[ISN] Secunia Weekly Summary - Issue: 2007-29

From: InfoSec News (alerts@private)
Date: Fri Jul 20 2007 - 01:07:01 PDT


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2007-07-12 - 2007-07-19                        

                       This week: 61 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.

The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.

========================================================================
2) This Week in Brief:

Mozilla released a major update this week, fixing multiple
vulnerabilities including the highly contested "firefoxurl://"
handler issue.

The vulnerabilities can be exploited to perform cross-site scripting
attacks, spoofing attacks, browser crashes, and remote code execution.

Users are advised to update to version 2.0.0.5 as soon as possible, as
most of the vulnerabilities can be leveraged by an attacker to gain
system access.

For more information, refer to:
http://secunia.com/advisories/26095/
http://secunia.com/advisories/25984/

Secunia has constructed the Secunia Software Inspector, which you can
use to check if your system is vulnerable:
http://secunia.com/software_inspector/

 --

Some vulnerabilities in URI handler in Trillian were also reported
this week, concerning the "aim://" handler, which Trillian
registers as its own when it is installed in a system.

One of the problems is that the "aim://" URI handler does not
verify certain parts of the "aim://" URI before writing it into a
file specified via the unverified "ini=" parameter. By tricking a
user into following a specially crafted "aim://" URI, then an
attacker can, for example, write a batch file into the Windows
"Startup" folder that starts an attacker-defined application.

The other is that a boundary error within the processing of
"aim://" URIs in the aim.dll plugin. This can be exploited to cause
a buffer overflow by e.g. tricking a user into following a specially
crafted "aim://" URI.

The vulnerabilities remain unpatched. Users are thus advised to
disable the "aim://" handler by editing the registry, or simply by
avoiding browsing untrusted sites.

For more information, refer to:
http://secunia.com/advisories/26086/

 --

Oracle released their big patch for the summer, fixing multiple
vulnerabilities, most with unknown impacts. The vulnerabilities for
which details have been released include some that can be used by an
attacker to bypass security, manipulate data, cause a service to
crash, or possibly execute arbitrary code. Details are known for the
following issues:

The Oracle APEX does not correctly sanitise input passed via the
password used in the wwv_flow_security.check_db_password function
before using it in SQL queries. This can be exploited to modify SQL
queries by injecting arbitrary SQL code.

Specially crafted views can be exploited to perform updates, deletes
and inserts without having proper privileges.

Certain input processed by the DBMS_PRVTAQIS package is not correctly
sanitised before being used in SQL queries. This can be exploited to
modify SQL queries by injecting arbitrary SQL code.

Errors within various public procedures exist in the MDSYS.MD
package. These can be exploited to cause buffer overflows, resulting
in a DoS or potentially the execution of arbitrary code.

An error exists within the "GET_PROPERTY" function in the
SYS.DBMS_DRS package. This can be exploited to cause a buffer
overflow, resulting in a DoS or potentially the execution of
arbitrary code.

Users are advised to upgrade their systems as soon as possible. For
more information, including a list of affected products, refer to:
http://secunia.com/advisories/26114/

 --

VIRUS ALERTS:

During the past week Secunia collected 178 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA25984] Firefox "firefoxurl" URI Handler Registration
              Vulnerability
2.  [SA26027] Adobe Flash Player Multiple Vulnerabilities
3.  [SA26053] Symantec Products CAB and RAR Archive Handling
              Vulnerabilities
4.  [SA26069] Internet Explorer "document.open()" Method Spoofing
              Vulnerability
5.  [SA26074] Opera "data:" URI Scheme Address Bar Spoofing
              Vulnerability
6.  [SA26095] Mozilla Firefox Multiple Vulnerabilities
7.  [SA26067] RSA Products Progress Server Buffer Overflow
              Vulnerability
8.  [SA26047] IAIK XSECT Processing of XSLT Stylesheets in XML
              Signatures Vulnerability
9.  [SA26063] activeWeb contentserver Multiple Vulnerabilities
10. [SA26058] Progress Server Buffer Overflow Vulnerability

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA26131] Microsoft DirectX RLE Compressed Targa Image Processing
Buffer Overflow
[SA26123] Ipswitch IMail Server/Collaboration Suite Multiple Buffer
Overflows
[SA26086] Trillian "aim://" URI Handler Two Vulnerabilities
[SA26082] Netscape "navigatorurl" URI Handler Registration
Vulnerability
[SA26089] husrevforum Multiple Vulnerabilities
[SA26079] ASP Ziyaretci Defteri "mesaj_formu.asp" Script Insertion
[SA26070] MzK Blog "katID" SQL Injection Vulnerability
[SA26066] Yahoo! Messenger Long Email Address Book Buffer Overflow
[SA26088] CA Products Alert Notification Server Multiple Buffer
Overflows
[SA26098] Data Dynamics ActiveBar ActiveX Control Multiple Insecure
Methods
[SA26094] QuickerSite "svalue" Cross-Site Scripting Vulnerability
[SA26080] Element CMS "s" Cross-Site Scripting
[SA26069] Internet Explorer "document.open()" Method Spoofing
Vulnerability
[SA26064] Kaspersky Anti-Virus for Check Point FireWall-1 Unspecified
Vulnerability
[SA26063] activeWeb contentserver Multiple Vulnerabilities

UNIX/Linux:
[SA26135] tcpdump print-bgp.c Buffer Overflow Vulnerability
[SA26119] SUSE update for IBM JRE/SDK Java and Sun Java JRE/SDK
[SA26118] SUSE update for flash-player
[SA26107] Red Hat update for seamonkey
[SA26103] Red Hat update for firefox
[SA26102] Ubuntu update for php
[SA26099] Asterisk Multiple Vulnerabilities
[SA26133] Ubuntu update for kernel
[SA26132] Debian update for gimp
[SA26129] Debian update for freetype
[SA26121] LedgerSMB "redirect" Authentication Bypass
[SA26062] FreeBSD update for libarchive
[SA26128] Debian update for libcurl3-gnutls
[SA26108] Ubuntu update for curl
[SA26091] Konqueror "data:" URI Scheme Address Bar Spoofing
[SA26090] WebCit Multiple Vulnerabilities
[SA26075] rPath update for perl-Net-DNS
[SA26071] Jasmine CMS "profile_email" Script Insertion
[SA26092] Samsung SCX-4200 Driver Installation Script Privilege
Escalation
[SA26073] rPath update for mysql, mysql-bench, and mysql-server
[SA26081] rPath update for xorg-x11

Other:
[SA26122] Cisco Wide Area Application Services Edge Services SYN Flood
Denial of Service

Cross Platform:
[SA26138] Opera BitTorrent Header Parsing Vulnerability
[SA26127] phpBB SupaNav Module "phpbb_root_path" File Inclusion
[SA26114] Oracle Products Multiple Vulnerabilities
[SA26106] Red Hat update for thunderbird
[SA26096] Mozilla Thunderbird Two Vulnerabilities
[SA26095] Mozilla Firefox Multiple Vulnerabilities
[SA26113] MAXdev MD-Pro "topicid" SQL Injection
[SA26110] eVisit Analyst "id" SQL Injection Vulnerabilities
[SA26105] Insanely Simple Blog Multiple Vulnerabilities
[SA26097] QuickEStore "CFTOKEN" SQL Injection Vulnerability
[SA26084] Ubuntu update for mod_perl
[SA26078] paFileDB "categories[]" SQL Injection Vulnerability
[SA26068] Realtor 747 "categoryid" SQL Injection Vulnerability
[SA26067] RSA Products Progress Server Buffer Overflow Vulnerability
[SA26116] WordPress Blixed Theme "s" Cross-Site Scripting
[SA26115] WordPress BlixKrieg Theme "s" Cross-Site Scripting
[SA26109] WordPress Blix Theme "s" Cross-Site Scripting
[SA26104] cURL/libcURL GnuTLS Security Issue
[SA26077] Zoph "_order" SQL Injection Vulnerability
[SA26074] Opera "data:" URI Scheme Address Bar Spoofing Vulnerability
[SA26065] SiteScape Forum Cross-Site Scripting Vulnerability
[SA26093] IBM Tivoli Provisioning Manager for OS Deployment TFTP Read
Request Denial of Service
[SA26085] PHP "glob()" Code Execution Vulnerability

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA26131] Microsoft DirectX RLE Compressed Targa Image Processing
Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-19

A vulnerability has been reported in Microsoft DirectX, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26131/

 --

[SA26123] Ipswitch IMail Server/Collaboration Suite Multiple Buffer
Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-19

Some vulnerabilities have been reported in Ipswitch IMail Server and
Collaboration Suite, which can be exploited by malicious users and
malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26123/

 --

[SA26086] Trillian "aim://" URI Handler Two Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-17

Two vulnerabilities have been discovered in Trillian, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26086/

 --

[SA26082] Netscape "navigatorurl" URI Handler Registration
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-18

A vulnerability has been discovered in Netscape, which can be exploited
by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26082/

 --

[SA26089] husrevforum Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2007-07-17

GeFORC3 has reported some vulnerabilities in husrevforum, which can be
exploited by malicious people to conduct SQL injection or cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/26089/

 --

[SA26079] ASP Ziyaretci Defteri "mesaj_formu.asp" Script Insertion

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-17

GeFORC3 has reported a vulnerability in ASP Ziyaretci Defteri, which
can be exploited by malicious people to conduct script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/26079/

 --

[SA26070] MzK Blog "katID" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-07-16

GeFORC3 has reported a vulnerability in MzK Blog, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/26070/

 --

[SA26066] Yahoo! Messenger Long Email Address Book Buffer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-07-19

Rajesh Sethumadhavan has reported a vulnerability in Yahoo! Messenger,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/26066/

 --

[SA26088] CA Products Alert Notification Server Multiple Buffer
Overflows

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-07-18

Some vulnerabilities have been reported in various CA products, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/26088/

 --

[SA26098] Data Dynamics ActiveBar ActiveX Control Multiple Insecure
Methods

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-18

shinnai has discovered some vulnerabilities in Data Dynamics ActiveBar,
which can be exploited by malicious people to overwrite arbitrary
files.

Full Advisory:
http://secunia.com/advisories/26098/

 --

[SA26094] QuickerSite "svalue" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-18

GeFORC3 has reported a vulnerability in QuickerSite, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/26094/

 --

[SA26080] Element CMS "s" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-18

Edi Strosar has reported a vulnerability in Element CMS, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/26080/

 --

[SA26069] Internet Explorer "document.open()" Method Spoofing
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Spoofing
Released:    2007-07-16

Michal Zalewski has discovered a vulnerability in Internet Explorer,
which can be exploited by a malicious website to spoof the address
bar.

Full Advisory:
http://secunia.com/advisories/26069/

 --

[SA26064] Kaspersky Anti-Virus for Check Point FireWall-1 Unspecified
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-07-17

A potential vulnerability has been reported in Kaspersky Anti-Virus for
Check Point FireWall-1, which may be exploited to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/26064/

 --

[SA26063] activeWeb contentserver Multiple Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Manipulation of
data, Exposure of sensitive information
Released:    2007-07-13

RedTeam Pentesting has reported some vulnerabilities in activeWeb
contentserver, which can be exploited by malicious users to disclose
potentially sensitive information, bypass certain security
restrictions, or conduct SQL injection and script insertion attacks,
and by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/26063/


UNIX/Linux:--

[SA26135] tcpdump print-bgp.c Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-19

mu-b has reported a vulnerability in tcpdump, which potentially can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26135/

 --

[SA26119] SUSE update for IBM JRE/SDK Java and Sun Java JRE/SDK

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Privilege escalation, DoS, System access
Released:    2007-07-19

SUSE has issued an update for IBM Java JRE/SDK and Sun Java JRE/SDK.
This fixes some vulnerabilities, which can be exploited by malicious
people to bypass certain security restrictions, gain escalated
privileges, cause a DoS (Denial of Service) and potentially compromise
a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26119/

 --

[SA26118] SUSE update for flash-player

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2007-07-19

SUSE has issued an update for flash-player. This fixes some
vulnerabilities, which can be exploited by malicious people to gain
knowledge of sensitive information or compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26118/

 --

[SA26107] Red Hat update for seamonkey

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Spoofing, Exposure of sensitive
information, DoS, System access
Released:    2007-07-19

Red Hat has issued an update for seamonkey. This fixes some
vulnerabilities, which can be exploited by malicious people to disclose
potentially sensitive information, conduct spoofing and cross-site
scripting attacks, and potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26107/

 --

[SA26103] Red Hat update for firefox

Critical:    Highly critical
Where:       From remote
Impact:      Spoofing, Exposure of sensitive information, DoS, System
access, Cross Site Scripting
Released:    2007-07-19

Red Hat has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to disclose
potentially sensitive information, conduct spoofing and cross-site
scripting attacks, and potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26103/

 --

[SA26102] Ubuntu update for php

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Brute force, System access
Released:    2007-07-18

Ubuntu has issued an update for php. This fixes a vulnerability and a
weakness, which can be exploited by malicious people to bypass certain
security restrictions or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26102/

 --

[SA26099] Asterisk Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-07-18

Some vulnerabilities have been reported in Asterisk, which can be
exploited by malicious people to cause a DoS (Denial of Service) and
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26099/

 --

[SA26133] Ubuntu update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, Privilege escalation,
DoS
Released:    2007-07-19

Ubuntu has issued an update for the kernel. This fixes some weaknesses,
security issues, and vulnerabilities, which can be exploited by
malicious, local users to cause a DoS (Denial of Service), gain
knowledge of potentially sensitive information, and gain escalated
privileges, or by malicious people to cause a DoS.

Full Advisory:
http://secunia.com/advisories/26133/

 --

[SA26132] Debian update for gimp

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-07-19

Debian has issued an update for gimp. This fixes some vulnerabilities,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/26132/

 --

[SA26129] Debian update for freetype

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-07-19

Debian has issued an update for freetype. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/26129/

 --

[SA26121] LedgerSMB "redirect" Authentication Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-07-19

A vulnerability has been reported in LedgerSMB, which can be exploited
by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/26121/

 --

[SA26062] FreeBSD update for libarchive

Critical:    Moderately critical
Where:       From remote
Impact:      System access, DoS
Released:    2007-07-13

FreeBSD has issued an update for libarchive. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise an application using
the library.

Full Advisory:
http://secunia.com/advisories/26062/

 --

[SA26128] Debian update for libcurl3-gnutls

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-07-19

Debian has issued an update for libcurl3-gnutls. This fixes a security
issue, which can be exploited by malicious people to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/26128/

 --

[SA26108] Ubuntu update for curl

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-07-18

Ubuntu has issued an update for curl. This fixes a security issue,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/26108/

 --

[SA26091] Konqueror "data:" URI Scheme Address Bar Spoofing

Critical:    Less critical
Where:       From remote
Impact:      Spoofing
Released:    2007-07-16

Robert Swiecki has reported a vulnerability in Konqueror, which can be
exploited by malicious people to conduct spoofing attacks.

Full Advisory:
http://secunia.com/advisories/26091/

 --

[SA26090] WebCit Multiple Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-16

Christopher Schwardt has reported multiple vulnerabilities in WebCit,
which can be exploited by malicious users to conduct script insertion
attacks and by malicious people to conduct cross-site request forgery
and cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/26090/

 --

[SA26075] rPath update for perl-Net-DNS

Critical:    Less critical
Where:       From remote
Impact:      Spoofing, DoS
Released:    2007-07-17

rPath has issued an update for perl-Net-DNS. This fixes a
vulnerability, which can be exploited to poison the DNS cache or to
cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/26075/

 --

[SA26071] Jasmine CMS "profile_email" Script Insertion

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-17

m4t4d00r has discovered a vulnerability in Jasmine CMS, which can be
exploited by malicious users to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/26071/

 --

[SA26092] Samsung SCX-4200 Driver Installation Script Privilege
Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-19

hdiamant has discovered a security issue in the Samsung SCX-4200
Driver, which can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/26092/

 --

[SA26073] rPath update for mysql, mysql-bench, and mysql-server

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass, Privilege escalation, DoS
Released:    2007-07-18

rPath has issued an update of mysql, mysql-bench, and mysql-server.
This fixes a vulnerability and various security issues, which can be
exploited by malicious users to gain escalated privileges, bypass
certain security restrictions and cause a DoS (Denial of Service) or
malicious people to cause a DoS.

Full Advisory:
http://secunia.com/advisories/26073/

 --

[SA26081] rPath update for xorg-x11

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-17

rPath has issued an update for xorg-x11. This fixes a vulnerability,
which can be exploited by malicious, local users to perform actions
with escalated privileges.

Full Advisory:
http://secunia.com/advisories/26081/


Other:--

[SA26122] Cisco Wide Area Application Services Edge Services SYN Flood
Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-07-19

A vulnerability has been reported in Cisco Wide Area Application
Services (WAAS), which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/26122/


Cross Platform:--

[SA26138] Opera BitTorrent Header Parsing Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-19

A vulnerability has been reported in Opera, which can be exploited by
malicious people to compromise a user's system

Full Advisory:
http://secunia.com/advisories/26138/

 --

[SA26127] phpBB SupaNav Module "phpbb_root_path" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-07-19

bd0rk has discovered a vulnerability in the SupaNav module for phpBB,
which can be exploited by malicious people to disclose sensitive
information or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26127/

 --

[SA26114] Oracle Products Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Unknown, Security Bypass, Manipulation of data, DoS,
System access
Released:    2007-07-18

Multiple vulnerabilities have been reported for various Oracle
products. Some of these have unknown impacts, while others can be
exploited to bypass certain security restrictions and conduct SQL
injection attacks, cause a DoS (Denial of Service), and potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26114/

 --

[SA26106] Red Hat update for thunderbird

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-07-19

Red Hat has issued an update for thunderbird. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26106/

 --

[SA26096] Mozilla Thunderbird Two Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-07-18

Some vulnerabilities have been reported in Mozilla Thunderbird, which
can potentially be exploited to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26096/

 --

[SA26095] Mozilla Firefox Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Spoofing, DoS, System access
Released:    2007-07-18

Some vulnerabilities have been reported in Mozilla Firefox, which can
be exploited by malicious people to conduct spoofing and cross-site
scripting attacks and potentially to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26095/

 --

[SA26113] MAXdev MD-Pro "topicid" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-07-19

A vulnerability has been discovered in MAXdev MD-Pro, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/26113/

 --

[SA26110] eVisit Analyst "id" SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-19

Tim Brown has reported some vulnerabilities in eVisit Analyst, which
can be exploited by malicious people conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/26110/

 --

[SA26105] Insanely Simple Blog Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2007-07-18

joseph.giron13 has discovered some vulnerabilities in Insanely Simple
Blog, which can be exploited by malicious people to conduct cross-site
scripting attacks, script insertion attacks, and SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/26105/

 --

[SA26097] QuickEStore "CFTOKEN" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-07-18

meoconx has reported a vulnerability in QuickEStore, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/26097/

 --

[SA26084] Ubuntu update for mod_perl

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-07-18

Ubuntu has issued an update for mod_perl. This fixes a vulnerability,
which potentially can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/26084/

 --

[SA26078] paFileDB "categories[]" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-07-16

h4si & pUm have discovered a vulnerability in paFileDB, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/26078/

 --

[SA26068] Realtor 747 "categoryid" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-16

t0pP8uZz and xprog have discovered a vulnerability in Realtor 747,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/26068/

 --

[SA26067] RSA Products Progress Server Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-07-13

RSA has acknowledged a vulnerability in some products, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26067/

 --

[SA26116] WordPress Blixed Theme "s" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-18

phoenix has discovered a vulnerability in the Blixed theme for
WordPress, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/26116/

 --

[SA26115] WordPress BlixKrieg Theme "s" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-18

phoenix has discovered a vulnerability in the BlixKrieg theme for
WordPress, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/26115/

 --

[SA26109] WordPress Blix Theme "s" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-18

phoenix has discovered a vulnerability in the Blix theme for WordPress,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/26109/

 --

[SA26104] cURL/libcURL GnuTLS Security Issue

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-07-18

A security issue has been reported in cURL/libcURL, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/26104/

 --

[SA26077] Zoph "_order" SQL Injection Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-17

A vulnerability has been reported in Zoph, which can be exploited by
malicious users to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/26077/

 --

[SA26074] Opera "data:" URI Scheme Address Bar Spoofing Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Spoofing
Released:    2007-07-16

Robert Swiecki has discovered a vulnerability in Opera, which can be
exploited by malicious people to conduct spoofing attacks.

Full Advisory:
http://secunia.com/advisories/26074/

 --

[SA26065] SiteScape Forum Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-13

Marc Ruef has reported a vulnerability in SiteScape Forum, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/26065/

 --

[SA26093] IBM Tivoli Provisioning Manager for OS Deployment TFTP Read
Request Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-07-18

A vulnerability has been reported in IBM Tivoli Provisioning Manager
for OS Deployment, which can be exploited by malicious people to cause
a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/26093/

 --

[SA26085] PHP "glob()" Code Execution Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2007-07-16

shinnai has discovered a vulnerability in PHP, which can be exploited
by malicious, local users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/26085/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_____________________________________________________
Attend Black Hat USA, July 28-August 2 in Las Vegas, 
the world's premier technical event for ICT security 
experts. Featuring 30 hands-on training courses and 
90 Briefings presentations with lots of new content 
and new tools. Network with 4,000 delegates from 
70 nations.   Visit product displays by 30 top
sponsors in a relaxed setting. Rates increase on 
June 1 so register today. http://www.blackhat.com



This archive was generated by hypermail 2.1.3 : Fri Jul 20 2007 - 01:15:56 PDT