[ISN] Secunia Weekly Summary - Issue: 2007-24

From: InfoSec News (alerts@private)
Date: Thu Jun 14 2007 - 23:25:31 PDT


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2007-06-08 - 2007-06-15                        

                       This week: 81 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.

The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.

========================================================================
2) This Week in Brief:

It has been Patch Tuesday again for all Windows users, with Microsoft
releasing six security bulletins, including one for Windows Vista.

The vulnerabilities range from the “less critical” information
disclosure vulnerability in Vista, to “highly critical” ones found
in Internet Explorer (IE), Visio, Outlook Express, and in the Windows
code itself.

MS07-030 discusses two vulnerabilities in Microsoft Visio, which could
be exploited to execute arbitrary code.
http://secunia.com/advisories/25619/

MS07-031 discusses a vulnerability in the Microsoft Windows Secure
Channel Digital Signature security package, which on Windows XP could
be exploited to execute arbitrary code, and on Windows 2000 and Server
2003 cause a Denial of Service (DoS) condition.
http://secunia.com/advisories/25620/

MS07-032 discusses a vulnerability in Windows Vista, which could be
used by malicious, local users to disclose possibly sensitive
information.
http://secunia.com/advisories/25623/
http://secunia.com/advisories/25623/

MS07-033 discusses six vulnerabilities in Internet Explorer, which can
be exploited to spoof the contents of an arbitrary site, or to gain
access to a vulnerable system.
http://secunia.com/advisories/25627/

MS07-034 discusses three vulnerabilities in Micosoft Outlook Express
and Windows Mail, which could be exploited to read data on the system
or execute arbitrary code.
http://secunia.com/advisories/25639/

MS07-035 discusses a vulnerability in the Microsoft Windows Win32 API,
which could be exploited to execute arbitrary code using a local
application, for example when a user is tricked into viewing a web
site hosting malicious code.
http://secunia.com/advisories/25640/

--

Some vulnerabilities have been reported in OpenOffice this week, one
resulting from an error when parsing data within RTF files, and the
other as a vulnerability carried over from OpenOffice's use of the
Freetype library, which contains an error when parsing malformed TTF
fonts.

A patch has been released for these vulnerabilities, and all users
are urged to update as soon as possible. Several Linux distributions
have also released patches, such as Debian and Red Hat:
http://secunia.com/advisories/25650/
http://secunia.com/advisories/25673/

For more information, read the OpenOffice advisory here:
http://secunia.com/advisories/25648/

 --

VIRUS ALERTS:

During the past week Secunia collected 231 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA14921] Microsoft Windows Message Queuing Buffer Overflow
              Vulnerability
2.  [SA25547] Yahoo! Messenger Two ActiveX Controls Buffer Overflows
3.  [SA25594] Linux Kernel Multiple Vulnerabilities
4.  [SA25640] Microsoft Windows Win32 API Code Execution Vulnerability
5.  [SA25620] Windows Secure Channel Digital Signature Parsing
              Vulnerability
6.  [SA18787] Internet Explorer Drag-and-Drop Vulnerability
7.  [SA25619] Microsoft Visio Two Code Execution Vulnerabilities
8.  [SA25627] Internet Explorer Multiple Vulnerabilities
9.  [SA25639] Microsoft Outlook Express and Windows Mail Multiple
              Vulnerabilities
10. [SA25648] OpenOffice RTF File and FreeType Font Parsing
              Vulnerabilities

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA25672] Corel ActiveCGM Browser ActiveX Control Multiple Buffer
Overflows
[SA25640] Microsoft Windows Win32 API Code Execution Vulnerability
[SA25639] Microsoft Outlook Express and Windows Mail Multiple
Vulnerabilities
[SA25627] Internet Explorer Multiple Vulnerabilities
[SA25625] Zoomify Viewer ActiveX Control Multiple Buffer Overflows
[SA25624] HP Help and Support Center Unspecified Vulnerability
[SA25620] Windows Secure Channel Digital Signature Parsing
Vulnerability
[SA25619] Microsoft Visio Two Code Execution Vulnerabilities
[SA25604] Vitalize! Cellosoft Tokens Object Extension "RemoveChr()"
Buffer Overflow
[SA25593] Blue Coat K9 Web Protection Management Service Buffer
Overflow
[SA25602] D-Link DWL-G650+ Wireless Driver Beacon TIM Buffer Overflow
[SA25606] BrightStor ARCserve Backup for Laptops & Desktops Unspecified
Vulnerabilities
[SA25643] TEC-IT TBarCode TBarCode7 ActiveX Control "SaveImage()"
Insecure Method
[SA25623] Microsoft Windows Vista User Information Disclosure
[SA25663] Microsoft Internet Explorer 7 HTTP Basic Authentication IDN
Spoofing
[SA25603] Kaspersky AntiVirus klif.sys Hooked Functions Denial of
Service

UNIX/Linux:
[SA25673] Red Hat update for openoffice.org
[SA25667] Xoops XT-Conteudo Module "spaw_root" File Inclusion
[SA25665] Xoops Cjay Content WYSIWYG IE Module "spaw_root" File
Inclusion
[SA25660] Avaya Products PHP Multiple Vulnerabilities
[SA25652] Xoops Tiny Content Module "spaw_root" File Inclusion
[SA25651] Xoops Horoscope Module "xoopsConfig[root_path]" File
Inclusion
[SA25650] Debian update for openoffice
[SA25647] Mandriva update for mozilla-firefox
[SA25635] Debian update for xulrunner
[SA25591] SGI Advanced Linux Environment Multiple Updates
[SA25669] Red Hat update for kdebase
[SA25666] Sun Java System Directory Server Two Vulnerabilities
[SA25664] Debian update for icedove
[SA25662] Konqueror Flash Player Plug-in Vulnerability
[SA25655] Red Hat update for mod_perl
[SA25654] Mandriva update for freetype2
[SA25653] fuzzylime (forum) "topic" SQL Injection and Cross-Site
Scripting
[SA25644] Mandriva update for mozilla-thunderbird
[SA25622] Gentoo update for madwifi
[SA25621] Ubuntu update for libexif
[SA25613] Debian update for lighttpd
[SA25612] Debian update for freetype
[SA25609] Red Hat update for freetype
[SA25608] Sun Solaris sshd Identical Blocks Denial of Service
Vulnerability
[SA25599] Mandriva update for libexif
[SA25594] Linux Kernel Multiple Vulnerabilities
[SA25676] Avaya Products OpenLDAP slapd "selfwrite" Security Issue
[SA25661] Avaya CMS Sun Solaris "in.iked" Denial of Service
Vulnerability
[SA25658] Mandriva update for libwmf
[SA25657] Mandriva update for gd
[SA25649] HP-UX update for Bind
[SA25646] Mandriva update for tetex
[SA25633] Red Hat update for gcc
[SA25632] Red Hat update for gdb
[SA25628] Red Hat update for openldap
[SA25616] Maran PHP Blog "id" Cross-Site Scripting
[SA25600] Mail Notification "WITH_SSL" Plaintext Password Security
Issue
[SA25590] rPath update for gd, php, php-mysql, and php-pgsql
[SA25668] Sun Solaris 10 NFS XDR Handling Vulnerability
[SA25631] Red Hat update for pam
[SA25630] Red Hat update for kernel
[SA25629] Red Hat update for shadow-utils
[SA25598] Cisco Trust Agent "User Notification" Authentication Bypass
[SA25596] Ubuntu update for kernel
[SA25679] Red Hat update for iscsi-initiator-utils
[SA25610] Ubuntu update for xscreensaver
[SA25607] Sun Solaris scp Command Line Shell Command Injection

Other:
[SA25611] ARRIS Cadant C3 CMTS IP Options Handling Denial of Service
[SA25592] Novell Modular Authentication Service NMASINST Information
Disclosure

Cross Platform:
[SA25656] YaBB CRLF Injection Privilege Escalation Vulnerability
[SA25648] OpenOffice RTF File and FreeType Font Parsing
Vulnerabilities
[SA25641] Mbedthis AppWeb URL Protocol Format String Vulnerability
[SA25626] PHPMailer "Sender" Arbitrary Command Execution
[SA25615] PHP Real Estate Classifieds "loc" File Inclusion
[SA25614] Link Request Contact Form PHP File Upload
[SA25597] Sun Java System Products NSS SSLv2 Processing Buffer
Overflows
[SA25642] libexif EXIF Information Integer Overflow Vulnerability
[SA25605] e-Vision CMS Multiple Vulnerabilities
[SA25595] PhpWiki Empty LDAP Passwords Authentication Bypass
[SA25601] Firebird "connect" Request Handling Buffer Overflow
Vulnerability
[SA25638] dotProject Cross-Site Scripting Vulnerability
[SA25637] Invision Power Board Profile Updating Security Issue
[SA25634] Beehive Forum "links.php" Cross-Site Scripting
[SA25617] Sporum Forum "view" and "mode" Cross-Site Scripting
Vulnerabilities
[SA25636] Mbedthis AppWeb HTTP TRACE Response Cross-Site Scripting

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA25672] Corel ActiveCGM Browser ActiveX Control Multiple Buffer
Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-14

Will Dormann has reported some vulnerabilities in ActiveCGM, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25672/

 --

[SA25640] Microsoft Windows Win32 API Code Execution Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Privilege escalation, System access
Released:    2007-06-12

A vulnerability has been reported in Microsoft Windows, which can be
exploited by malicious, local users to gain escalated privileges or by
malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25640/

 --

[SA25639] Microsoft Outlook Express and Windows Mail Multiple
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information, System
access
Released:    2007-06-12

Some vulnerabilities have been reported in Microsoft Outlook Express
and Windows Mail, which can be exploited by malicious people to
disclose sensitive information and compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25639/

 --

[SA25627] Internet Explorer Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Spoofing, System access
Released:    2007-06-12

Multiple vulnerabilities have been reported in Internet Explorer, which
can be exploited by malicious people to conduct phishing attacks or
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25627/

 --

[SA25625] Zoomify Viewer ActiveX Control Multiple Buffer Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-12

Will Dormann has reported some vulnerabilities in Zoomify Viewer
ActiveX control, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25625/

 --

[SA25624] HP Help and Support Center Unspecified Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-13

HP has acknowledged a vulnerability in Help and Support Center, which
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25624/

 --

[SA25620] Windows Secure Channel Digital Signature Parsing
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-12

A vulnerability has been reported in Microsoft Windows, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25620/

 --

[SA25619] Microsoft Visio Two Code Execution Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-12

Two vulnerabilities have been reported in Microsoft Visio, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25619/

 --

[SA25604] Vitalize! Cellosoft Tokens Object Extension "RemoveChr()"
Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-13

Haikz has reported a vulnerability in Cellosoft Tokens Object extension
for Vitalize!, which can be exploited by malicious people to compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/25604/

 --

[SA25593] Blue Coat K9 Web Protection Management Service Buffer
Overflow

Critical:    Highly critical
Where:       From remote
Impact:      Privilege escalation, System access
Released:    2007-06-08

CSIS Security Group has reported a vulnerability in BlueCoat K9 Web
Protection, which can be exploited by malicious, local users to gain
escalated privileges or by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/25593/

 --

[SA25602] D-Link DWL-G650+ Wireless Driver Beacon TIM Buffer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-12

Laurent Butti has reported a vulnerability in the D-Link DWL-G650+
wireless driver, which can be exploited by malicious people to cause a
DoS (Denial of Service) or to potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/25602/

 --

[SA25606] BrightStor ARCserve Backup for Laptops & Desktops Unspecified
Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-06-11

Some vulnerabilities have been reported in BrightStor ARCserve Backup
for Laptops & Desktops, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25606/

 --

[SA25643] TEC-IT TBarCode TBarCode7 ActiveX Control "SaveImage()"
Insecure Method

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-06-13

shinnai has reported a vulnerability in TEC-IT's TBarCode TBarCode7
ActiveX control, which can be exploited by malicious people to
overwrite arbitrary files.

Full Advisory:
http://secunia.com/advisories/25643/

 --

[SA25623] Microsoft Windows Vista User Information Disclosure

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2007-06-12

A security issue has been reported in Microsoft Windows Vista, which
can be exploited by malicious, local users to gain knowledge of
sensitive information.

Full Advisory:
http://secunia.com/advisories/25623/

 --

[SA25663] Microsoft Internet Explorer 7 HTTP Basic Authentication IDN
Spoofing

Critical:    Not critical
Where:       From remote
Impact:      Spoofing
Released:    2007-06-14

A weakness has been discovered in Internet Explorer 7, which can be
exploited by malicious people to conduct spoofing attacks.

Full Advisory:
http://secunia.com/advisories/25663/

 --

[SA25603] Kaspersky AntiVirus klif.sys Hooked Functions Denial of
Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-06-12

EP_X0FF has reported some vulnerabilities in Kasperky AntiVirus, which
can be exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/25603/


UNIX/Linux:--

[SA25673] Red Hat update for openoffice.org

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-14

Red Hat has issued an update for openoffice.org. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25673/

 --

[SA25667] Xoops XT-Conteudo Module "spaw_root" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-06-14

FiSh has discovered a vulnerability in the XT-Conteudo module for
Xoops, which can be exploited by malicious people to disclose sensitive
information or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25667/

 --

[SA25665] Xoops Cjay Content WYSIWYG IE Module "spaw_root" File
Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-06-14

FiSh has discovered a vulnerability in the Cjay Content WYSIWYG IE
module for Xoops, which can be exploited by malicious people to
disclose sensitive information or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25665/

 --

[SA25660] Avaya Products PHP Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Unknown, Security Bypass, System access
Released:    2007-06-14

Avaya has acknowledged some vulnerabilities in various Avaya products,
where some have unknown impacts and others can be exploited by
malicious users to bypass certain security restrictions and potentially
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25660/

 --

[SA25652] Xoops Tiny Content Module "spaw_root" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-06-13

Sp[L]o1T has discovered a vulnerability in the Tiny Content module for
Xoops, which can be exploited by malicious people to disclose sensitive
information or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25652/

 --

[SA25651] Xoops Horoscope Module "xoopsConfig[root_path]" File
Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-06-13

BeyazKurt has discovered a vulnerability in the Horoscope module for
Xoops, which can be exploited by malicious people to disclose sensitive
information or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25651/

 --

[SA25650] Debian update for openoffice

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-13

Debian has issued an update for openoffice. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/25650/

 --

[SA25647] Mandriva update for mozilla-firefox

Critical:    Highly critical
Where:       From remote
Impact:      Spoofing, Exposure of sensitive information, DoS, System
access
Released:    2007-06-13

Mandriva has issued an update for mozilla-firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing attacks, bypass certain security restrictions, and potentially
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25647/

 --

[SA25635] Debian update for xulrunner

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Exposure of system information, DoS,
System access
Released:    2007-06-13

Debian has issued an update for xulrunner. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service), conduct spoofing attacks, bypass certain
security restrictions, and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25635/

 --

[SA25591] SGI Advanced Linux Environment Multiple Updates

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Spoofing, Exposure of sensitive
information, Privilege escalation, DoS, System access
Released:    2007-06-08

SGI has issued multiple updates for SGI Advanced Linux Environment.
These fix some vulnerabilities, which can be exploited by malicious,
local users to perform certain actions with escalated privileges or
gain escalated privileges, by malicious users to cause a DoS (Denial of
Service), and by malicious people to conduct spoofing attacks, bypass
certain security restrictions, and potentially compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/25591/

 --

[SA25669] Red Hat update for kdebase

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-06-14

Red Hat has issued an update for kdebase. This fixes a vulnerability,
which can be exploited by malicious people to disclose potentially
sensitive information.

Full Advisory:
http://secunia.com/advisories/25669/

 --

[SA25666] Sun Java System Directory Server Two Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data, Exposure of
sensitive information
Released:    2007-06-14

Two vulnerabilities have been reported in the Sun Java System Directory
Server, which can be exploited by malicious people to disclose
potentially sensitive information or bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/25666/

 --

[SA25664] Debian update for icedove

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-14

Debian has issued an update for icedove. This fixes some
vulnerabilities, which can potentially be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25664/

 --

[SA25662] Konqueror Flash Player Plug-in Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-06-14

A vulnerability has been reported in Konqueror, which can be exploited
by malicious people to disclose potentially sensitive information.

Full Advisory:
http://secunia.com/advisories/25662/

 --

[SA25655] Red Hat update for mod_perl

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-06-14

Red Hat has issued an update for mod_perl. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/25655/

 --

[SA25654] Mandriva update for freetype2

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-14

Mandriva has issued an update for freetype2. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise an application using
the library.

Full Advisory:
http://secunia.com/advisories/25654/

 --

[SA25653] fuzzylime (forum) "topic" SQL Injection and Cross-Site
Scripting

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
sensitive information
Released:    2007-06-13

Silentz has discovered some vulnerabilities in fuzzylime (forum), which
can be exploited by malicious people to conduct SQL injection attacks
and cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25653/

 --

[SA25644] Mandriva update for mozilla-thunderbird

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-13

Mandriva has issued an update for mozilla-thunderbird. This fixes some
vulnerabilities, which can potentially be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25644/

 --

[SA25622] Gentoo update for madwifi

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-06-12

Gentoo has issued an update for madwifi. This fixes some
vulnerabilities, which can be exploited by malicious, local users and
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25622/

 --

[SA25621] Ubuntu update for libexif

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-12

Ubuntu has issued an update for libexif. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/25621/

 --

[SA25613] Debian update for lighttpd

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-06-11

Debian has issued an update for lighttpd. This fixes some
vulnerabilities, which can be exploited by malicious users and
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25613/

 --

[SA25612] Debian update for freetype

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-11

Debian has issued an update for freetype. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/25612/

 --

[SA25609] Red Hat update for freetype

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-11

Red Hat has issued an update for freetype. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/25609/

 --

[SA25608] Sun Solaris sshd Identical Blocks Denial of Service
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-06-11

Sun has acknowledged a vulnerability in Sun Solaris, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25608/

 --

[SA25599] Mandriva update for libexif

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-11

Mandriva has issued an update for libexif. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/25599/

 --

[SA25594] Linux Kernel Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Brute force, Exposure of sensitive information, DoS
Released:    2007-06-08

Two vulnerabilities and a weakness have been reported in the Linux
Kernel, which can be exploited by malicious, local users to disclose
potentially sensitive information and malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/25594/

 --

[SA25676] Avaya Products OpenLDAP slapd "selfwrite" Security Issue

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-06-14

Avaya has acknowledged a security issue in various Avaya products,
which can be exploited by malicious users to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/25676/

 --

[SA25661] Avaya CMS Sun Solaris "in.iked" Denial of Service
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-06-14

Avaya has acknowledged a vulnerability in Avaya CMS (Call Management
System), which can be exploited by malicious users to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/25661/

 --

[SA25658] Mandriva update for libwmf

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-06-14

Mandriva has issued an update for libwmf. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/25658/

 --

[SA25657] Mandriva update for gd

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-06-14

Mandriva has issued an update for gd. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/25657/

 --

[SA25649] HP-UX update for Bind

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-06-13

HP has issued an update for HP-UX. This fixes some vulnerabilities,
which can be exploited by malicious people to bypass certain security
restrictions or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25649/

 --

[SA25646] Mandriva update for tetex

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-06-14

Mandriva has issued an update for tetex. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/25646/

 --

[SA25633] Red Hat update for gcc

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2007-06-12

Red Hat has issued an update for gcc. This fixes a vulnerability, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/25633/

 --

[SA25632] Red Hat update for gdb

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-12

Red Hat has issued an update for gdb. This fixes some vulnerabilities,
which potentially can be exploited by malicious, local users to gain
escalated privileges or malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/25632/

 --

[SA25628] Red Hat update for openldap

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-06-12

Red Hat has issued an update for openldap. This fixes a security issue,
which can be exploited by malicious users to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/25628/

 --

[SA25616] Maran PHP Blog "id" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-12

ls has discovered a vulnerability in Maran PHP Blog, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25616/

 --

[SA25600] Mail Notification "WITH_SSL" Plaintext Password Security
Issue

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-06-11

Ted Percival has reported a security issue in Mail Notification, which
can be exploited by malicious people to disclose potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/25600/

 --

[SA25590] rPath update for gd, php, php-mysql, and php-pgsql

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-06-08

rPath has issued an update for gd, php, php-mysql, and php-pgsql. This
fixes a vulnerability, which can be exploited by malicious people to
cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25590/

 --

[SA25668] Sun Solaris 10 NFS XDR Handling Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-06-14

A vulnerability has been reported in Solaris 10, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25668/

 --

[SA25631] Red Hat update for pam

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2007-06-12

Red Hat has issued an update for pam. This fixes a vulnerability, which
can be exploited by malicious, local users to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/25631/

 --

[SA25630] Red Hat update for kernel

Critical:    Less critical
Where:       Local system
Impact:      DoS
Released:    2007-06-12

Red Hat has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25630/

 --

[SA25629] Red Hat update for shadow-utils

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-06-12

Red Hat has issued an update for shadow-utils. This fixes a security
issue, which potentially can be exploited by malicious, local users to
perform certain actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/25629/

 --

[SA25598] Cisco Trust Agent "User Notification" Authentication Bypass

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2007-06-12

Adam Blake has reported a security issue in Cisco Trust Agent, which
can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/25598/

 --

[SA25596] Ubuntu update for kernel

Critical:    Less critical
Where:       Local system
Impact:      Brute force, Exposure of sensitive information
Released:    2007-06-11

Ubuntu has issued an update for the kernel. This fixes a security issue
and two weaknesses, which can be exploited by malicious, local users and
malicious people to disclose potentially sensitive information.

Full Advisory:
http://secunia.com/advisories/25596/

 --

[SA25679] Red Hat update for iscsi-initiator-utils

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-06-14

Red Hat has issued an update for iscsi-initiator-utils. This fixes some
security issues, which can be exploited by malicious, local users to
cause a DoS (Denial of Service),

Full Advisory:
http://secunia.com/advisories/25679/

 --

[SA25610] Ubuntu update for xscreensaver

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2007-06-13

Ubuntu has issued an update for xscreensaver. This fixes a weakness,
which potentially can be exploited by malicious people to bypass
certain security restrictions.

Full Advisory:
http://secunia.com/advisories/25610/

 --

[SA25607] Sun Solaris scp Command Line Shell Command Injection

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-06-11

Sun has acknowledged a weakness in Sun Solaris, which can be exploited
by malicious, local users to perform certain actions with escalated
privileges.

Full Advisory:
http://secunia.com/advisories/25607/


Other:--

[SA25611] ARRIS Cadant C3 CMTS IP Options Handling Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-06-12

A vulnerability has been reported in ARRIS's Cadant C3 CMTS, which can
be exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25611/

 --

[SA25592] Novell Modular Authentication Service NMASINST Information
Disclosure

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2007-06-11

A security issue has been reported in Novell Modular Authentication
Service, which can be exploited by malicious, local users to disclose
sensitive information.

Full Advisory:
http://secunia.com/advisories/25592/


Cross Platform:--

[SA25656] YaBB CRLF Injection Privilege Escalation Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Privilege escalation
Released:    2007-06-13

A vulnerability has been reported in YaBB, which can be exploited by
malicious users and malicious people to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/25656/

 --

[SA25648] OpenOffice RTF File and FreeType Font Parsing
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-13

Some vulnerabilities have been reported in OpenOffice, which can
potentially be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/25648/

 --

[SA25641] Mbedthis AppWeb URL Protocol Format String Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-12

Nir Rachmel has discovered a vulnerability in Mbedthis AppWeb, which
can be exploited by malicious people to cause a DoS (Denial of Service)
or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25641/

 --

[SA25626] PHPMailer "Sender" Arbitrary Command Execution

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-12

Thor Larholm has discovered a vulnerability in PHPMailer, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25626/

 --

[SA25615] PHP Real Estate Classifieds "loc" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-06-13

not sec group has reported a vulnerability in PHP Real Estate
Classifieds, which can be exploited by malicious people to disclose
sensitive information or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25615/

 --

[SA25614] Link Request Contact Form PHP File Upload

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-11

CorryL has discovered a vulnerability in Link Request Contact Form,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/25614/

 --

[SA25597] Sun Java System Products NSS SSLv2 Processing Buffer
Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-12

Sun has acknowledged some vulnerabilities in various Sun Java System
products, which potentially can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25597/

 --

[SA25642] libexif EXIF Information Integer Overflow Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-13

A vulnerability has been reported in libexif, which can be exploited by
malicious people to cause a DoS (Denial of Service) and potentially
compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/25642/

 --

[SA25605] e-Vision CMS Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of system information,
Exposure of sensitive information
Released:    2007-06-11

Silentz has discovered some vulnerabilities in e-Vision CMS, which can
be exploited by malicious people to disclose sensitive information or
to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25605/

 --

[SA25595] PhpWiki Empty LDAP Passwords Authentication Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-06-11

A vulnerability has been reported in PhpWiki, which can be exploited by
malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/25595/

 --

[SA25601] Firebird "connect" Request Handling Buffer Overflow
Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-06-12

Cody Pierce has reported a vulnerability in Firebird, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25601/

 --

[SA25638] dotProject Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-14

A vulnerability has been reported in dotProject, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25638/

 --

[SA25637] Invision Power Board Profile Updating Security Issue

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-06-12

A security issue has been reported in Invision Power Board, which can
be exploited by malicious users to manipulate certain data.

Full Advisory:
http://secunia.com/advisories/25637/

 --

[SA25634] Beehive Forum "links.php" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-12

Ory Segal has discovered some vulnerabilities in Beehive Forum, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/25634/

 --

[SA25617] Sporum Forum "view" and "mode" Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-12

r0t has discovered two vulnerabilities in Sporum, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25617/

 --

[SA25636] Mbedthis AppWeb HTTP TRACE Response Cross-Site Scripting

Critical:    Not critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-13

A weakness has been reported in Mbedthis AppWeb, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25636/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45



_____________________________________________________
Attend Black Hat USA, July 28-August 2 in Las Vegas, 
the world's premier technical event for ICT security 
experts. Featuring 30 hands-on training courses and 
90 Briefings presentations with lots of new content 
and new tools. Network with 4,000 delegates from 
70 nations.   Visit product displays by 30 top
sponsors in a relaxed setting. Rates increase on 
June 1 so register today. http://www.blackhat.com



This archive was generated by hypermail 2.1.3 : Thu Jun 14 2007 - 23:40:44 PDT