[ISN] Secunia Weekly Summary - Issue: 2007-26

From: InfoSec News (alerts@private)
Date: Thu Jun 28 2007 - 22:19:19 PDT


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2007-06-21 - 2007-06-28                        

                       This week: 94 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.

The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.

========================================================================
2) This Week in Brief:

Apple issued a security update this week, fixing two vulnerabilities in
WebKit and WebCore.

An invalid type conversion when rendering frame sets in WebKit can be
exploited to corrupt memory and can be exploited to execute arbitrary
code when a user visits a malicious website.

Another input validation error in the processing of headers passed to
the "XMLHttpRequest" object in WebCore can be exploited to inject
arbitrary HTTP requests.

All users are urged to apply the security update immediately. This is
Apple's eighteenth security update of the year, and the sixth for the
Apple operating system.

For more information, refer to:
http://secunia.com/advisories/25786/

 --

Two vulnerabilities have been reported in Trend Micro OfficeScan, which
can be exploited by malicious people to bypass certain security
restrictions or compromise a vulnerable system.

A boundary error within a CGI module can be exploited to cause a
buffer overflow and execute arbitrary code, while an unspecified error
within a CGI module can be exploited to bypass the authentication
mechanism of the OfficeScan Management Console via a specially crafted
HTTP header.

Secunia has rated these vulnerabilities as "Moderately Critical" as 
they can only be exploited from the local network. Both Trend Micro
Officescan Corporate Editions 7.3 and 8.0 are reportedly affected.
Users are urged to apply the patches from the vendor.

For more information, refer to:
http://secunia.com/advisories/25778/

 --

Some vulnerabilities have been reported in Kerberos, which can be
exploited by malicious users and malicious people to compromise a
vulnerable system.

An error exists within the "gssrpc__svcauth_gssapi" function in
the RPC library, which can cause kadmind and possibly other
third-party products to free an uninitialised pointer when receiving
an RPC credential with a length of zero, and can be exploited to
execute arbitrary code.

A signedness error within the "gssrpc__svcauth_unix()" function in
the RPC library, which is used by kadmind and possibly other
third-party products, can be exploited to cause a stack-based buffer
overflow and also allow an attacker to execute arbitrary code.

A boundary error in kadmind within the "rename_principal_2_svc()"
function can be exploited to cause a stack-based buffer overflow and
can also allow execution of arbitrary code. However, successful 
exploitation requires that the attacker has valid user credentials.

The vulnerabilities are reported in krb5-1.6.1. The vendor has
released patches to solve these issues.

For more information:
http://secunia.com/advisories/25800/

 --

VIRUS ALERTS:

During the past week Secunia collected 246 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA25775] CA Products Ingres Database Vulnerabilities
2.  [SA25753] VLC Media Player Multiple Plugins Format String
              Vulnerabilities
3.  [SA25756] Ingres Database Multiple Vulnerabilities
4.  [SA25745] Apple TV UPnP IGD Buffer Overflow Vulnerability
5.  [SA25722] cPanel Simple CGI Wrapper Cross-Site Scripting and Path
              Disclosure
6.  [SA25759] BitchX Hooks Command Injection Vulnerability
7.  [SA25770] Apple Mac OS X IPv6 Type 0 Route Headers Denial of
Service
8.  [SA25741] netjukebox Multiple Cross-Site Scripting Vulnerabilities
9.  [SA25707] FuseTalk Cross-Site Scripting and SQL Injection
              Vulnerabilities
10. [SA25735] PHP Tidy Extension "tidy_parse_string()" Buffer Overflow

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA25826] Lhaca LZH Archive Processing Unspecified Code Execution
[SA25788] RKD Software BarCode ActiveX ABarCode ActiveX Control Buffer
Overflow
[SA25810] Dia FreeType Font Parsing Vulnerabilities
[SA25805] ClickGallery SQL Injection and Cross Site Scripting
Vulnerabilities
[SA25779] Lebisoft zdefter "defter_kayit.asp" Script Insertion
[SA25778] Trend Micro OfficeScan CGI Modules Buffer Overflow and
Authentication Bypass
[SA25869] HP PSC All-in-One Series XMLData ActiveX Control
"saveXMLAsFile()"  Insecure Method
[SA25856] Nessus Unspecified Cross-Site Scripting Vulnerability
[SA25851] NCTAudioStudio NCTWavChunksEditor2 ActiveX Control
"CreateFile()" Insecure Method
[SA25849] rwAuction Pro "search.asp" Cross-Site Scripting
[SA25835] sHTTPd Unspecified Cross-Site Scripting Vulnerability
[SA25828] KeyFocus Web Server "opsubmenu" Cross-Site Scripting
Vulnerability
[SA25825] NCTsoft Products NCTWMAFile2 ActiveX Control "CreateFile()"
Insecure Method
[SA25807] access2asp "od" and "search" Cross-Site Scripting
Vulnerabilities
[SA25781] AGEphone SIP Message Handling Multiple Vulnerabilities

UNIX/Linux:
[SA25870] rPath update for krb5
[SA25859] Red Hat update for HelixPlayer
[SA25858] SUSE updates for Mozilla Products
[SA25841] Sun Solaris Kerberos RPC Library Vulnerabilities
[SA25839] Sun Solaris Mozilla 1.7 Vulnerabilities
[SA25832] Gentoo update for emul-linux-x86-java
[SA25821] Red Hat update for krb5
[SA25814] Mandriva update for krb5
[SA25801] Ubuntu update for krb5
[SA25800] Kerberos Multiple Vulnerabilities
[SA25786] Apple Mac OS X Security Update for Two Vulnerabilities
[SA25877] Debian update for wireshark
[SA25875] Sun Solaris/SEAM kadmind Buffer Overflow Vulnerability
[SA25868] QuickTalk forum "lang" Local File Inclusion
[SA25863] Sun Solaris KSSL Kernel Denial of Service Vulnerability
[SA25860] Slackware update for gd
[SA25852] QuickTicket SQL Injection and Local File Inclusion
[SA25850] HP Secure Web Server/Internet Express for Tru64 UNIX PHP
Vulnerabilities
[SA25842] Gentoo update for libexif
[SA25838] Red Hat update for kernel
[SA25820] Ubuntu update for libexif
[SA25796] Debian update for clamav
[SA25787] SUSE Update for Multiple Packages
[SA25784] Debian update for tinymux
[SA25843] Mandriva update for evolution
[SA25816] SUSE update for php4
[SA25798] rPath update for evolution-data-server
[SA25793] Red Hat update for evolution-data-server
[SA25785] Mandriva update for webmin
[SA25777] Red Hat update for evolution
[SA25776] AWFFull Search String Script Insertion
[SA25774] Ubuntu update for evolution-data-server
[SA25879] Avaya CMS / IR Sun Solaris NFS Client Module Denial of
Service
[SA25857] Kaspersky Anti-Spam Directory Access Authentication Bypass
[SA25886] Red Hat update for cman
[SA25876] Sun Solaris dtsession Privilege Escalation Vulnerability
[SA25818] Ubuntu update for redhat-cluster-suite
[SA25802] HP-UX update for Xserver
[SA25799] Cluster Project CMAN "process_client()" Buffer Overflow
Vulnerability
[SA25873] rPath update for httpd and mod_ssl
[SA25830] Red Hat update for httpd
[SA25827] Red Hat updates for apache
[SA25854] Sun Solaris libsldap Denial of Service
[SA25848] Avaya Products BusyBox MD5 Password Weakness
[SA25847] Sun Solaris TCP Loopback/Fusion Denial of Service
[SA25811] Avahi Empty TXT Data Denial of Service

Other:
[SA25853] Check Point VPN-1 UTM Edge Cross-Site Request Forgery
Vulnerability
[SA25822] Check Point Products Cross-Site Request Forgery
Vulnerability
[SA25806] Aastra 9112i SIP Phone Denial of Service
[SA25803] D-Link DPH-540 / DPH-541 Spoofing and Denial of Service
Vulnerabilities
[SA25782] Nortel PC Client SIP Soft Phone Denial of Service
[SA25780] Polycom SoundPoint IP Phones Denial of Service Vulnerability
[SA25840] Snom 320 SIP Phone Information Disclosure and Security
Bypass
[SA25824] Blackberry Multiple Denial of Service Vulnerabilities

Cross Platform:
[SA25845] EVA-Web index.php3 Two File Inclusion Vulnerabilities
[SA25837] b1gBB "tfooter" File Inclusion Vulnerability
[SA25819] RealPlayer/Helix Player SMIL wallclock Buffer Overflow
Vulnerability
[SA25790] Dagger "dir_edge_lang" File Inclusion Vulnerability
[SA25855] GD Graphics Library Multiple Vulnerabilities
[SA25844] elkagroup Image Gallery "pid" SQL Injection
[SA25836] BugMall Shopping Cart Cross-Site Scripting and SQL Injection
[SA25834] 6ALBlog SQL Injection and File Inclusion
[SA25833] Wireshark Multiple Denial of Service Vulnerabilities
[SA25831] eDocStore "doc_id" SQL Injection Vulnerability
[SA25809] SHTTPD Script Source Code Disclosure
[SA25795] Calendarix SQL Injection and Cross-Site Scripting
Vulnerabilities
[SA25794] WordPress Custom Field PHP Script Upload
[SA25792] Pharmacy System "page" SQL Injection
[SA25789] Simple Invoices "submit" SQL Injection
[SA25775] CA Products Ingres Database Vulnerabilities
[SA25871] eTicket "open.php" Cross-Site Scripting
[SA25866] SAP Products Cross-Site Scripting Vulnerabilities
[SA25829] Perl Net::DNS Module Two Vulnerabilities
[SA25817] WebSphere Application Server Web Container Information
Disclosure
[SA25815] phpVideoPro "sess_id" Cross-Site Scripting
[SA25812] Stephen Ostermiller Contact Form Unspecified Cross-Site
Scripting
[SA25804] Joomla! Section Manager Script Insertion
[SA25783] Xythos Products Cross-Site Scripting and Script Insertion
Vulnerabilities
[SA25865] Progress Heap Overflow Vulnerability

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA25826] Lhaca LZH Archive Processing Unspecified Code Execution

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-27

A vulnerability has been reported in Lhaca, which can be exploited by
malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25826/

 --

[SA25788] RKD Software BarCode ActiveX ABarCode ActiveX Control Buffer
Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-25

Brian Mariani has discovered a vulnerability in RKD Software BarCode
ActiveX, which can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/25788/

 --

[SA25810] Dia FreeType Font Parsing Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-06-26

Two vulnerabilities have been acknowledged in Dia, which potentially
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25810/

 --

[SA25805] ClickGallery SQL Injection and Cross Site Scripting
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2007-06-25

r0t has reported some vulnerabilities in ClickGallery, which can be
exploited by malicious people to conduct cross-site scripting or SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/25805/

 --

[SA25779] Lebisoft zdefter "defter_kayit.asp" Script Insertion

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-26

GeFORC3 has reported some vulnerabilities in Lebisoft zdefter, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/25779/

 --

[SA25778] Trend Micro OfficeScan CGI Modules Buffer Overflow and
Authentication Bypass

Critical:    Moderately critical
Where:       From local network
Impact:      Security Bypass, System access
Released:    2007-06-26

Two vulnerabilities have been reported in Trend Micro OfficeScan, which
can be exploited by malicious people to bypass certain security
restrictions or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25778/

 --

[SA25869] HP PSC All-in-One Series XMLData ActiveX Control
"saveXMLAsFile()"  Insecure Method

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-06-28

Brian Mariani has discovered a vulnerability in HP PSC All-in-One
Series software/driver installer, which can be exploited by malicious
people to overwrite arbitrary files.

Full Advisory:
http://secunia.com/advisories/25869/

 --

[SA25856] Nessus Unspecified Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-27

A vulnerability has been reported in Nessus, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25856/

 --

[SA25851] NCTAudioStudio NCTWavChunksEditor2 ActiveX Control
"CreateFile()" Insecure Method

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-06-27

shinnai has discovered a vulnerability in NCTAudioStudio, which can be
exploited by malicious people to overwrite arbitrary files.

Full Advisory:
http://secunia.com/advisories/25851/

 --

[SA25849] rwAuction Pro "search.asp" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-27

r0t has reported some vulnerabilities in rwAuction Pro, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25849/

 --

[SA25835] sHTTPd Unspecified Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-27

A vulnerability has been reported in sHTTPd, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25835/

 --

[SA25828] KeyFocus Web Server "opsubmenu" Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-26

Shay Priel has discovered a vulnerability in KeyFocus Web Server, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/25828/

 --

[SA25825] NCTsoft Products NCTWMAFile2 ActiveX Control "CreateFile()"
Insecure Method

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-06-27

shinnai has discovered a vulnerability in NCTAudioEditor and
NCTAudioStudio, which can be exploited by malicious people to overwrite
arbitrary files.

Full Advisory:
http://secunia.com/advisories/25825/

 --

[SA25807] access2asp "od" and "search" Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-28

r0t has reported some vulnerabilities in access2asp, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25807/

 --

[SA25781] AGEphone SIP Message Handling Multiple Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Unknown, DoS
Released:    2007-06-26

Some vulnerabilities have been reported in AGEphone, one of which has
an unknown impact, and others, which can be exploited by malicious
people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25781/


UNIX/Linux:--

[SA25870] rPath update for krb5

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-28

rPath has issued an update for krb5. This fixes some vulnerabilities,
which can be exploited by malicious users and malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25870/

 --

[SA25859] Red Hat update for HelixPlayer

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-27

Red Hat has issued an update for HelixPlayer. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/25859/

 --

[SA25858] SUSE updates for Mozilla Products

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Spoofing, Exposure of sensitive
information, DoS, System access
Released:    2007-06-27

SUSE has issued updates for Mozilla products. These fix some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing attacks, bypass certain security restrictions, and potentially
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25858/

 --

[SA25841] Sun Solaris Kerberos RPC Library Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-27

Sun has acknowledged a vulnerability in Solaris, which can potentially
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25841/

 --

[SA25839] Sun Solaris Mozilla 1.7 Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-27

Sun has acknowledged some vulnerabilities in Mozilla 1.7 for Sun
Solaris, which can potentially be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25839/

 --

[SA25832] Gentoo update for emul-linux-x86-java

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2007-06-27

Gentoo has issued an update for emul-linux-x86-java. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, cause a DoS (Denial of Service), or
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25832/

 --

[SA25821] Red Hat update for krb5

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-27

Red Hat has issued an update for krb5. This fixes some vulnerabilities,
which can be exploited by malicious users and malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25821/

 --

[SA25814] Mandriva update for krb5

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-27

Mandriva has issued an update for krb5. This fixes some
vulnerabilities, which can be exploited by malicious users and
malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25814/

 --

[SA25801] Ubuntu update for krb5

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-27

Ubuntu has issued an update for krb5. This fixes some vulnerabilities,
which can be exploited by malicious users and malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25801/

 --

[SA25800] Kerberos Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-27

Some vulnerabilities have been reported in Kerberos, which can be
exploited by malicious users and malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/25800/

 --

[SA25786] Apple Mac OS X Security Update for Two Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, System access
Released:    2007-06-25

Apple has issued a security update for Mac OS X, which fixes two
vulnerabilities.

Full Advisory:
http://secunia.com/advisories/25786/

 --

[SA25877] Debian update for wireshark

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-06-28

Debian has issued an update for wireshark. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25877/

 --

[SA25875] Sun Solaris/SEAM kadmind Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-06-28

Sun has acknowledged a vulnerability in Sun Solaris and SEAM, which can
be exploited by malicious users to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25875/

 --

[SA25868] QuickTalk forum "lang" Local File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-06-28

katatafish has discovered some vulnerabilities in QuickTalk forum,
which can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/25868/

 --

[SA25863] Sun Solaris KSSL Kernel Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-06-28

A vulnerability has been reported in Solaris, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25863/

 --

[SA25860] Slackware update for gd

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, DoS
Released:    2007-06-27

Slackware has issued an update for gd. This fixes some vulnerabilities,
where some have unknown impact and others can potentially be exploited
to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25860/

 --

[SA25852] QuickTicket SQL Injection and Local File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of system information,
Exposure of sensitive information
Released:    2007-06-27

Some vulnerabilities have been discovered in QuickTicket, which can be
exploited by malicious people to conduct SQL injection attacks and to
disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/25852/

 --

[SA25850] HP Secure Web Server/Internet Express for Tru64 UNIX PHP
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information, DoS,
System access
Released:    2007-06-28

HP has acknowledged some vulnerabilities in Secure Web Server for HP
Tru64 UNIX Powered by Apache (SWS) and HP Internet Express for Tru64
UNIX (IX), which can be exploited by malicious people to disclose
potentially sensitive information, bypass certain security
restrictions, cause a DoS (Denial of Service), or potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25850/

 --

[SA25842] Gentoo update for libexif

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-27

Gentoo has issued an update for libexif. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/25842/

 --

[SA25838] Red Hat update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, Privilege escalation,
DoS
Released:    2007-06-26

Red Hat has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service), disclose potentially sensitive
information, and gain escalated privileges, or by malicious people to
cause a DoS.

Full Advisory:
http://secunia.com/advisories/25838/

 --

[SA25820] Ubuntu update for libexif

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-27

Ubuntu has issued an update for libexif. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/25820/

 --

[SA25796] Debian update for clamav

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-06-25

Debian has issued an update for clamav. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25796/

 --

[SA25787] SUSE Update for Multiple Packages

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of sensitive information,
DoS
Released:    2007-06-25

SUSE has issued an update for multiple packages. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting attacks, disclose potentially sensitive
information, and cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25787/

 --

[SA25784] Debian update for tinymux

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-25

Debian has issued an update for tinymux. This fixes a vulnerability,
which can be exploited by malicious users to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25784/

 --

[SA25843] Mandriva update for evolution

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-27

Mandriva has issued an update for evolution. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25843/

 --

[SA25816] SUSE update for php4

Critical:    Less critical
Where:       From remote
Impact:      Unknown, Security Bypass, Privilege escalation
Released:    2007-06-25

SUSE has issued an update for php4. This fixes some vulnerabilities and
a weakness, where one has an unknown impact and the others can be
exploited by malicious, local users to gain escalated privileges, and
by malicious, local users and malicious people to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/25816/

 --

[SA25798] rPath update for evolution-data-server

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-25

rPath has issued an update for evolution-data-server. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/25798/

 --

[SA25793] Red Hat update for evolution-data-server

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-26

Red Hat has issued an update for evolution-data-server. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25793/

 --

[SA25785] Mandriva update for webmin

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-25

Mandriva has issued an update for webmin. This fixes a vulnerability,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/25785/

 --

[SA25777] Red Hat update for evolution

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-26

Red Hat has issued an update for evolution. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/25777/

 --

[SA25776] AWFFull Search String Script Insertion

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-22

Hctor Delcourt has discovered a vulnerability in AWFFull, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25776/

 --

[SA25774] Ubuntu update for evolution-data-server

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-22

Ubuntu has issued an update for evolution-data-server. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25774/

 --

[SA25879] Avaya CMS / IR Sun Solaris NFS Client Module Denial of
Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-06-28

Avaya has acknowledged a vulnerability in Avaya CMS and IR, which can
be exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25879/

 --

[SA25857] Kaspersky Anti-Spam Directory Access Authentication Bypass

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass
Released:    2007-06-28

A security issue has been reported in Kaspersky Anti-Spam, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/25857/

 --

[SA25886] Red Hat update for cman

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation, DoS
Released:    2007-06-28

Red Hat has issued an update for cman. This fixes a vulnerability,
which can be exploited by malicious, local users to cause a DoS (Denial
of Service) or potentially gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/25886/

 --

[SA25876] Sun Solaris dtsession Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-06-28

A vulnerability has been reported in Sun Solaris, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/25876/

 --

[SA25818] Ubuntu update for redhat-cluster-suite

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation, DoS
Released:    2007-06-25

Ubuntu has issued an update for redhat-cluster-suite. This fixes a
vulnerability, which can be exploited by malicious, local users to
cause a DoS (Denial of Service) or potentially gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/25818/

 --

[SA25802] HP-UX update for Xserver

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-06-25

HP has issued an update for Xserver. This fixes some vulnerabilities,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/25802/

 --

[SA25799] Cluster Project CMAN "process_client()" Buffer Overflow
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation, DoS
Released:    2007-06-25

Fabio Massimo Di Nitto has reported a vulnerability in Cluster Project,
which can be exploited by malicious, local users to cause a DoS (Denial
of Service) or potentially gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/25799/

 --

[SA25873] rPath update for httpd and mod_ssl

Critical:    Not critical
Where:       From remote
Impact:      Cross Site Scripting, DoS
Released:    2007-06-28

rPath has issued an update for httpd and mod_ssl. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service) and by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25873/

 --

[SA25830] Red Hat update for httpd

Critical:    Not critical
Where:       From remote
Impact:      Cross Site Scripting, DoS
Released:    2007-06-28

Red Hat has issued updates for httpd. These fix vulnerabilities, which
can be exploited by malicious, local users to cause a DoS (Denial of
Service) and by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/25830/

 --

[SA25827] Red Hat updates for apache

Critical:    Not critical
Where:       From remote
Impact:      Cross Site Scripting, DoS
Released:    2007-06-28

Red Hat has issued updates for apache. These fix vulnerabilities, which
can be exploited by malicious, local users to cause a DoS (Denial of
Service) and by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/25827/

 --

[SA25854] Sun Solaris libsldap Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-06-27

Sun has acknowledged a weakness in Solaris, which can be exploited by
malicious, local users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25854/

 --

[SA25848] Avaya Products BusyBox MD5 Password Weakness

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2007-06-28

Avaya has acknowledged a weakness in various Avaya products, which
potentially can be exploited by malicious, local users to bypass
certain security restrictions.

Full Advisory:
http://secunia.com/advisories/25848/

 --

[SA25847] Sun Solaris TCP Loopback/Fusion Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-06-28

A vulnerability has been reported in Sun Solaris, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/25847/

 --

[SA25811] Avahi Empty TXT Data Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-06-25

Emanuele Aina has reported a security issue in Avahi, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/25811/


Other:--

[SA25853] Check Point VPN-1 UTM Edge Cross-Site Request Forgery
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-27

A vulnerability has been reported in Check Point VPN-1 UTM Edge, which
can be exploited by malicious people to conduct cross-site request
forgery attacks.

Full Advisory:
http://secunia.com/advisories/25853/

 --

[SA25822] Check Point Products Cross-Site Request Forgery
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-27

A vulnerability has been reported in Check Point products, which can be
exploited by malicious people to conduct cross-site request forgery
attacks.

Full Advisory:
http://secunia.com/advisories/25822/

 --

[SA25806] Aastra 9112i SIP Phone Denial of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-06-26

Sipera VIPER Lab has reported a vulnerability in the Aastra 9112i SIP
Phone, which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/25806/

 --

[SA25803] D-Link DPH-540 / DPH-541 Spoofing and Denial of Service
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Spoofing, DoS
Released:    2007-06-26

Sipera VIPER Lab has reported two vulnerabilities in the D-Link DPH-540
and DPH-541 Wi-Fi phones, which can be exploited by malicious people to
conduct spoofing attacks or to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25803/

 --

[SA25782] Nortel PC Client SIP Soft Phone Denial of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-06-26

Sipera VIPER Lab has reported a vulnerability in Nortel PC Client SIP
Soft Phone, which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/25782/

 --

[SA25780] Polycom SoundPoint IP Phones Denial of Service Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-06-26

A vulnerability has been reported in Polycom SoundPoint IP phones,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/25780/

 --

[SA25840] Snom 320 SIP Phone Information Disclosure and Security
Bypass

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass, Exposure of sensitive information
Released:    2007-06-28

Sipera VIPER Lab has reported a security issue in the Snom 320 SIP
Phone, which can be exploited by malicious people to disclose sensitive
information and to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/25840/

 --

[SA25824] Blackberry Multiple Denial of Service Vulnerabilities

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-06-28

Sipera VIPER Lab has reported some vulnerabilities in Blackberry, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/25824/


Cross Platform:--

[SA25845] EVA-Web index.php3 Two File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-06-28

Two vulnerabilities have been discovered in EVA-Web, which can be
exploited by malicious people to disclose sensitive information or
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25845/

 --

[SA25837] b1gBB "tfooter" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-26

Rf7awy has discovered a vulnerability in b1gBB, which can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25837/

 --

[SA25819] RealPlayer/Helix Player SMIL wallclock Buffer Overflow
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-27

A vulnerability has been reported in RealPlayer and Helix Player, which
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25819/

 --

[SA25790] Dagger "dir_edge_lang" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-06-25

katatafish has discovered a vulnerability in Dagger, which can be
exploited by malicious people to disclose sensitive information or to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25790/

 --

[SA25855] GD Graphics Library Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, DoS
Released:    2007-06-27

Some vulnerabilities have been reported in the GD Graphics Library,
where some have unknown impact and others can potentially be exploited
to cause a DoS.

Full Advisory:
http://secunia.com/advisories/25855/

 --

[SA25844] elkagroup Image Gallery "pid" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-06-28

A vulnerability has been reported in elkagroup Image Gallery, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25844/

 --

[SA25836] BugMall Shopping Cart Cross-Site Scripting and SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2007-06-27

t0pP8uZz and xprog have discovered some vulnerabilities in BugMall
Shopping Cart, which can be exploited by malicious people to conduct
cross-site scripting or SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25836/

 --

[SA25834] 6ALBlog SQL Injection and File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of system information,
Exposure of sensitive information, System access
Released:    2007-06-27

Crackers_Child has reported some vulnerabilities in 6ALBlog, which can
be exploited by malicious people to conduct SQL injection attacks, and
by malicious users to disclose sensitive information or to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/25834/

 --

[SA25833] Wireshark Multiple Denial of Service Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-06-27

Some vulnerabilities have been reported in Wireshark, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25833/

 --

[SA25831] eDocStore "doc_id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-06-26

A vulnerability has been reported in eDocStore, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25831/

 --

[SA25809] SHTTPD Script Source Code Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-06-27

Shay priel has reported a vulnerability in SHTTPD, which can be
exploited by malicious people to disclose potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/25809/

 --

[SA25795] Calendarix SQL Injection and Cross-Site Scripting
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2007-06-26

Jesper Jurcenoks has discovered some vulnerabilities in Calendarix,
which can be exploited by malicious people to conduct SQL injection and
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25795/

 --

[SA25794] WordPress Custom Field PHP Script Upload

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, System access
Released:    2007-06-26

Alexander Concha has discovered a vulnerability in WordPress and
WordPress MU, which can be exploited by malicious users to bypass
certain security restrictions and to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25794/

 --

[SA25792] Pharmacy System "page" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-06-26

t0pP8uZz and xprog have reported a vulnerability in Pharmacy System,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/25792/

 --

[SA25789] Simple Invoices "submit" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-06-27

Kacper has reported a vulnerability in Simple Invoices, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25789/

 --

[SA25775] CA Products Ingres Database Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      Manipulation of data, System access
Released:    2007-06-22

Some vulnerabilities have been reported in various CA products, which
can be exploited by malicious people to truncate a certain file or
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25775/

 --

[SA25871] eTicket "open.php" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-28

Jesper Jurcenoks has discovered two vulnerabilities in eTicket, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/25871/

 --

[SA25866] SAP Products Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-28

Cyrill Brunschwiler has reported some vulnerabilities in various SAP
products, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25866/

 --

[SA25829] Perl Net::DNS Module Two Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Spoofing, DoS
Released:    2007-06-27

Two vulnerabilities have been reported in the Net::DNS Perl module,
which can be exploited to poison the DNS cache or to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/25829/

 --

[SA25817] WebSphere Application Server Web Container Information
Disclosure

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-06-25

A security issue has been reported in WebSphere Application Server,
which may disclose sensitive information to malicious people.

Full Advisory:
http://secunia.com/advisories/25817/

 --

[SA25815] phpVideoPro "sess_id" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-27

A vulnerability has been reported in phpVideoPro, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25815/

 --

[SA25812] Stephen Ostermiller Contact Form Unspecified Cross-Site
Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-26

A vulnerability has been reported in Stephen Ostermiller Contact Form,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/25812/

 --

[SA25804] Joomla! Section Manager Script Insertion

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-27

Cindy Chee has discovered a vulnerability in Joomla!, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25804/

 --

[SA25783] Xythos Products Cross-Site Scripting and Script Insertion
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-06-27

Multiple vulnerabilities have been reported in various Xythos products,
which can be exploited by malicious users to conduct script insertion
attacks and by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/25783/

 --

[SA25865] Progress Heap Overflow Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-06-28

suresync has reported a vulnerability in Progress, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25865/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_____________________________________________________
Attend Black Hat USA, July 28-August 2 in Las Vegas, 
the world's premier technical event for ICT security 
experts. Featuring 30 hands-on training courses and 
90 Briefings presentations with lots of new content 
and new tools. Network with 4,000 delegates from 
70 nations.   Visit product displays by 30 top
sponsors in a relaxed setting. Rates increase on 
June 1 so register today. http://www.blackhat.com



This archive was generated by hypermail 2.1.3 : Thu Jun 28 2007 - 22:27:28 PDT