update for php5

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, Security Bypass, DoS
Released:    2007-06-04

Slackware has issued an update for php5. This fixes some
vulnerabilities, where one has an unknown impact and others can be
exploited by malicious people to bypass certain security restrictions
and cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25535/

 --

[SA25525] Kolab Server ClamAV Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-06-04

Some vulnerabilities have been reported in Kolab Server, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25525/

 --

[SA25523] SUSE update for clamav

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-06-06

SUSE has issued an update for clamav. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/25523/

 --

[SA25511] Hitachi TP1/NET/OSI-TP-Extended Denial of Service
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-06-01

A vulnerability has been reported in TP1/NET/OSI-TP-Extended, which can
be exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25511/

 --

[SA25496] Ubuntu update for mozilla-thunderbird

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-06

Ubuntu has issued an update for mozilla-thunderbird. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25496/

 --

[SA25495] Avaya Products FreeType BDF Font Integer Overflow
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-01

Avaya has acknowledged a vulnerability in various Avaya products, which
can be exploited by malicious people to cause a DoS (Denial of Service)
and potentially compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/25495/

 --

[SA25567] HP-UX update for CIFS Server

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-06-06

HP has issued an update for HP-UX. This fixes some vulnerabilities,
which can be exploited by malicious users and malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25567/

 --

[SA25561] LightBlog "id" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-07

ls has reported a vulnerability in LightBlog, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25561/

 --

[SA25554] Mandriva update for libpng

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-06-06

Mandriva has issued an update for libpng. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/25554/

 --

[SA25544] Mandriva update for file

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-06

Mandriva has issued an update for file. This fixes a vulnerability and
a security issue, which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25544/

 --

[SA25530] Mandriva update for util-linux

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-06-05

Mandriva has issued an update for util-linux. This fixes a security
issue, which can be exploited by malicious users to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/25530/

 --

[SA25566] Sun Solaris Management Console Privilege Escalation

Critical:    Less critical
Where:       From local network
Impact:      Privilege escalation
Released:    2007-06-06

A vulnerability has been reported in Sun Solaris, which can be
exploited by malicious users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/25566/

 --

[SA25497] Avaya Products CUPS Incomplete SSL Negotiation Denial of
Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-06-01

Avaya has acknowledged a vulnerability in various Avaya products, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/25497/

 --

[SA25494] Hitachi XP/W Map I/O Service Denial of Service Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-06-01

A vulnerability has been reported in XP/W, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25494/

 --

[SA25519] Mandriva update for lha

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-06-06

Mandriva has issued an update for lha. This fixes a security issue,
which potentially can be exploited by malicious, local users to perform
certain actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/25519/

 --

[SA25550] Gentoo update for elinks

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-06-07

Gentoo has issued an update for elinks. This fixes a weakness, which
can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/25550/

 --

[SA25546] rPath update for mutt

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-06-05

rPath has issued an update for mutt. This fixes a vulnerability, which
can potentially be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/25546/

 --

[SA25531] Sun Solaris xscreensaver Arbitrary Command Execution

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2007-06-05

A vulnerability has been reported in Sun Solaris, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/25531/

 --

[SA25529] Red Hat update for mutt

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-06-04

Red Hat has issued an update for mutt. This fixes some vulnerabilities,
which can be exploited by malicious, local users to perform certain
actions with escalated privileges or gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/25529/

 --

[SA25515] Mandriva update for mutt

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-06-05

Mandriva has issued an update for mutt. This fixes a vulnerability,
which can potentially be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/25515/

 --

[SA25505] Linux Kernel VFAT IOCTLs Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-06-01

A security issue has been reported in the Linux Kernel, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/25505/


Other:--

[SA25563] F5 FirePass 4100 SSL VPN "username" Command Injection

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-06

Leonardo Nve has reported a vulnerability in F5 FirePass 4100 SSL VPN,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/25563/

 --

[SA25499] Apple Xserve Lights-Out Management Firmware IPMI
Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-06-01

A vulnerability has been reported in the Xserve Lights-Out Management
firmware, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/25499/


Cross Platform:--

[SA25572] PBLang "lang" Local File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-06-06

Silentz has discovered a vulnerability in PBLang, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/25572/

 --

[SA25548] EQdkp "rank" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-06-05

Silentz has discovered a vulnerability in EQdkp, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25548/

 --

[SA25542] IBM Lotus Domino Unspecified Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-06-04

A vulnerability has been reported in IBM Lotus Domino, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25542/

 --

[SA25524] Particle Gallery "editcomment" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-06-04

Silentz has discovered a vulnerability in Particle Gallery, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25524/

 --

[SA25518] Basic Analysis and Security Engine Multiple Security Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-06-05

Johnny Storm has discovered some vulnerabilities in Basic Analysis and
Security Engine (BASE), which can be exploited by malicious people to
bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/25518/

 --

[SA25513] Quick.Cart "sLanguage" Local File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-06-04

Kacper has discovered a vulnerability in Quick.Cart, which can be
exploited by malicious people to disclose potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/25513/

 --

[SA25584] AIOCP "aiocp_dp" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-07

A vulnerability has been reported in All In One Control Panel (AIOCP),
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/25584/

 --

[SA25557] Cacti "graph_image.php" Denial of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-06-06

A vulnerability has been discovered in Cacti, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25557/

 --

[SA25552] WordPress XMLRPC "wp.suggestCategories" SQL Injection

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-06-07

Slappter has discovered a vulnerability in WordPress, which can be
exploited by malicious users to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25552/

 --

[SA25549] Beatnik Extension for Firefox Feed Script Insertion
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-05

CrYpTiC MauleR has discovered a vulnerability in the Beatnik extension
for Firefox, which can be exploited by malicious people to conduct
script insertion attacks.

Full Advisory:
http://secunia.com/advisories/25549/

 --

[SA25538] EQDKP Attunement and Key Tracker Plugin Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-04

A vulnerability has been reported in the Attunement and Key Tracker
Plugin for EQDKP, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25538/

 --

[SA25532] WebSVN Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-04

A vulnerability has been reported in WebSVN, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25532/

 --

[SA25526] Chameleon CMS Session Fixation Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Hijacking
Released:    2007-06-04

David Vieira-Kurz has reported a vulnerability in Chameleon CMS, which
can be exploited by malicious people to conduct session fixation
attacks.

Full Advisory:
http://secunia.com/advisories/25526/

 --

[SA25521] Calimero.CMS Session Fixation Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Hijacking
Released:    2007-06-05

David Vieira-Kurz has discovered a vulnerability in Calimero.CMS, which
can be exploited by malicious people to conduct session fixation
attacks.

Full Advisory:
http://secunia.com/advisories/25521/

 --

[SA25517] Codelib Linker "cat" and "kword" Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-04

Some vulnerabilities have been discovered in Codelib Linker, which can
be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/25517/

 --

[SA25512] SSL-Explorer Multiple Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting
Released:    2007-06-04

Some vulnerabilities have been reported in SSL-Explorer, which can be
exploited by malicious users to bypass certain security restrictions
and by malicious people to conduct cross-site scripting and HTTP header
injection attacks.

Full Advisory:
http://secunia.com/advisories/25512/

 --

[SA25510] Meneame Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-04

A vulnerability has been reported in Meneame, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25510/

 --

[SA25506] @Mail "ReadMsg.php" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-01

A vulnerability has been reported in @Mail, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25506/

 --

[SA25503] Aigaion Authors and Publications Script Insertion
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-01

ephemeral_sta has reported some vulnerabilities in Aigaion, which can
be exploited by malicious users to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/25503/

 --

[SA25502] WebStudio CMS "pageid" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-05

Glafkos Charalambous has reported a vulnerability in WebStudio CMS,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/25502/

 --

[SA25498] Novell GroupWise Authentication Credentials Disclosure
Security Issue

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-06-01

A security issue has been reported in Novell GroupWise, which can be
exploited by malicious people to gain knowledge of sensitive
information.

Full Advisory:
http://secunia.com/advisories/25498/

 --

[SA25493] HP System Management Homepage Unspecified Cross-Site
Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-01

A vulnerability has been reported in HP System Management Homepage,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/25493/

 --

[SA25536] APC PowerChute Network Shutdown Directory Traversal

Critical:    Less critical
Where:       From local network
Impact:      Exposure of sensitive information
Released:    2007-06-06

Chris Castaldo has reported a vulnerability in APC PowerChute Network
Shutdown, which can be exploited by malicious people to disclose
potentially sensitive information.

Full Advisory:
http://secunia.com/advisories/25536/

 --

[SA25520] IBM Lotus Domino Agent Signature Verification Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      Privilege escalation
Released:    2007-06-05

A vulnerability has been reported in IBM Lotus Domino, which can be
exploited by malicious users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/25520/

 --

[SA25516] Symantec Veritas Storage Foundation Veritas Volume Replicator
Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-06-04

A vulnerability has been reported in Symantec Veritas Storage
Foundation, which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/25516/

 --

[SA25541] WordPress Unmoderated Comments Disclosure Security Issue

Critical:    Not critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-06-04

Sumit Siddharth has discovered a security issue in WordPress, which can
be exploited by malicious people to disclose potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/25541/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_____________________________________________________
Attend Black Hat USA, July 28-August 2 in Las Vegas, 
the world's premier technical event for ICT security 
experts. Featuring 30 hands-on training courses and 
90 Briefings presentations with lots of new content 
and new tools. Network with 4,000 delegates from 
70 nations.   Visit product displays by 30 top
sponsors in a relaxed setting. Rates increase on 
June 1 so register today. http://www.blackhat.com



This archive was generated by hypermail 2.1.3 : Fri Jun 08 2007 - 07:15:17 PDT