======================================================================== The Secunia Weekly Advisory Summary 2007-07-05 - 2007-07-12 This week: 85 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ======================================================================== 2) This Week in Brief: This week was a veritable vulnerability festival, with quite a number of corporate applications reporting vulnerabilities, Microsoft Tuesday, taking place, and popular client software also releasing security updates. Five advisories for various SAP products were published this week, covering a variety of impacts, from system access to cross-site scripting . The affected products and accompanying advisories are: EnjoySAP Two ActiveX Controls Buffer Overflows http://secunia.com/advisories/25959/ SAP DB Web Server Buffer Overflow http://secunia.com/advisories/25954/ SAP Message Server "group" Buffer Overflow Vulnerability http://secunia.com/advisories/25966/ SAP Web Application Server Internet Communication Manager Denial of Service http://secunia.com/advisories/25964/ SAP Internet Graphics Service "PARAMS" Cross-Site Scripting http://secunia.com/advisories/25950/ -- Microsoft Tuesday yielded five Microsoft advisories, with several Microsoft Excel and Publisher vulnerabilities that can allow remote code execution. The releases also included an update for the Vista Firewall, and another for the .NET framework. The affected products and accompanying advisories are: Microsoft Excel Multiple Code Execution Vulnerabilities http://secunia.com/advisories/25995/ Microsoft Office Publisher Arbitrary Pointer Dereference Vulnerability http://secunia.com/advisories/25988/ Microsoft .NET Framework Multiple Vulnerabilities http://secunia.com/advisories/26003/ Microsoft Windows Active Directory Two Vulnerabilities http://secunia.com/advisories/26002/ Windows Vista Firewall Teredo Blocking Rule Security Bypass http://secunia.com/advisories/26001/ Secunia has constructed the Secunia Software Inspector, which you can use to check if your system is vulnerable: http://secunia.com/software_inspector/ -- Version 2.6.22 of the Linux Kernel was also released this week, solving several remote and local Denial of Service vulnerabilities. For more information, refer to: http://secunia.com/advisories/25955/ -- A highly critical buffer overflow vulnerability in Sun Java Web Start was disclosed this week, which may allow an attacker to compromise a vulnerable system. Sun has released a solution for this issue, which affects JRE and JDK 1.6 and 1.5. For more information, refer to: http://secunia.com/advisories/25981/ Secunia has constructed the Secunia Software Inspector, which you can use to check if your system is vulnerable: http://secunia.com/software_inspector/ -- Five advisories from various Symantec products were also published this week, including a highly critical one due to incorrect handling of CAB and RAR archive files. The affected products and accompanying advisories are: Symantec Products CAB and RAR Archive Handling Vulnerabilities http://secunia.com/advisories/26053/ Symantec Backup Exec RPC Interface Heap Overflow Vulnerability http://secunia.com/advisories/26032/ Symantec Products SYMTDI.SYS IOCTL Handler Privilege Escalation http://secunia.com/advisories/26042/ Symantec Products Real-Time Scanner Notification Window Privilege Escalation http://secunia.com/advisories/26054/ Symantec Products Internet Email Auto-Protect Stack Overflow http://secunia.com/advisories/26036/ -- Some eight vulnerabilities in Apple Quicktime were resolved this week as Apple released a security update for the media application. All vulnerabilities could be exploited by an attacker to execute arbitrary code on a user's system. For more information, refer to: http://secunia.com/advisories/26034/ Secunia has constructed the Secunia Software Inspector, which you can use to check if your system is vulnerable: http://secunia.com/software_inspector/ -- Adobe also released a security update for Flash this week, disclosing and resolving two vulnerabilities that could be used to execute arbitrary code, or to disclose key presses to a Flash applet. For more information, refer to: http://secunia.com/advisories/26027/ Secunia has constructed the Secunia Software Inspector, which you can use to check if your system is vulnerable: http://secunia.com/software_inspector/ -- A vulnerability in Firefox has been discovered that could allow malicious people to compromise a user's system. The vulnerability is due to Firefox registering the "firefoxurl://" URI handler, and can be exploited when a user visits a specially crafted website using Internet Explorer, which in turn invokes Firefox, triggering the vulnerability. Mozilla is reportedly working on a fix. In the meantime, users who have installed Firefox in Windows are advised to disable the "firefoxurl://" handler in the meantime. For more information, refer to: http://secunia.com/advisories/25984/ -- VIRUS ALERTS: During the past week Secunia collected 185 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA25984] Firefox "firefoxurl" URI Handler Registration Vulnerability 2. [SA25966] SAP Message Server "group" Buffer Overflow Vulnerability 3. [SA25897] Citrix Presentation Server Clients Content-Redirection Vulnerability 4. [SA25959] EnjoySAP Two ActiveX Controls Buffer Overflow Vulnerabilities 5. [SA25954] SAP DB Web Server Buffer Overflow Vulnerability 6. [SA25950] SAP Internet Graphics Service "PARAMS" Cross-Site Scripting 7. [SA25968] MDaemon Server DomainPOP malformed Messages Denial of Service 8. [SA25974] eMeeting Online Dating Software "id" Multiple SQL Injection 9. [SA25948] Levent Veysi Portal "id" SQL Injection 10. [SA25958] SUSE update for evolution and evolution-data-server ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA25995] Microsoft Excel Multiple Code Execution Vulnerabilities [SA25988] Microsoft Office Publisher Arbitrary Pointer Dereference Vulnerability [SA25984] Firefox "firefoxurl" URI Handler Registration Vulnerability [SA25959] EnjoySAP Two ActiveX Controls Buffer Overflow Vulnerabilities [SA26020] enVivo!CMS "ID" SQL Injection Vulnerability [SA26003] Microsoft .NET Framework Multiple Vulnerabilities [SA25994] QuarkXPress Word Document Text-Import Font Handling Buffer Overflow [SA25977] Visual IRC JOIN Command Response Processing Buffer Overflow [SA25968] MDaemon Server DomainPOP malformed Messages Denial of Service [SA25964] SAP Web Application Server Internet Communication Manager Denial of Service [SA26043] Cisco Unified Communications Manager Two Vulnerabilities [SA26032] Symantec Backup Exec RPC Interface Heap Overflow Vulnerability [SA26029] McAfee ePolicy Orchestrator / ProtectionPilot Common Management Agent Vulnerabilities [SA26002] Microsoft Windows Active Directory Two Vulnerabilities [SA25954] SAP DB Web Server Buffer Overflow Vulnerability [SA25962] Chilkat Zip ActiveX Component Zip2 ActiveX Control Two Insecure Methods [SA26054] Symantec Products Real-Time Scanner Notification Window Privilege Escalation [SA26042] Symantec Products SYMTDI.SYS IOCTL Handler Privilege Escalation [SA25998] AVG Antivirus AVG7CORE.SYS IOCTL Handler Privilege Escalation [SA25982] WinPcap NPF.SYS IOCTL Handler Privilege Escalation Vulnerability [SA26001] Windows Vista Firewall Teredo Blocking Rule Security Bypass [SA26036] Symantec Products Internet Email Auto-Protect Stack Overflow UNIX/Linux: [SA26057] Red Hat update for flash-plugin [SA26049] SUSE update for Java / IBM Java [SA26033] Novell Kerberos KDC Multiple Vulnerabilities [SA26022] Ubuntu update for openoffice.org [SA26010] Mandriva update for openoffice.org [SA26006] Gentoo XnView XPM File Handling Buffer Overflow [SA25992] Ubuntu update for imagemagick [SA25980] Debian update for vlc [SA25965] AsteriDex "callboth.php" CRLF Injection Vulnerability [SA26044] rPath update for gimp [SA26004] Mandriva update for wireshark [SA25987] rPath update for tshark and wireshark [SA25983] GameSiteScript "params" SQL Injection Vulnerability [SA25961] SUSE update for kernel [SA25955] Linux Kernel Multiple Denial of Service Vulnerabilities [SA25966] SAP Message Server "group" Buffer Overflow Vulnerability [SA26055] Red Hat update for perl-Net-DNS [SA25989] OpenBSD update for file [SA25958] SUSE update for evolution and evolution-data-server [SA25956] Gentoo update for webmin and usermin [SA25972] Hitachi TPBroker ADM Daemon Process Denial of Service [SA25970] IBM AIX libodm ODMPATH Processing Buffer Overflow Vulnerability [SA25967] Debian update for gfax [SA26037] Xfce Terminal "Open Link" Command Injection Security Issue [SA26056] Red Hat update for xorg-x11 [SA26024] Sun Solaris rcp Command Line Shell Command Injection [SA25963] Red Hat update for kernel Other: [SA26017] 3Com TippingPoint IPS Fragmented Packets Detection Bypass [SA26013] 3Com TippingPoint IPS Extended Unicode Detection Bypass [SA26059] Belkin Wireless G Plus Router DHCP Client Hostname Script Insertion Cross Platform: [SA26053] Symantec Products CAB and RAR Archive Handling Vulnerabilities [SA26035] SquirrelMail G/PGP Encryption Plugin Multiple Vulnerabilities [SA26034] Apple QuickTime Multiple Vulnerabilities [SA26027] Adobe Flash Player Multiple Vulnerabilities [SA26007] FlashBB "phpbb_root_path" File Inclusion Vulnerability [SA25981] Sun Java Web Start JNLP File Processing Buffer Overflow [SA26060] SurgeMail Payment Emails "amount" Format String Vulnerability [SA26038] ClamAV RAR Archive Processing Denial of Service Vulnerability [SA26031] Sun Java JRE/JDK Processing of XSLT Stylesheets in XML Signatures Vulnerability [SA26019] Webmatic Unspecified SQL Injection Vulnerability and Security Bypass [SA26016] Entertainment Media Sharing "adminLogged" Cookie Authentication Bypass [SA26015] Java Secure Socket Extension Denial of Service Vulnerability [SA26009] Mail Machine Local File Inclusion Vulnerability [SA26000] ImgSvr "template" Directory Traversal Vulnerability [SA25997] OpenLD "id" SQL Injection Vulnerability [SA25996] Aigaion "topic_id" SQL Injection Vulnerability [SA25991] CodeIgniter Weakness and Directory Traversal Vulnerability [SA25986] RPG Inferno "id" SQL Injection Vulnerability [SA25985] Unobtrusive AJAX Star Rating Bar Multiple Vulnerabilities [SA25976] phpTrafficA "isloggedin()" Authentication Bypass Vulnerability [SA25975] phpVID "cat" SQL Injection Vulnerability [SA25974] eMeeting Online Dating Software "id" Multiple SQL Injection [SA25969] AV Tutorial Script "id" and "userid" SQL Injection [SA25960] FlashGameScript "user" SQL Injection Vulnerability [SA26061] SurgeFTP Denial of Service and Script Insertion Vulnerability [SA26039] Cisco Unified Communications Manager and Presence Server Security Bypass [SA25999] Drupal Forward Module Access Restriction Bypass [SA25990] Firefox "wyciwyg://" Handler Vulnerability [SA25978] Drupal Print Module Access Restriction Bypass [SA25973] Hitachi JP1/HiCommand Series Two Vulnerabilities [SA25971] DotClear Cross-Site Request Forgery Vulnerability [SA26023] Sun Java System Web / Application Server XSLT Processing Vulnerability [SA26030] Sun Java System Access Manager "message" Debug Level Password Disclosure ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA25995] Microsoft Excel Multiple Code Execution Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-10 Some vulnerabilities have been reported in Microsoft Excel, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25995/ -- [SA25988] Microsoft Office Publisher Arbitrary Pointer Dereference Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-10 eEye Digital Security has reported a vulnerability in Microsoft Office Publisher 2007, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25988/ -- [SA25984] Firefox "firefoxurl" URI Handler Registration Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-10 A vulnerability has been discovered in Firefox, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25984/ -- [SA25959] EnjoySAP Two ActiveX Controls Buffer Overflow Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-06 Mark Litchfield has reported two vulnerabilities in EnjoySAP, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25959/ -- [SA26020] enVivo!CMS "ID" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-07-11 durito has reported a vulnerability in enVivo!CMS, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/26020/ -- [SA26003] Microsoft .NET Framework Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2007-07-10 Some vulnerabilities have been reported in Microsoft .NET Framework, which can be exploited by malicious people to disclose potentially sensitive information or compromise a user's system. Full Advisory: http://secunia.com/advisories/26003/ -- [SA25994] QuarkXPress Word Document Text-Import Font Handling Buffer Overflow Critical: Moderately critical Where: From remote Impact: System access Released: 2007-07-11 Tan Chew Keong has discovered a vulnerability in QuarkXPress, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25994/ -- [SA25977] Visual IRC JOIN Command Response Processing Buffer Overflow Critical: Moderately critical Where: From remote Impact: System access Released: 2007-07-09 Krystian Kloskowski has discovered a vulnerability in Visual IRC, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25977/ -- [SA25968] MDaemon Server DomainPOP malformed Messages Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-07-06 A vulnerability has been reported in MDaemon, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25968/ -- [SA25964] SAP Web Application Server Internet Communication Manager Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-07-06 Mark Litchfield has reported a vulnerability in SAP Web Application Server, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25964/ -- [SA26043] Cisco Unified Communications Manager Two Vulnerabilities Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2007-07-12 Some vulnerabilities have been reported in Cisco Unified Communications Manager (CUCM), which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26043/ -- [SA26032] Symantec Backup Exec RPC Interface Heap Overflow Vulnerability Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2007-07-11 A vulnerability has been reported in Symantec Backup Exec, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26032/ -- [SA26029] McAfee ePolicy Orchestrator / ProtectionPilot Common Management Agent Vulnerabilities Critical: Moderately critical Where: From local network Impact: System access Released: 2007-07-11 Neel Mehta has reported some vulnerabilities in McAfee ePolicy Orchestrator and ProtectionPilot, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26029/ -- [SA26002] Microsoft Windows Active Directory Two Vulnerabilities Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2007-07-10 Two vulnerabilities have been reported in Windows Active Directory, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26002/ -- [SA25954] SAP DB Web Server Buffer Overflow Vulnerability Critical: Moderately critical Where: From local network Impact: System access Released: 2007-07-06 Mark Litchfield has reported a vulnerability in SAP DB, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25954/ -- [SA25962] Chilkat Zip ActiveX Component Zip2 ActiveX Control Two Insecure Methods Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2007-07-09 shinnai has discovered two vulnerabilities in Chilkat Zip ActiveX Component, which can be exploited by malicious people to overwrite arbitrary files. Full Advisory: http://secunia.com/advisories/25962/ -- [SA26054] Symantec Products Real-Time Scanner Notification Window Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-07-12 A vulnerability has been reported in some Symantec products, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/26054/ -- [SA26042] Symantec Products SYMTDI.SYS IOCTL Handler Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-07-12 A vulnerability has been reported in various Symantec products, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/26042/ -- [SA25998] AVG Antivirus AVG7CORE.SYS IOCTL Handler Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-07-12 Jonathan Lindsay has reported a vulnerability in AVG Antivirus, which potentially can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/25998/ -- [SA25982] WinPcap NPF.SYS IOCTL Handler Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-07-10 A vulnerability has been reported in WinPcap, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/25982/ -- [SA26001] Windows Vista Firewall Teredo Blocking Rule Security Bypass Critical: Not critical Where: From remote Impact: Security Bypass Released: 2007-07-10 A security issue has been reported in Windows Vista, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/26001/ -- [SA26036] Symantec Products Internet Email Auto-Protect Stack Overflow Critical: Not critical Where: Local system Impact: DoS Released: 2007-07-12 A vulnerability has been reported in some Symantec products, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26036/ UNIX/Linux:-- [SA26057] Red Hat update for flash-plugin Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-12 Red Hat has issued an update for flash-plugin. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26057/ -- [SA26049] SUSE update for Java / IBM Java Critical: Highly critical Where: From remote Impact: Privilege escalation, DoS, System access Released: 2007-07-12 SUSE has issued an update for Java and IBM Java. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26049/ -- [SA26033] Novell Kerberos KDC Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-07-12 Novell has acknowledged some vulnerabilities in Novell Kerberos KDC, which can be exploited by malicious users and malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26033/ -- [SA26022] Ubuntu update for openoffice.org Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-11 Ubuntu has issued an update for openoffice.org and openoffice.org-amd64. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26022/ -- [SA26010] Mandriva update for openoffice.org Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-11 Mandriva has issued an update for openoffice.org. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26010/ -- [SA26006] Gentoo XnView XPM File Handling Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-12 Gentoo has acknowledged a vulnerability in XnView, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26006/ -- [SA25992] Ubuntu update for imagemagick Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-10 Ubuntu has issued an update for imagemagick. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25992/ -- [SA25980] Debian update for vlc Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-10 Debian has issued an update for vlc. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25980/ -- [SA25965] AsteriDex "callboth.php" CRLF Injection Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-06 Carl Livitt has reported a vulnerability in AsteriDex, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25965/ -- [SA26044] rPath update for gimp Critical: Moderately critical Where: From remote Impact: System access Released: 2007-07-12 rPath has issued an update for gimp. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26044/ -- [SA26004] Mandriva update for wireshark Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-07-11 Mandriva has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26004/ -- [SA25987] rPath update for tshark and wireshark Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-07-11 rPath has issued an update for tshark and wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25987/ -- [SA25983] GameSiteScript "params" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-07-09 Xenduer77 has reported a vulnerability in GameSiteScript, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25983/ -- [SA25961] SUSE update for kernel Critical: Moderately critical Where: From remote Impact: Security Bypass, Brute force, DoS Released: 2007-07-09 SUSE has issued an update for the kernel. This fixes some vulnerabilities and a weakness, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or malicious people to cause a DoS and bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/25961/ -- [SA25955] Linux Kernel Multiple Denial of Service Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-07-09 Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25955/ -- [SA25966] SAP Message Server "group" Buffer Overflow Vulnerability Critical: Moderately critical Where: From local network Impact: System access Released: 2007-07-06 Mark Litchfield has reported a vulnerability in SAP Message Server, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25966/ -- [SA26055] Red Hat update for perl-Net-DNS Critical: Less critical Where: From remote Impact: Spoofing, DoS Released: 2007-07-12 Red Hat has issued an update for perl-Net-DNS. This can be exploited to poison the DNS cache or to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26055/ -- [SA25989] OpenBSD update for file Critical: Less critical Where: From remote Impact: System access, DoS Released: 2007-07-10 OpenBSD has issued an update for file. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/25989/ -- [SA25958] SUSE update for evolution and evolution-data-server Critical: Less critical Where: From remote Impact: DoS, System access Released: 2007-07-06 SUSE has issued an update for evolution and evolution-data-server. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25958/ -- [SA25956] Gentoo update for webmin and usermin Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-07-06 Gentoo has issued an update for webmin and usermin. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25956/ -- [SA25972] Hitachi TPBroker ADM Daemon Process Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2007-07-06 A vulnerability has been reported in Hitachi TPBroker, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25972/ -- [SA25970] IBM AIX libodm ODMPATH Processing Buffer Overflow Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-07-10 A vulnerability has been reported in IBM AIX, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/25970/ -- [SA25967] Debian update for gfax Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-07-06 Debian has issued an update for gfax. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/25967/ -- [SA26037] Xfce Terminal "Open Link" Command Injection Security Issue Critical: Not critical Where: From remote Impact: Security Bypass Released: 2007-07-12 Lasse Krkkinen has reported a security issue in Xfce Terminal, which can be exploited by malicious people to inject shell commands. Full Advisory: http://secunia.com/advisories/26037/ -- [SA26056] Red Hat update for xorg-x11 Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2007-07-12 Red Hat has issued an update for xorg-x11 and xorg-x11-xfs. This fixes a vulnerability, which can be exploited by malicious, local users to perform actions with escalated privileges. Full Advisory: http://secunia.com/advisories/26056/ -- [SA26024] Sun Solaris rcp Command Line Shell Command Injection Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2007-07-11 A weakness has been reported in Sun Solaris, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/26024/ -- [SA25963] Red Hat update for kernel Critical: Not critical Where: Local system Impact: DoS Released: 2007-07-10 Red Hat has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/25963/ Other:-- [SA26017] 3Com TippingPoint IPS Fragmented Packets Detection Bypass Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-07-11 A vulnerability has been reported in TippingPoint IPS, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/26017/ -- [SA26013] 3Com TippingPoint IPS Extended Unicode Detection Bypass Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-07-11 A vulnerability has been reported in TippingPoint IPS, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/26013/ -- [SA26059] Belkin Wireless G Plus Router DHCP Client Hostname Script Insertion Critical: Not critical Where: From local network Impact: Cross Site Scripting Released: 2007-07-12 Nico Leidecker has reported a vulnerability in the Belkin Wireless G Plus Router, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/26059/ Cross Platform:-- [SA26053] Symantec Products CAB and RAR Archive Handling Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-07-12 Two vulnerabilities have been reported in various Symantec products, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26053/ -- [SA26035] SquirrelMail G/PGP Encryption Plugin Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2007-07-12 iDefense has reported some vulnerabilities in the SquirrelMail G/PGP Encryption Plugin, which can be exploited by malicious users and malicious people to disclose sensitive information or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26035/ -- [SA26034] Apple QuickTime Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Exposure of sensitive information, DoS, System access Released: 2007-07-12 Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26034/ -- [SA26027] Adobe Flash Player Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Exposure of sensitive information, System access Released: 2007-07-11 Some vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to gain knowledge of sensitive information or compromise a user's system. Full Advisory: http://secunia.com/advisories/26027/ -- [SA26007] FlashBB "phpbb_root_path" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-12 kw3rln has reported a vulnerability in FlashBB, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26007/ -- [SA25981] Sun Java Web Start JNLP File Processing Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-10 A vulnerability has been reported in Sun Java Web Start, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/25981/ -- [SA26060] SurgeMail Payment Emails "amount" Format String Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2007-07-12 Nico Leidecker has reported a vulnerability in SurgeMail, which can be exploited by malicious users to potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26060/ -- [SA26038] ClamAV RAR Archive Processing Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-07-12 Metaeye SG has reported a vulnerability in ClamAV, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26038/ -- [SA26031] Sun Java JRE/JDK Processing of XSLT Stylesheets in XML Signatures Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2007-07-11 Brad Hill has reported a vulnerability in Sun JDK and JRE, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26031/ -- [SA26019] Webmatic Unspecified SQL Injection Vulnerability and Security Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data Released: 2007-07-12 A vulnerability and a security issue have been reported in Webmatic, which can be exploited by malicious users to bypass certain security restrictions or by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/26019/ -- [SA26016] Entertainment Media Sharing "adminLogged" Cookie Authentication Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2007-07-11 Kw3rLn has reported a vulnerability in Entertainment Media Sharing, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/26016/ -- [SA26015] Java Secure Socket Extension Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-07-11 A vulnerability has been reported in the Java Secure Socket Extension (JSSE), which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26015/ -- [SA26009] Mail Machine Local File Inclusion Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2007-07-12 H4 has discovered a vulnerability in Mail Machine, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/26009/ -- [SA26000] ImgSvr "template" Directory Traversal Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-07-12 Tim Brown has discovered a vulnerability in ImgSvr, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/26000/ -- [SA25997] OpenLD "id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-07-10 Cody "CypherXero" Rester has discovered a vulnerability in OpenLD, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25997/ -- [SA25996] Aigaion "topic_id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-07-10 Cody "CypherXero" Rester has discovered a vulnerability in Aigaion, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25996/ -- [SA25991] CodeIgniter Weakness and Directory Traversal Vulnerability Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Exposure of system information, Exposure of sensitive information Released: 2007-07-11 Lukasz Pilorz has reported a vulnerability and a weakness in CodeIgniter, which can be exploited by malicious people to disclose sensitive information and conduct cross-site scripting and header injection attacks. Full Advisory: http://secunia.com/advisories/25991/ -- [SA25986] RPG Inferno "id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-07-10 t0pP8uZz and xprog have reported a vulnerability in RPG Inferno, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25986/ -- [SA25985] Unobtrusive AJAX Star Rating Bar Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Manipulation of data Released: 2007-07-10 sullo has reported some vulnerabilities in Unobtrusive Ajax Star Rating Bar, which can be exploited by malicious people to bypass certain security restrictions or conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/25985/ -- [SA25976] phpTrafficA "isloggedin()" Authentication Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2007-07-09 CorryL has discovered a vulnerability in phpTrafficA, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/25976/ -- [SA25975] phpVID "cat" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-07-09 t0pP8uZz and xprog have reported a vulnerability in phpVID, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25975/ -- [SA25974] eMeeting Online Dating Software "id" Multiple SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-07-06 Some vulnerabilities have been reported in eMeeting Online Dating Software, which can be exploited by malicious users and malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25974/ -- [SA25969] AV Tutorial Script "id" and "userid" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-07-09 A vulnerability has been discovered in AV Tutorial Script, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25969/ -- [SA25960] FlashGameScript "user" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-07-09 Xenduer77 has reported a vulnerability in FlashGameScript, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/25960/ -- [SA26061] SurgeFTP Denial of Service and Script Insertion Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting, DoS Released: 2007-07-12 Nico Leidecker has reported some vulnerabilities in SurgeFTP, which can be exploited by malicious people to conduct script insertion attacks and cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26061/ -- [SA26039] Cisco Unified Communications Manager and Presence Server Security Bypass Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-07-12 Two vulnerabilities have been reported in Cisco Unified Communications Manager (CUCM, formerly CallManager) and Cisco Unified Presence Server (CUPS), which can be exploited by malicious users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/26039/ -- [SA25999] Drupal Forward Module Access Restriction Bypass Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-07-11 A security issue has been discovered in the Drupal Forward Module, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/25999/ -- [SA25990] Firefox "wyciwyg://" Handler Vulnerability Critical: Less critical Where: From remote Impact: Spoofing, Exposure of sensitive information Released: 2007-07-10 Michal Zalewski has discovered a vulnerability in Mozilla Firefox, which can be exploited by malicious people to disclose sensitive information and conduct spoofing attacks. Full Advisory: http://secunia.com/advisories/25990/ -- [SA25978] Drupal Print Module Access Restriction Bypass Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-07-11 A security issue has been discovered in the Drupal Print Module, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/25978/ -- [SA25973] Hitachi JP1/HiCommand Series Two Vulnerabilities Critical: Less critical Where: From remote Impact: Security Bypass, Cross Site Scripting Released: 2007-07-06 Two vulnerabilities have been reported in Hitachi JP1/HiCommand products, which can be exploited by malicious people to potentially bypass certain security restrictions or to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/25973/ -- [SA25971] DotClear Cross-Site Request Forgery Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-07-10 PsychoGun has reported a vulnerability in DotClear, which can be exploited by malicious people to conduct cross-site request forgery attacks. Full Advisory: http://secunia.com/advisories/25971/ -- [SA26023] Sun Java System Web / Application Server XSLT Processing Vulnerability Critical: Less critical Where: Local system Impact: Security Bypass, Privilege escalation Released: 2007-07-11 A vulnerability has been reported in Sun Java System Web Server and Application Server, which can be exploited by malicious, local users to perform actions with escalated privileges. Full Advisory: http://secunia.com/advisories/26023/ -- [SA26030] Sun Java System Access Manager "message" Debug Level Password Disclosure Critical: Not critical Where: Local system Impact: Exposure of sensitive information Released: 2007-07-11 Sun has acknowledged a security issue in Sun Java System Access Manager, which can be exploited by malicious, local users to gain sensitive information. Full Advisory: http://secunia.com/advisories/26030/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _____________________________________________________ Attend Black Hat USA, July 28-August 2 in Las Vegas, the world's premier technical event for ICT security experts. Featuring 30 hands-on training courses and 90 Briefings presentations with lots of new content and new tools. Network with 4,000 delegates from 70 nations. Visit product displays by 30 top sponsors in a relaxed setting. Rates increase on June 1 so register today. http://www.blackhat.com
This archive was generated by hypermail 2.1.3 : Fri Jul 13 2007 - 00:14:52 PDT