======================================================================== The Secunia Weekly Advisory Summary 2007-06-21 - 2007-06-28 This week: 94 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ======================================================================== 2) This Week in Brief: Apple issued a security update this week, fixing two vulnerabilities in WebKit and WebCore. An invalid type conversion when rendering frame sets in WebKit can be exploited to corrupt memory and can be exploited to execute arbitrary code when a user visits a malicious website. Another input validation error in the processing of headers passed to the "XMLHttpRequest" object in WebCore can be exploited to inject arbitrary HTTP requests. All users are urged to apply the security update immediately. This is Apple's eighteenth security update of the year, and the sixth for the Apple operating system. For more information, refer to: http://secunia.com/advisories/25786/ -- Two vulnerabilities have been reported in Trend Micro OfficeScan, which can be exploited by malicious people to bypass certain security restrictions or compromise a vulnerable system. A boundary error within a CGI module can be exploited to cause a buffer overflow and execute arbitrary code, while an unspecified error within a CGI module can be exploited to bypass the authentication mechanism of the OfficeScan Management Console via a specially crafted HTTP header. Secunia has rated these vulnerabilities as "Moderately Critical" as they can only be exploited from the local network. Both Trend Micro Officescan Corporate Editions 7.3 and 8.0 are reportedly affected. Users are urged to apply the patches from the vendor. For more information, refer to: http://secunia.com/advisories/25778/ -- Some vulnerabilities have been reported in Kerberos, which can be exploited by malicious users and malicious people to compromise a vulnerable system. An error exists within the "gssrpc__svcauth_gssapi" function in the RPC library, which can cause kadmind and possibly other third-party products to free an uninitialised pointer when receiving an RPC credential with a length of zero, and can be exploited to execute arbitrary code. A signedness error within the "gssrpc__svcauth_unix()" function in the RPC library, which is used by kadmind and possibly other third-party products, can be exploited to cause a stack-based buffer overflow and also allow an attacker to execute arbitrary code. A boundary error in kadmind within the "rename_principal_2_svc()" function can be exploited to cause a stack-based buffer overflow and can also allow execution of arbitrary code. However, successful exploitation requires that the attacker has valid user credentials. The vulnerabilities are reported in krb5-1.6.1. The vendor has released patches to solve these issues. For more information: http://secunia.com/advisories/25800/ -- VIRUS ALERTS: During the past week Secunia collected 246 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA25775] CA Products Ingres Database Vulnerabilities 2. [SA25753] VLC Media Player Multiple Plugins Format String Vulnerabilities 3. [SA25756] Ingres Database Multiple Vulnerabilities 4. [SA25745] Apple TV UPnP IGD Buffer Overflow Vulnerability 5. [SA25722] cPanel Simple CGI Wrapper Cross-Site Scripting and Path Disclosure 6. [SA25759] BitchX Hooks Command Injection Vulnerability 7. [SA25770] Apple Mac OS X IPv6 Type 0 Route Headers Denial of Service 8. [SA25741] netjukebox Multiple Cross-Site Scripting Vulnerabilities 9. [SA25707] FuseTalk Cross-Site Scripting and SQL Injection Vulnerabilities 10. [SA25735] PHP Tidy Extension "tidy_parse_string()" Buffer Overflow ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA25826] Lhaca LZH Archive Processing Unspecified Code Execution [SA25788] RKD Software BarCode ActiveX ABarCode ActiveX Control Buffer Overflow [SA25810] Dia FreeType Font Parsing Vulnerabilities [SA25805] ClickGallery SQL Injection and Cross Site Scripting Vulnerabilities [SA25779] Lebisoft zdefter "defter_kayit.asp" Script Insertion [SA25778] Trend Micro OfficeScan CGI Modules Buffer Overflow and Authentication Bypass [SA25869] HP PSC All-in-One Series XMLData ActiveX Control "saveXMLAsFile()" Insecure Method [SA25856] Nessus Unspecified Cross-Site Scripting Vulnerability [SA25851] NCTAudioStudio NCTWavChunksEditor2 ActiveX Control "CreateFile()" Insecure Method [SA25849] rwAuction Pro "search.asp" Cross-Site Scripting [SA25835] sHTTPd Unspecified Cross-Site Scripting Vulnerability [SA25828] KeyFocus Web Server "opsubmenu" Cross-Site Scripting Vulnerability [SA25825] NCTsoft Products NCTWMAFile2 ActiveX Control "CreateFile()" Insecure Method [SA25807] access2asp "od" and "search" Cross-Site Scripting Vulnerabilities [SA25781] AGEphone SIP Message Handling Multiple Vulnerabilities UNIX/Linux: [SA25870] rPath update for krb5 [SA25859] Red Hat update for HelixPlayer [SA25858] SUSE updates for Mozilla Products [SA25841] Sun Solaris Kerberos RPC Library Vulnerabilities [SA25839] Sun Solaris Mozilla 1.7 Vulnerabilities [SA25832] Gentoo update for emul-linux-x86-java [SA25821] Red Hat update for krb5 [SA25814] Mandriva update for krb5 [SA25801] Ubuntu update for krb5 [SA25800] Kerberos Multiple Vulnerabilities [SA25786] Apple Mac OS X Security Update for Two Vulnerabilities [SA25877] Debian update for wireshark [SA25875] Sun Solaris/SEAM kadmind Buffer Overflow Vulnerability [SA25868] QuickTalk forum "lang" Local File Inclusion [SA25863] Sun Solaris KSSL Kernel Denial of Service Vulnerability [SA25860] Slackware update for gd [SA25852] QuickTicket SQL Injection and Local File Inclusion [SA25850] HP Secure Web Server/Internet Express for Tru64 UNIX PHP Vulnerabilities [SA25842] Gentoo update for libexif [SA25838] Red Hat update for kernel [SA25820] Ubuntu update for libexif [SA25796] Debian update for clamav [SA25787] SUSE Update for Multiple Packages [SA25784] Debian update for tinymux [SA25843] Mandriva update for evolution [SA25816] SUSE update for php4 [SA25798] rPath update for evolution-data-server [SA25793] Red Hat update for evolution-data-server [SA25785] Mandriva update for webmin [SA25777] Red Hat update for evolution [SA25776] AWFFull Search String Script Insertion [SA25774] Ubuntu update for evolution-data-server [SA25879] Avaya CMS / IR Sun Solaris NFS Client Module Denial of Service [SA25857] Kaspersky Anti-Spam Directory Access Authentication Bypass [SA25886] Red Hat update for cman [SA25876] Sun Solaris dtsession Privilege Escalation Vulnerability [SA25818] Ubuntu update for redhat-cluster-suite [SA25802] HP-UX update for Xserver [SA25799] Cluster Project CMAN "process_client()" Buffer Overflow Vulnerability [SA25873] rPath update for httpd and mod_ssl [SA25830] Red Hat update for httpd [SA25827] Red Hat updates for apache [SA25854] Sun Solaris libsldap Denial of Service [SA25848] Avaya Products BusyBox MD5 Password Weakness [SA25847] Sun Solaris TCP Loopback/Fusion Denial of Service [SA25811] Avahi Empty TXT Data Denial of Service Other: [SA25853] Check Point VPN-1 UTM Edge Cross-Site Request Forgery Vulnerability [SA25822] Check Point Products Cross-Site Request Forgery Vulnerability [SA25806] Aastra 9112i SIP Phone Denial of Service [SA25803] D-Link DPH-540 / DPH-541 Spoofing and Denial of Service Vulnerabilities [SA25782] Nortel PC Client SIP Soft Phone Denial of Service [SA25780] Polycom SoundPoint IP Phones Denial of Service Vulnerability [SA25840] Snom 320 SIP Phone Information Disclosure and Security Bypass [SA25824] Blackberry Multiple Denial of Service Vulnerabilities Cross Platform: [SA25845] EVA-Web index.php3 Two File Inclusion Vulnerabilities [SA25837] b1gBB "tfooter" File Inclusion Vulnerability [SA25819] RealPlayer/Helix Player SMIL wallclock Buffer Overflow Vulnerability [SA25790] Dagger "dir_edge_lang" File Inclusion Vulnerability [SA25855] GD Graphics Library Multiple Vulnerabilities [SA25844] elkagroup Image Gallery "pid" SQL Injection [SA25836] BugMall Shopping Cart Cross-Site Scripting and SQL Injection [SA25834] 6ALBlog SQL Injection and File Inclusion [SA25833] Wireshark Multiple Denial of Service Vulnerabilities [SA25831] eDocStore "doc_id" SQL Injection Vulnerability [SA25809] SHTTPD Script Source Code Disclosure [SA25795] Calendarix SQL Injection and Cross-Site Scripting Vulnerabilities [SA25794] WordPress Custom Field PHP Script Upload [SA25792] Pharmacy System "page" SQL Injection [SA25789] Simple Invoices "submit" SQL Injection [SA25775] CA Products Ingres Database Vulnerabilities [SA25871] eTicket "open.php" Cross-Site Scripting [SA25866] SAP Products Cross-Site Scripting Vulnerabilities [SA25829] Perl Net::DNS Module Two Vulnerabilities [SA25817] WebSphere Application Server Web Container Information Disclosure [SA25815] phpVideoPro "sess_id" Cross-Site Scripting [SA25812] Stephen Ostermiller Contact Form Unspecified Cross-Site Scripting [SA25804] Joomla! Section Manager Script Insertion [SA25783] Xythos Products Cross-Site Scripting and Script Insertion Vulnerabilities [SA25865] Progress Heap Overflow Vulnerability ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA25826] Lhaca LZH Archive Processing Unspecified Code Execution Critical: Highly critical Where: From remote Impact: System access Released: 2007-06-27 A vulnerability has been reported in Lhaca, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25826/ -- [SA25788] RKD Software BarCode ActiveX ABarCode ActiveX Control Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2007-06-25 Brian Mariani has discovered a vulnerability in RKD Software BarCode ActiveX, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25788/ -- [SA25810] Dia FreeType Font Parsing Vulnerabilities Critical: Moderately critical Where: From remote Impact: System access Released: 2007-06-26 Two vulnerabilities have been acknowledged in Dia, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25810/ -- [SA25805] ClickGallery SQL Injection and Cross Site Scripting Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2007-06-25 r0t has reported some vulnerabilities in ClickGallery, which can be exploited by malicious people to conduct cross-site scripting or SQL injection attacks. Full Advisory: http://secunia.com/advisories/25805/ -- [SA25779] Lebisoft zdefter "defter_kayit.asp" Script Insertion Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-26 GeFORC3 has reported some vulnerabilities in Lebisoft zdefter, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25779/ -- [SA25778] Trend Micro OfficeScan CGI Modules Buffer Overflow and Authentication Bypass Critical: Moderately critical Where: From local network Impact: Security Bypass, System access Released: 2007-06-26 Two vulnerabilities have been reported in Trend Micro OfficeScan, which can be exploited by malicious people to bypass certain security restrictions or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25778/ -- [SA25869] HP PSC All-in-One Series XMLData ActiveX Control "saveXMLAsFile()" Insecure Method Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2007-06-28 Brian Mariani has discovered a vulnerability in HP PSC All-in-One Series software/driver installer, which can be exploited by malicious people to overwrite arbitrary files. Full Advisory: http://secunia.com/advisories/25869/ -- [SA25856] Nessus Unspecified Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-27 A vulnerability has been reported in Nessus, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25856/ -- [SA25851] NCTAudioStudio NCTWavChunksEditor2 ActiveX Control "CreateFile()" Insecure Method Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2007-06-27 shinnai has discovered a vulnerability in NCTAudioStudio, which can be exploited by malicious people to overwrite arbitrary files. Full Advisory: http://secunia.com/advisories/25851/ -- [SA25849] rwAuction Pro "search.asp" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-27 r0t has reported some vulnerabilities in rwAuction Pro, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25849/ -- [SA25835] sHTTPd Unspecified Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-27 A vulnerability has been reported in sHTTPd, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25835/ -- [SA25828] KeyFocus Web Server "opsubmenu" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-26 Shay Priel has discovered a vulnerability in KeyFocus Web Server, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25828/ -- [SA25825] NCTsoft Products NCTWMAFile2 ActiveX Control "CreateFile()" Insecure Method Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2007-06-27 shinnai has discovered a vulnerability in NCTAudioEditor and NCTAudioStudio, which can be exploited by malicious people to overwrite arbitrary files. Full Advisory: http://secunia.com/advisories/25825/ -- [SA25807] access2asp "od" and "search" Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-28 r0t has reported some vulnerabilities in access2asp, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25807/ -- [SA25781] AGEphone SIP Message Handling Multiple Vulnerabilities Critical: Less critical Where: From remote Impact: Unknown, DoS Released: 2007-06-26 Some vulnerabilities have been reported in AGEphone, one of which has an unknown impact, and others, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25781/ UNIX/Linux:-- [SA25870] rPath update for krb5 Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-06-28 rPath has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25870/ -- [SA25859] Red Hat update for HelixPlayer Critical: Highly critical Where: From remote Impact: System access Released: 2007-06-27 Red Hat has issued an update for HelixPlayer. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25859/ -- [SA25858] SUSE updates for Mozilla Products Critical: Highly critical Where: From remote Impact: Security Bypass, Spoofing, Exposure of sensitive information, DoS, System access Released: 2007-06-27 SUSE has issued updates for Mozilla products. These fix some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/25858/ -- [SA25841] Sun Solaris Kerberos RPC Library Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-06-27 Sun has acknowledged a vulnerability in Solaris, which can potentially be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25841/ -- [SA25839] Sun Solaris Mozilla 1.7 Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-06-27 Sun has acknowledged some vulnerabilities in Mozilla 1.7 for Sun Solaris, which can potentially be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25839/ -- [SA25832] Gentoo update for emul-linux-x86-java Critical: Highly critical Where: From remote Impact: Security Bypass, DoS, System access Released: 2007-06-27 Gentoo has issued an update for emul-linux-x86-java. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25832/ -- [SA25821] Red Hat update for krb5 Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-06-27 Red Hat has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25821/ -- [SA25814] Mandriva update for krb5 Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-06-27 Mandriva has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25814/ -- [SA25801] Ubuntu update for krb5 Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-06-27 Ubuntu has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25801/ -- [SA25800] Kerberos Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-06-27 Some vulnerabilities have been reported in Kerberos, which can be exploited by malicious users and malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25800/ -- [SA25786] Apple Mac OS X Security Update for Two Vulnerabilities Critical: Highly critical Where: From remote Impact: Cross Site Scripting, System access Released: 2007-06-25 Apple has issued a security update for Mac OS X, which fixes two vulnerabilities. Full Advisory: http://secunia.com/advisories/25786/ -- [SA25877] Debian update for wireshark Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-06-28 Debian has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25877/ -- [SA25875] Sun Solaris/SEAM kadmind Buffer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2007-06-28 Sun has acknowledged a vulnerability in Sun Solaris and SEAM, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25875/ -- [SA25868] QuickTalk forum "lang" Local File Inclusion Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-06-28 katatafish has discovered some vulnerabilities in QuickTalk forum, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/25868/ -- [SA25863] Sun Solaris KSSL Kernel Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-06-28 A vulnerability has been reported in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25863/ -- [SA25860] Slackware update for gd Critical: Moderately critical Where: From remote Impact: Unknown, DoS Released: 2007-06-27 Slackware has issued an update for gd. This fixes some vulnerabilities, where some have unknown impact and others can potentially be exploited to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25860/ -- [SA25852] QuickTicket SQL Injection and Local File Inclusion Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of system information, Exposure of sensitive information Released: 2007-06-27 Some vulnerabilities have been discovered in QuickTicket, which can be exploited by malicious people to conduct SQL injection attacks and to disclose sensitive information. Full Advisory: http://secunia.com/advisories/25852/ -- [SA25850] HP Secure Web Server/Internet Express for Tru64 UNIX PHP Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of sensitive information, DoS, System access Released: 2007-06-28 HP has acknowledged some vulnerabilities in Secure Web Server for HP Tru64 UNIX Powered by Apache (SWS) and HP Internet Express for Tru64 UNIX (IX), which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25850/ -- [SA25842] Gentoo update for libexif Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-06-27 Gentoo has issued an update for libexif. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/25842/ -- [SA25838] Red Hat update for kernel Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information, Privilege escalation, DoS Released: 2007-06-26 Red Hat has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and gain escalated privileges, or by malicious people to cause a DoS. Full Advisory: http://secunia.com/advisories/25838/ -- [SA25820] Ubuntu update for libexif Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-06-27 Ubuntu has issued an update for libexif. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/25820/ -- [SA25796] Debian update for clamav Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-06-25 Debian has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25796/ -- [SA25787] SUSE Update for Multiple Packages Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Exposure of sensitive information, DoS Released: 2007-06-25 SUSE has issued an update for multiple packages. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, and cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25787/ -- [SA25784] Debian update for tinymux Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-06-25 Debian has issued an update for tinymux. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25784/ -- [SA25843] Mandriva update for evolution Critical: Less critical Where: From remote Impact: DoS, System access Released: 2007-06-27 Mandriva has issued an update for evolution. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25843/ -- [SA25816] SUSE update for php4 Critical: Less critical Where: From remote Impact: Unknown, Security Bypass, Privilege escalation Released: 2007-06-25 SUSE has issued an update for php4. This fixes some vulnerabilities and a weakness, where one has an unknown impact and the others can be exploited by malicious, local users to gain escalated privileges, and by malicious, local users and malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/25816/ -- [SA25798] rPath update for evolution-data-server Critical: Less critical Where: From remote Impact: DoS, System access Released: 2007-06-25 rPath has issued an update for evolution-data-server. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25798/ -- [SA25793] Red Hat update for evolution-data-server Critical: Less critical Where: From remote Impact: DoS, System access Released: 2007-06-26 Red Hat has issued an update for evolution-data-server. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25793/ -- [SA25785] Mandriva update for webmin Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-25 Mandriva has issued an update for webmin. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25785/ -- [SA25777] Red Hat update for evolution Critical: Less critical Where: From remote Impact: DoS, System access Released: 2007-06-26 Red Hat has issued an update for evolution. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25777/ -- [SA25776] AWFFull Search String Script Insertion Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-22 Hctor Delcourt has discovered a vulnerability in AWFFull, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25776/ -- [SA25774] Ubuntu update for evolution-data-server Critical: Less critical Where: From remote Impact: DoS, System access Released: 2007-06-22 Ubuntu has issued an update for evolution-data-server. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25774/ -- [SA25879] Avaya CMS / IR Sun Solaris NFS Client Module Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2007-06-28 Avaya has acknowledged a vulnerability in Avaya CMS and IR, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25879/ -- [SA25857] Kaspersky Anti-Spam Directory Access Authentication Bypass Critical: Less critical Where: From local network Impact: Security Bypass Released: 2007-06-28 A security issue has been reported in Kaspersky Anti-Spam, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/25857/ -- [SA25886] Red Hat update for cman Critical: Less critical Where: Local system Impact: Privilege escalation, DoS Released: 2007-06-28 Red Hat has issued an update for cman. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges. Full Advisory: http://secunia.com/advisories/25886/ -- [SA25876] Sun Solaris dtsession Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-06-28 A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/25876/ -- [SA25818] Ubuntu update for redhat-cluster-suite Critical: Less critical Where: Local system Impact: Privilege escalation, DoS Released: 2007-06-25 Ubuntu has issued an update for redhat-cluster-suite. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges. Full Advisory: http://secunia.com/advisories/25818/ -- [SA25802] HP-UX update for Xserver Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-06-25 HP has issued an update for Xserver. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/25802/ -- [SA25799] Cluster Project CMAN "process_client()" Buffer Overflow Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation, DoS Released: 2007-06-25 Fabio Massimo Di Nitto has reported a vulnerability in Cluster Project, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges. Full Advisory: http://secunia.com/advisories/25799/ -- [SA25873] rPath update for httpd and mod_ssl Critical: Not critical Where: From remote Impact: Cross Site Scripting, DoS Released: 2007-06-28 rPath has issued an update for httpd and mod_ssl. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25873/ -- [SA25830] Red Hat update for httpd Critical: Not critical Where: From remote Impact: Cross Site Scripting, DoS Released: 2007-06-28 Red Hat has issued updates for httpd. These fix vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25830/ -- [SA25827] Red Hat updates for apache Critical: Not critical Where: From remote Impact: Cross Site Scripting, DoS Released: 2007-06-28 Red Hat has issued updates for apache. These fix vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25827/ -- [SA25854] Sun Solaris libsldap Denial of Service Critical: Not critical Where: Local system Impact: DoS Released: 2007-06-27 Sun has acknowledged a weakness in Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25854/ -- [SA25848] Avaya Products BusyBox MD5 Password Weakness Critical: Not critical Where: Local system Impact: Security Bypass Released: 2007-06-28 Avaya has acknowledged a weakness in various Avaya products, which potentially can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/25848/ -- [SA25847] Sun Solaris TCP Loopback/Fusion Denial of Service Critical: Not critical Where: Local system Impact: DoS Released: 2007-06-28 A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25847/ -- [SA25811] Avahi Empty TXT Data Denial of Service Critical: Not critical Where: Local system Impact: DoS Released: 2007-06-25 Emanuele Aina has reported a security issue in Avahi, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25811/ Other:-- [SA25853] Check Point VPN-1 UTM Edge Cross-Site Request Forgery Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-27 A vulnerability has been reported in Check Point VPN-1 UTM Edge, which can be exploited by malicious people to conduct cross-site request forgery attacks. Full Advisory: http://secunia.com/advisories/25853/ -- [SA25822] Check Point Products Cross-Site Request Forgery Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-27 A vulnerability has been reported in Check Point products, which can be exploited by malicious people to conduct cross-site request forgery attacks. Full Advisory: http://secunia.com/advisories/25822/ -- [SA25806] Aastra 9112i SIP Phone Denial of Service Critical: Less critical Where: From remote Impact: DoS Released: 2007-06-26 Sipera VIPER Lab has reported a vulnerability in the Aastra 9112i SIP Phone, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25806/ -- [SA25803] D-Link DPH-540 / DPH-541 Spoofing and Denial of Service Vulnerabilities Critical: Less critical Where: From remote Impact: Spoofing, DoS Released: 2007-06-26 Sipera VIPER Lab has reported two vulnerabilities in the D-Link DPH-540 and DPH-541 Wi-Fi phones, which can be exploited by malicious people to conduct spoofing attacks or to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25803/ -- [SA25782] Nortel PC Client SIP Soft Phone Denial of Service Critical: Less critical Where: From remote Impact: DoS Released: 2007-06-26 Sipera VIPER Lab has reported a vulnerability in Nortel PC Client SIP Soft Phone, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25782/ -- [SA25780] Polycom SoundPoint IP Phones Denial of Service Vulnerability Critical: Less critical Where: From remote Impact: DoS Released: 2007-06-26 A vulnerability has been reported in Polycom SoundPoint IP phones, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25780/ -- [SA25840] Snom 320 SIP Phone Information Disclosure and Security Bypass Critical: Less critical Where: From local network Impact: Security Bypass, Exposure of sensitive information Released: 2007-06-28 Sipera VIPER Lab has reported a security issue in the Snom 320 SIP Phone, which can be exploited by malicious people to disclose sensitive information and to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/25840/ -- [SA25824] Blackberry Multiple Denial of Service Vulnerabilities Critical: Less critical Where: From local network Impact: DoS Released: 2007-06-28 Sipera VIPER Lab has reported some vulnerabilities in Blackberry, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25824/ Cross Platform:-- [SA25845] EVA-Web index.php3 Two File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2007-06-28 Two vulnerabilities have been discovered in EVA-Web, which can be exploited by malicious people to disclose sensitive information or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25845/ -- [SA25837] b1gBB "tfooter" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-06-26 Rf7awy has discovered a vulnerability in b1gBB, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25837/ -- [SA25819] RealPlayer/Helix Player SMIL wallclock Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-06-27 A vulnerability has been reported in RealPlayer and Helix Player, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25819/ -- [SA25790] Dagger "dir_edge_lang" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2007-06-25 katatafish has discovered a vulnerability in Dagger, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25790/ -- [SA25855] GD Graphics Library Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Unknown, DoS Released: 2007-06-27 Some vulnerabilities have been reported in the GD Graphics Library, where some have unknown impact and others can potentially be exploited to cause a DoS. Full Advisory: http://secunia.com/advisories/25855/ -- [SA25844] elkagroup Image Gallery "pid" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-06-28 A vulnerability has been reported in elkagroup Image Gallery, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25844/ -- [SA25836] BugMall Shopping Cart Cross-Site Scripting and SQL Injection Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2007-06-27 t0pP8uZz and xprog have discovered some vulnerabilities in BugMall Shopping Cart, which can be exploited by malicious people to conduct cross-site scripting or SQL injection attacks. Full Advisory: http://secunia.com/advisories/25836/ -- [SA25834] 6ALBlog SQL Injection and File Inclusion Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of system information, Exposure of sensitive information, System access Released: 2007-06-27 Crackers_Child has reported some vulnerabilities in 6ALBlog, which can be exploited by malicious people to conduct SQL injection attacks, and by malicious users to disclose sensitive information or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25834/ -- [SA25833] Wireshark Multiple Denial of Service Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-06-27 Some vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25833/ -- [SA25831] eDocStore "doc_id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-06-26 A vulnerability has been reported in eDocStore, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25831/ -- [SA25809] SHTTPD Script Source Code Disclosure Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2007-06-27 Shay priel has reported a vulnerability in SHTTPD, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/25809/ -- [SA25795] Calendarix SQL Injection and Cross-Site Scripting Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2007-06-26 Jesper Jurcenoks has discovered some vulnerabilities in Calendarix, which can be exploited by malicious people to conduct SQL injection and cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25795/ -- [SA25794] WordPress Custom Field PHP Script Upload Critical: Moderately critical Where: From remote Impact: Security Bypass, System access Released: 2007-06-26 Alexander Concha has discovered a vulnerability in WordPress and WordPress MU, which can be exploited by malicious users to bypass certain security restrictions and to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25794/ -- [SA25792] Pharmacy System "page" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-06-26 t0pP8uZz and xprog have reported a vulnerability in Pharmacy System, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25792/ -- [SA25789] Simple Invoices "submit" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-06-27 Kacper has reported a vulnerability in Simple Invoices, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25789/ -- [SA25775] CA Products Ingres Database Vulnerabilities Critical: Moderately critical Where: From local network Impact: Manipulation of data, System access Released: 2007-06-22 Some vulnerabilities have been reported in various CA products, which can be exploited by malicious people to truncate a certain file or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25775/ -- [SA25871] eTicket "open.php" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-28 Jesper Jurcenoks has discovered two vulnerabilities in eTicket, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25871/ -- [SA25866] SAP Products Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-28 Cyrill Brunschwiler has reported some vulnerabilities in various SAP products, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25866/ -- [SA25829] Perl Net::DNS Module Two Vulnerabilities Critical: Less critical Where: From remote Impact: Spoofing, DoS Released: 2007-06-27 Two vulnerabilities have been reported in the Net::DNS Perl module, which can be exploited to poison the DNS cache or to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25829/ -- [SA25817] WebSphere Application Server Web Container Information Disclosure Critical: Less critical Where: From remote Impact: Exposure of sensitive information Released: 2007-06-25 A security issue has been reported in WebSphere Application Server, which may disclose sensitive information to malicious people. Full Advisory: http://secunia.com/advisories/25817/ -- [SA25815] phpVideoPro "sess_id" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-27 A vulnerability has been reported in phpVideoPro, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25815/ -- [SA25812] Stephen Ostermiller Contact Form Unspecified Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-26 A vulnerability has been reported in Stephen Ostermiller Contact Form, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25812/ -- [SA25804] Joomla! Section Manager Script Insertion Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-27 Cindy Chee has discovered a vulnerability in Joomla!, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25804/ -- [SA25783] Xythos Products Cross-Site Scripting and Script Insertion Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-06-27 Multiple vulnerabilities have been reported in various Xythos products, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25783/ -- [SA25865] Progress Heap Overflow Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2007-06-28 suresync has reported a vulnerability in Progress, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25865/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _____________________________________________________ Attend Black Hat USA, July 28-August 2 in Las Vegas, the world's premier technical event for ICT security experts. Featuring 30 hands-on training courses and 90 Briefings presentations with lots of new content and new tools. Network with 4,000 delegates from 70 nations. Visit product displays by 30 top sponsors in a relaxed setting. Rates increase on June 1 so register today. http://www.blackhat.com
This archive was generated by hypermail 2.1.3 : Thu Jun 28 2007 - 22:27:28 PDT