======================================================================== The Secunia Weekly Advisory Summary 2007-07-12 - 2007-07-19 This week: 61 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ======================================================================== 2) This Week in Brief: Mozilla released a major update this week, fixing multiple vulnerabilities including the highly contested "firefoxurl://" handler issue. The vulnerabilities can be exploited to perform cross-site scripting attacks, spoofing attacks, browser crashes, and remote code execution. Users are advised to update to version 2.0.0.5 as soon as possible, as most of the vulnerabilities can be leveraged by an attacker to gain system access. For more information, refer to: http://secunia.com/advisories/26095/ http://secunia.com/advisories/25984/ Secunia has constructed the Secunia Software Inspector, which you can use to check if your system is vulnerable: http://secunia.com/software_inspector/ -- Some vulnerabilities in URI handler in Trillian were also reported this week, concerning the "aim://" handler, which Trillian registers as its own when it is installed in a system. One of the problems is that the "aim://" URI handler does not verify certain parts of the "aim://" URI before writing it into a file specified via the unverified "ini=" parameter. By tricking a user into following a specially crafted "aim://" URI, then an attacker can, for example, write a batch file into the Windows "Startup" folder that starts an attacker-defined application. The other is that a boundary error within the processing of "aim://" URIs in the aim.dll plugin. This can be exploited to cause a buffer overflow by e.g. tricking a user into following a specially crafted "aim://" URI. The vulnerabilities remain unpatched. Users are thus advised to disable the "aim://" handler by editing the registry, or simply by avoiding browsing untrusted sites. For more information, refer to: http://secunia.com/advisories/26086/ -- Oracle released their big patch for the summer, fixing multiple vulnerabilities, most with unknown impacts. The vulnerabilities for which details have been released include some that can be used by an attacker to bypass security, manipulate data, cause a service to crash, or possibly execute arbitrary code. Details are known for the following issues: The Oracle APEX does not correctly sanitise input passed via the password used in the wwv_flow_security.check_db_password function before using it in SQL queries. This can be exploited to modify SQL queries by injecting arbitrary SQL code. Specially crafted views can be exploited to perform updates, deletes and inserts without having proper privileges. Certain input processed by the DBMS_PRVTAQIS package is not correctly sanitised before being used in SQL queries. This can be exploited to modify SQL queries by injecting arbitrary SQL code. Errors within various public procedures exist in the MDSYS.MD package. These can be exploited to cause buffer overflows, resulting in a DoS or potentially the execution of arbitrary code. An error exists within the "GET_PROPERTY" function in the SYS.DBMS_DRS package. This can be exploited to cause a buffer overflow, resulting in a DoS or potentially the execution of arbitrary code. Users are advised to upgrade their systems as soon as possible. For more information, including a list of affected products, refer to: http://secunia.com/advisories/26114/ -- VIRUS ALERTS: During the past week Secunia collected 178 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA25984] Firefox "firefoxurl" URI Handler Registration Vulnerability 2. [SA26027] Adobe Flash Player Multiple Vulnerabilities 3. [SA26053] Symantec Products CAB and RAR Archive Handling Vulnerabilities 4. [SA26069] Internet Explorer "document.open()" Method Spoofing Vulnerability 5. [SA26074] Opera "data:" URI Scheme Address Bar Spoofing Vulnerability 6. [SA26095] Mozilla Firefox Multiple Vulnerabilities 7. [SA26067] RSA Products Progress Server Buffer Overflow Vulnerability 8. [SA26047] IAIK XSECT Processing of XSLT Stylesheets in XML Signatures Vulnerability 9. [SA26063] activeWeb contentserver Multiple Vulnerabilities 10. [SA26058] Progress Server Buffer Overflow Vulnerability ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA26131] Microsoft DirectX RLE Compressed Targa Image Processing Buffer Overflow [SA26123] Ipswitch IMail Server/Collaboration Suite Multiple Buffer Overflows [SA26086] Trillian "aim://" URI Handler Two Vulnerabilities [SA26082] Netscape "navigatorurl" URI Handler Registration Vulnerability [SA26089] husrevforum Multiple Vulnerabilities [SA26079] ASP Ziyaretci Defteri "mesaj_formu.asp" Script Insertion [SA26070] MzK Blog "katID" SQL Injection Vulnerability [SA26066] Yahoo! Messenger Long Email Address Book Buffer Overflow [SA26088] CA Products Alert Notification Server Multiple Buffer Overflows [SA26098] Data Dynamics ActiveBar ActiveX Control Multiple Insecure Methods [SA26094] QuickerSite "svalue" Cross-Site Scripting Vulnerability [SA26080] Element CMS "s" Cross-Site Scripting [SA26069] Internet Explorer "document.open()" Method Spoofing Vulnerability [SA26064] Kaspersky Anti-Virus for Check Point FireWall-1 Unspecified Vulnerability [SA26063] activeWeb contentserver Multiple Vulnerabilities UNIX/Linux: [SA26135] tcpdump print-bgp.c Buffer Overflow Vulnerability [SA26119] SUSE update for IBM JRE/SDK Java and Sun Java JRE/SDK [SA26118] SUSE update for flash-player [SA26107] Red Hat update for seamonkey [SA26103] Red Hat update for firefox [SA26102] Ubuntu update for php [SA26099] Asterisk Multiple Vulnerabilities [SA26133] Ubuntu update for kernel [SA26132] Debian update for gimp [SA26129] Debian update for freetype [SA26121] LedgerSMB "redirect" Authentication Bypass [SA26062] FreeBSD update for libarchive [SA26128] Debian update for libcurl3-gnutls [SA26108] Ubuntu update for curl [SA26091] Konqueror "data:" URI Scheme Address Bar Spoofing [SA26090] WebCit Multiple Vulnerabilities [SA26075] rPath update for perl-Net-DNS [SA26071] Jasmine CMS "profile_email" Script Insertion [SA26092] Samsung SCX-4200 Driver Installation Script Privilege Escalation [SA26073] rPath update for mysql, mysql-bench, and mysql-server [SA26081] rPath update for xorg-x11 Other: [SA26122] Cisco Wide Area Application Services Edge Services SYN Flood Denial of Service Cross Platform: [SA26138] Opera BitTorrent Header Parsing Vulnerability [SA26127] phpBB SupaNav Module "phpbb_root_path" File Inclusion [SA26114] Oracle Products Multiple Vulnerabilities [SA26106] Red Hat update for thunderbird [SA26096] Mozilla Thunderbird Two Vulnerabilities [SA26095] Mozilla Firefox Multiple Vulnerabilities [SA26113] MAXdev MD-Pro "topicid" SQL Injection [SA26110] eVisit Analyst "id" SQL Injection Vulnerabilities [SA26105] Insanely Simple Blog Multiple Vulnerabilities [SA26097] QuickEStore "CFTOKEN" SQL Injection Vulnerability [SA26084] Ubuntu update for mod_perl [SA26078] paFileDB "categories[]" SQL Injection Vulnerability [SA26068] Realtor 747 "categoryid" SQL Injection Vulnerability [SA26067] RSA Products Progress Server Buffer Overflow Vulnerability [SA26116] WordPress Blixed Theme "s" Cross-Site Scripting [SA26115] WordPress BlixKrieg Theme "s" Cross-Site Scripting [SA26109] WordPress Blix Theme "s" Cross-Site Scripting [SA26104] cURL/libcURL GnuTLS Security Issue [SA26077] Zoph "_order" SQL Injection Vulnerability [SA26074] Opera "data:" URI Scheme Address Bar Spoofing Vulnerability [SA26065] SiteScape Forum Cross-Site Scripting Vulnerability [SA26093] IBM Tivoli Provisioning Manager for OS Deployment TFTP Read Request Denial of Service [SA26085] PHP "glob()" Code Execution Vulnerability ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA26131] Microsoft DirectX RLE Compressed Targa Image Processing Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-19 A vulnerability has been reported in Microsoft DirectX, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26131/ -- [SA26123] Ipswitch IMail Server/Collaboration Suite Multiple Buffer Overflows Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-19 Some vulnerabilities have been reported in Ipswitch IMail Server and Collaboration Suite, which can be exploited by malicious users and malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26123/ -- [SA26086] Trillian "aim://" URI Handler Two Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-17 Two vulnerabilities have been discovered in Trillian, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26086/ -- [SA26082] Netscape "navigatorurl" URI Handler Registration Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-18 A vulnerability has been discovered in Netscape, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26082/ -- [SA26089] husrevforum Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2007-07-17 GeFORC3 has reported some vulnerabilities in husrevforum, which can be exploited by malicious people to conduct SQL injection or cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26089/ -- [SA26079] ASP Ziyaretci Defteri "mesaj_formu.asp" Script Insertion Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2007-07-17 GeFORC3 has reported a vulnerability in ASP Ziyaretci Defteri, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/26079/ -- [SA26070] MzK Blog "katID" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-07-16 GeFORC3 has reported a vulnerability in MzK Blog, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/26070/ -- [SA26066] Yahoo! Messenger Long Email Address Book Buffer Overflow Critical: Moderately critical Where: From remote Impact: System access Released: 2007-07-19 Rajesh Sethumadhavan has reported a vulnerability in Yahoo! Messenger, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26066/ -- [SA26088] CA Products Alert Notification Server Multiple Buffer Overflows Critical: Moderately critical Where: From local network Impact: System access Released: 2007-07-18 Some vulnerabilities have been reported in various CA products, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26088/ -- [SA26098] Data Dynamics ActiveBar ActiveX Control Multiple Insecure Methods Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2007-07-18 shinnai has discovered some vulnerabilities in Data Dynamics ActiveBar, which can be exploited by malicious people to overwrite arbitrary files. Full Advisory: http://secunia.com/advisories/26098/ -- [SA26094] QuickerSite "svalue" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-07-18 GeFORC3 has reported a vulnerability in QuickerSite, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26094/ -- [SA26080] Element CMS "s" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-07-18 Edi Strosar has reported a vulnerability in Element CMS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26080/ -- [SA26069] Internet Explorer "document.open()" Method Spoofing Vulnerability Critical: Less critical Where: From remote Impact: Spoofing Released: 2007-07-16 Michal Zalewski has discovered a vulnerability in Internet Explorer, which can be exploited by a malicious website to spoof the address bar. Full Advisory: http://secunia.com/advisories/26069/ -- [SA26064] Kaspersky Anti-Virus for Check Point FireWall-1 Unspecified Vulnerability Critical: Less critical Where: From remote Impact: DoS Released: 2007-07-17 A potential vulnerability has been reported in Kaspersky Anti-Virus for Check Point FireWall-1, which may be exploited to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26064/ -- [SA26063] activeWeb contentserver Multiple Vulnerabilities Critical: Less critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Manipulation of data, Exposure of sensitive information Released: 2007-07-13 RedTeam Pentesting has reported some vulnerabilities in activeWeb contentserver, which can be exploited by malicious users to disclose potentially sensitive information, bypass certain security restrictions, or conduct SQL injection and script insertion attacks, and by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26063/ UNIX/Linux:-- [SA26135] tcpdump print-bgp.c Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-19 mu-b has reported a vulnerability in tcpdump, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26135/ -- [SA26119] SUSE update for IBM JRE/SDK Java and Sun Java JRE/SDK Critical: Highly critical Where: From remote Impact: Security Bypass, Privilege escalation, DoS, System access Released: 2007-07-19 SUSE has issued an update for IBM Java JRE/SDK and Sun Java JRE/SDK. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, gain escalated privileges, cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26119/ -- [SA26118] SUSE update for flash-player Critical: Highly critical Where: From remote Impact: Exposure of sensitive information, System access Released: 2007-07-19 SUSE has issued an update for flash-player. This fixes some vulnerabilities, which can be exploited by malicious people to gain knowledge of sensitive information or compromise a user's system. Full Advisory: http://secunia.com/advisories/26118/ -- [SA26107] Red Hat update for seamonkey Critical: Highly critical Where: From remote Impact: Cross Site Scripting, Spoofing, Exposure of sensitive information, DoS, System access Released: 2007-07-19 Red Hat has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing and cross-site scripting attacks, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/26107/ -- [SA26103] Red Hat update for firefox Critical: Highly critical Where: From remote Impact: Spoofing, Exposure of sensitive information, DoS, System access, Cross Site Scripting Released: 2007-07-19 Red Hat has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing and cross-site scripting attacks, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/26103/ -- [SA26102] Ubuntu update for php Critical: Highly critical Where: From remote Impact: Security Bypass, Brute force, System access Released: 2007-07-18 Ubuntu has issued an update for php. This fixes a vulnerability and a weakness, which can be exploited by malicious people to bypass certain security restrictions or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26102/ -- [SA26099] Asterisk Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-07-18 Some vulnerabilities have been reported in Asterisk, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26099/ -- [SA26133] Ubuntu update for kernel Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information, Privilege escalation, DoS Released: 2007-07-19 Ubuntu has issued an update for the kernel. This fixes some weaknesses, security issues, and vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), gain knowledge of potentially sensitive information, and gain escalated privileges, or by malicious people to cause a DoS. Full Advisory: http://secunia.com/advisories/26133/ -- [SA26132] Debian update for gimp Critical: Moderately critical Where: From remote Impact: System access Released: 2007-07-19 Debian has issued an update for gimp. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26132/ -- [SA26129] Debian update for freetype Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-07-19 Debian has issued an update for freetype. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/26129/ -- [SA26121] LedgerSMB "redirect" Authentication Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2007-07-19 A vulnerability has been reported in LedgerSMB, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/26121/ -- [SA26062] FreeBSD update for libarchive Critical: Moderately critical Where: From remote Impact: System access, DoS Released: 2007-07-13 FreeBSD has issued an update for libarchive. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/26062/ -- [SA26128] Debian update for libcurl3-gnutls Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-07-19 Debian has issued an update for libcurl3-gnutls. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/26128/ -- [SA26108] Ubuntu update for curl Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-07-18 Ubuntu has issued an update for curl. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/26108/ -- [SA26091] Konqueror "data:" URI Scheme Address Bar Spoofing Critical: Less critical Where: From remote Impact: Spoofing Released: 2007-07-16 Robert Swiecki has reported a vulnerability in Konqueror, which can be exploited by malicious people to conduct spoofing attacks. Full Advisory: http://secunia.com/advisories/26091/ -- [SA26090] WebCit Multiple Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-07-16 Christopher Schwardt has reported multiple vulnerabilities in WebCit, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site request forgery and cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26090/ -- [SA26075] rPath update for perl-Net-DNS Critical: Less critical Where: From remote Impact: Spoofing, DoS Released: 2007-07-17 rPath has issued an update for perl-Net-DNS. This fixes a vulnerability, which can be exploited to poison the DNS cache or to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26075/ -- [SA26071] Jasmine CMS "profile_email" Script Insertion Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-07-17 m4t4d00r has discovered a vulnerability in Jasmine CMS, which can be exploited by malicious users to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/26071/ -- [SA26092] Samsung SCX-4200 Driver Installation Script Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-07-19 hdiamant has discovered a security issue in the Samsung SCX-4200 Driver, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/26092/ -- [SA26073] rPath update for mysql, mysql-bench, and mysql-server Critical: Less critical Where: Local system Impact: Security Bypass, Privilege escalation, DoS Released: 2007-07-18 rPath has issued an update of mysql, mysql-bench, and mysql-server. This fixes a vulnerability and various security issues, which can be exploited by malicious users to gain escalated privileges, bypass certain security restrictions and cause a DoS (Denial of Service) or malicious people to cause a DoS. Full Advisory: http://secunia.com/advisories/26073/ -- [SA26081] rPath update for xorg-x11 Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2007-07-17 rPath has issued an update for xorg-x11. This fixes a vulnerability, which can be exploited by malicious, local users to perform actions with escalated privileges. Full Advisory: http://secunia.com/advisories/26081/ Other:-- [SA26122] Cisco Wide Area Application Services Edge Services SYN Flood Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2007-07-19 A vulnerability has been reported in Cisco Wide Area Application Services (WAAS), which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26122/ Cross Platform:-- [SA26138] Opera BitTorrent Header Parsing Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-19 A vulnerability has been reported in Opera, which can be exploited by malicious people to compromise a user's system Full Advisory: http://secunia.com/advisories/26138/ -- [SA26127] phpBB SupaNav Module "phpbb_root_path" File Inclusion Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2007-07-19 bd0rk has discovered a vulnerability in the SupaNav module for phpBB, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26127/ -- [SA26114] Oracle Products Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Unknown, Security Bypass, Manipulation of data, DoS, System access Released: 2007-07-18 Multiple vulnerabilities have been reported for various Oracle products. Some of these have unknown impacts, while others can be exploited to bypass certain security restrictions and conduct SQL injection attacks, cause a DoS (Denial of Service), and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26114/ -- [SA26106] Red Hat update for thunderbird Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-07-19 Red Hat has issued an update for thunderbird. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26106/ -- [SA26096] Mozilla Thunderbird Two Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-07-18 Some vulnerabilities have been reported in Mozilla Thunderbird, which can potentially be exploited to compromise a user's system. Full Advisory: http://secunia.com/advisories/26096/ -- [SA26095] Mozilla Firefox Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Cross Site Scripting, Spoofing, DoS, System access Released: 2007-07-18 Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/26095/ -- [SA26113] MAXdev MD-Pro "topicid" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-07-19 A vulnerability has been discovered in MAXdev MD-Pro, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/26113/ -- [SA26110] eVisit Analyst "id" SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-07-19 Tim Brown has reported some vulnerabilities in eVisit Analyst, which can be exploited by malicious people conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/26110/ -- [SA26105] Insanely Simple Blog Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2007-07-18 joseph.giron13 has discovered some vulnerabilities in Insanely Simple Blog, which can be exploited by malicious people to conduct cross-site scripting attacks, script insertion attacks, and SQL injection attacks. Full Advisory: http://secunia.com/advisories/26105/ -- [SA26097] QuickEStore "CFTOKEN" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-07-18 meoconx has reported a vulnerability in QuickEStore, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/26097/ -- [SA26084] Ubuntu update for mod_perl Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-07-18 Ubuntu has issued an update for mod_perl. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26084/ -- [SA26078] paFileDB "categories[]" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-07-16 h4si & pUm have discovered a vulnerability in paFileDB, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/26078/ -- [SA26068] Realtor 747 "categoryid" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-07-16 t0pP8uZz and xprog have discovered a vulnerability in Realtor 747, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/26068/ -- [SA26067] RSA Products Progress Server Buffer Overflow Vulnerability Critical: Moderately critical Where: From local network Impact: System access Released: 2007-07-13 RSA has acknowledged a vulnerability in some products, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26067/ -- [SA26116] WordPress Blixed Theme "s" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-07-18 phoenix has discovered a vulnerability in the Blixed theme for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26116/ -- [SA26115] WordPress BlixKrieg Theme "s" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-07-18 phoenix has discovered a vulnerability in the BlixKrieg theme for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26115/ -- [SA26109] WordPress Blix Theme "s" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-07-18 phoenix has discovered a vulnerability in the Blix theme for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26109/ -- [SA26104] cURL/libcURL GnuTLS Security Issue Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-07-18 A security issue has been reported in cURL/libcURL, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/26104/ -- [SA26077] Zoph "_order" SQL Injection Vulnerability Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2007-07-17 A vulnerability has been reported in Zoph, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/26077/ -- [SA26074] Opera "data:" URI Scheme Address Bar Spoofing Vulnerability Critical: Less critical Where: From remote Impact: Spoofing Released: 2007-07-16 Robert Swiecki has discovered a vulnerability in Opera, which can be exploited by malicious people to conduct spoofing attacks. Full Advisory: http://secunia.com/advisories/26074/ -- [SA26065] SiteScape Forum Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-07-13 Marc Ruef has reported a vulnerability in SiteScape Forum, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26065/ -- [SA26093] IBM Tivoli Provisioning Manager for OS Deployment TFTP Read Request Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2007-07-18 A vulnerability has been reported in IBM Tivoli Provisioning Manager for OS Deployment, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26093/ -- [SA26085] PHP "glob()" Code Execution Vulnerability Critical: Less critical Where: Local system Impact: Security Bypass Released: 2007-07-16 shinnai has discovered a vulnerability in PHP, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/26085/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _____________________________________________________ Attend Black Hat USA, July 28-August 2 in Las Vegas, the world's premier technical event for ICT security experts. Featuring 30 hands-on training courses and 90 Briefings presentations with lots of new content and new tools. Network with 4,000 delegates from 70 nations. Visit product displays by 30 top sponsors in a relaxed setting. Rates increase on June 1 so register today. http://www.blackhat.com
This archive was generated by hypermail 2.1.3 : Fri Jul 20 2007 - 01:15:56 PDT