======================================================================== The Secunia Weekly Advisory Summary 2007-07-19 - 2007-07-26 This week: 75 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ======================================================================== 2) This Week in Brief: A vulnerability in the LinkedIn Toolbar for Internet Explorer was discovered this week, which could be used by a malicious person to compromise a user's system. LinkedIn, the popular business-oriented social networking site, is often used by prospective employers to assess the work experience and industry networks of applicants. Successful exploitation requires that the user be tricked into visiting a malicious website. The vulnerability is due to an error within the ActiveX control when handling the "Search()" method. Since working exploit code is publicly available, Secunia has tagged this vulnerability as "Extremely critical". LinkedIn has yet to issue a patch to the vulnerability. In the meantime, users are urged to set the kill-bit for the affected ActiveX control. For more information, please refer to: http://secunia.com/advisories/26181/ -- Two vulnerabilities in several Panda products were reported this week. The first, a buffer overflow caused by a boundary error in the parsing of .EXE files, could be exploited by a malicious person to compromise a vulnerable system. It can be exploited to cause the buffer overflow by scanning a specially crafted .EXE file. This vulnerability is reported in Panda Antivirus products, including the Panda Antivirus Enterprise Suite. For more information on this vulnerability, please refer to: http://secunia.com/advisories/26171/ The second vulnerability is reported in Panda AdminSecure, and is caused by an integer overflow in the Panda AdminSecure agent. This can be exploited to cause a heap-based buffer overflow via a specially crafted packet sent to default port 19226/TCP or 19227/TCP. For more information on this vulnerability, please refer to: http://secunia.com/advisories/26157/ Patches are available for both vulnerabilities. Users are advised to update as soon as possible. -- Several vulnerabilities in various CA products were also reported this week. The first vulnerability is a buffer overflow in the CA Message Queuing Server when processing packets. This can be exploited by a malicious person to cause a stack-based buffer overflow by sending a specially crafted packet to default port 3104/TCP. Successful exploitation allows the attacker to gain access to the vulnerable system. For more information, and a complete list of the affected software, please refer to: http://secunia.com/advisories/26190/ Denial of service vulnerabilities were also reported in a variety of CA products due to the way that they process CHM and RAR files. An input validation error when processing CHM files can be exploited to cause an infinite loop, while an unspecified error when processing a specially crafted RAR file can be exploited to cause the program to hang. For more information, and a complete list of the affected software, please refer to: http://secunia.com/advisories/26155/ And finally, a vulnerable ActiveX control with several insecure methods may allow loading arbitrary DLL files, and calling the exported functions with controlled parameters. Successful exploitation requires that a user is tricked into visiting a malicious website. The vulnerabilities are in an ActiveX control included in the eTrust Instrusion Detection 3.x product. For more information, please refer to: http://secunia.com/advisories/26134/ All vulnerabilities are currently patched. Users are advised to update their software as soon as possible. -- VIRUS ALERTS: During the past week Secunia collected 174 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA26176] Mozilla SeaMonkey Multiple Vulnerabilities 2. [SA26197] Windows RSH daemon Packet Processing Buffer Overflow Vulnerability 3. [SA26137] McAfee VirusScan Command Line for Linux ZIP Decompression Vulnerability 4. [SA26210] Avaya CMS / IR Solaris rcp Command Line Shell Command Injection 5. [SA26134] CA eTrust Intrusion Detection CallCode ActiveX Control Insecure Methods 6. [SA26187] Sun Java System Application Server JSP Source Code Disclosure 7. [SA26155] CA Products CHM and RAR File Processing Denial of Service Vulnerabilities 8. [SA26190] CA Message Queuing Server Buffer Overflow Vulnerability 9. [SA26161] Cisco Multiple Products Wireless ARP Requests Denial of Service 10. [SA26199] Novell GroupWise Mobile Server Multiple Vulnerabilities ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA26181] LinkedIn Internet Explorer Toolbar IEContextMenu ActiveX Control Code Execution [SA26213] Clever Internet ActiveX Suite clWebDav ActiveX Control Insecure Method [SA26201] Microsoft Windows URI Handling Command Execution Vulnerability [SA26178] Norman Antivirus Products Multiple File Parsing Vulnerabilities [SA26199] Novell GroupWise Mobile Server Multiple Vulnerabilities [SA26187] Sun Java System Application Server JSP Source Code Disclosure [SA26173] Dora Emlak Script Multiple Vulnerabilities [SA26172] WebSpell "site" File Inclusion Vulnerability [SA26169] ImageRacer "SearchWord" SQL Injection [SA26167] SecurityReporter "name" Directory Traversal [SA26154] Ipswitch Instant Messaging Server Denial of Service [SA26153] Property Pro "vir_login.asp" SQL Injection Vulnerabilities [SA26222] BakBone NetVault Report Manager Buffer Overflow Vulnerabilities [SA26190] CA Message Queuing Server Buffer Overflow Vulnerability [SA26189] Borland InterBase "create" Request Buffer Overflow Vulnerability [SA26157] Panda AdminSecure Agent Buffer Overflow Vulnerability [SA26182] W1L3D4 Philboard "searchterms" Cross-Site Scripting [SA26174] Asp cvmatik Cross-Site Scripting Vulnerability [SA26141] TeamSpeak Denial of Service Vulnerability [SA26197] Windows RSH daemon Packet Processing Buffer Overflow Vulnerability UNIX/Linux: [SA26228] Gentoo update for mit-krb5 [SA26223] Mandriva update for tcpdump [SA26216] SUSE update for MozillaFirefox [SA26211] SGI Advanced Linux Environment Multiple Updates [SA26205] Slackware update for seamonkey [SA26204] Slackware update for thunderbird [SA26179] rPath update for firefox and thunderbird [SA26177] Mandriva update for ImageMagick [SA26168] rPath update for tcpdump [SA26166] HP Oracle for OpenView Multiple Vulnerabilities [SA26159] Debian update for iceape [SA26151] Debian update for iceweasel [SA26149] Slackware update for firefox [SA26227] Mandriva update for bind [SA26221] Cisco Products Java Secure Socket Extension SSL/TLS Request Denial of Service [SA26209] Kolab Server ClamAV RAR Archive Processing Denial of Service Vulnerability [SA26207] Gentoo update for mplayer [SA26195] Red Hat update for bind [SA26184] fsplib Multiple Vulnerabilities [SA26164] Debian update for clamav [SA26160] Sun Solaris BIND Predictable DNS Query IDs Vulnerability [SA26158] rPath update for lighttpd [SA26148] Ubuntu update for bind [SA26147] RSBAC User Management Authentication Bypass Vulnerability [SA26203] Avaya Products file "file_printf()" Integer Underflow Vulnerability [SA26229] Gentoo festival Privilege Escalation [SA26220] Sun Solaris lbxproxy Privilege Escalation Vulnerability [SA26208] NVClock "set_default_speeds()" Insecure Temporary Files [SA26200] Gentoo update for nvclock [SA26210] Avaya CMS / IR Solaris rcp Command Line Shell Command Injection Other: [SA26161] Cisco Multiple Products Wireless ARP Requests Denial of Service [SA26192] Aruba Mobility Controller Cross-Site Scripting Cross Platform: [SA26176] Mozilla SeaMonkey Multiple Vulnerabilities [SA26175] epesi framework Gallery File Upload Vulnerability [SA26171] Panda Antivirus EXE File Parsing Buffer Overflow Vulnerability [SA26143] Citrix Access Gateway Multiple Vulnerabilities [SA26215] Gentoo update for gimp [SA26194] Entertainment Media Sharing "pagename" Local File Inclusion [SA26185] Kerio MailServer Attachment Filter Unspecified Vulnerability [SA26183] IBM WebSphere Application Server Unspecified Vulnerability [SA26170] BlogSite Professional "news_id" SQL Injection [SA26165] JBlog Security Bypass and Cross-Site Scripting [SA26156] phpMyForum editpost.php SQL Injection [SA26155] CA Products CHM and RAR File Processing Denial of Service Vulnerabilities [SA26152] BIND Predictable DNS Query IDs Vulnerability [SA26146] Itaka "/screenshot" URL Security Bypass [SA26206] FORMfields AdMan login.php Cross-Site Scripting [SA26196] Vikingboard Two Vulnerabilities and Debug Information Weakness [SA26186] iFoto "dir" Directory Traversal [SA26150] DokuWiki "spell_utf8test()" Cross-Site Scripting [SA26144] dirLIST "folder" Directory Traversal and Security Bypass [SA26142] VHCS Session Fixation Vulnerability [SA26140] Tor Multiple Weaknesses and Vulnerability ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA26181] LinkedIn Internet Explorer Toolbar IEContextMenu ActiveX Control Code Execution Critical: Extremely critical Where: From remote Impact: System access Released: 2007-07-24 Jared DeMott and Justin Seitz have discovered a vulnerability in LinkedIn Internet Explorer Toolbar, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26181/ -- [SA26213] Clever Internet ActiveX Suite clWebDav ActiveX Control Insecure Method Critical: Highly critical Where: From remote Impact: Manipulation of data, System access Released: 2007-07-26 shinnai has discovered a vulnerability in Clever Internet ActiveX Suite, which can be exploited by malicious people to overwrite arbitrary files or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26213/ -- [SA26201] Microsoft Windows URI Handling Command Execution Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-26 A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26201/ -- [SA26178] Norman Antivirus Products Multiple File Parsing Vulnerabilities Critical: Highly critical Where: From remote Impact: Security Bypass, DoS, System access Released: 2007-07-24 Sergio Alvarez has reported some vulnerabilities in Norman Antivirus products, which can be exploited by malware to bypass certain scanning functionality and by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26178/ -- [SA26199] Novell GroupWise Mobile Server Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Exposure of system information, Exposure of sensitive information, DoS Released: 2007-07-25 Novell has acknowledged some vulnerabilities in Novell GroupWise Mobile Server, which can be exploited by malicious people to gain knowledge of sensitive information, conduct cross-site scripting attacks, manipulate certain data, or cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26199/ -- [SA26187] Sun Java System Application Server JSP Source Code Disclosure Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2007-07-25 A vulnerability has been reported in Sun Java System Application Server, which can be exploited by malicious people to disclose certain sensitive information. Full Advisory: http://secunia.com/advisories/26187/ -- [SA26173] Dora Emlak Script Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2007-07-23 GeFORC3 has discovered some vulnerabilities in Dora Emlak Script, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/26173/ -- [SA26172] WebSpell "site" File Inclusion Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-07-24 A vulnerability has been discovered in WebSpell, which can be exploited by malicious people to potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26172/ -- [SA26169] ImageRacer "SearchWord" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-07-24 Aria-Security Team have reported a vulnerability in ImageRacer, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/26169/ -- [SA26167] SecurityReporter "name" Directory Traversal Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-07-24 Oliver Karow has reported a vulnerability in SecurityReporter, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/26167/ -- [SA26154] Ipswitch Instant Messaging Server Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-07-24 A vulnerability has been reported in Ipswitch Instant Messaging Server, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26154/ -- [SA26153] Property Pro "vir_login.asp" SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-07-23 The-0utl4w has reported some vulnerabilities in Property Pro, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/26153/ -- [SA26222] BakBone NetVault Report Manager Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2007-07-26 Two vulnerabilities have been reported in BakBone NetVault Report Manager, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26222/ -- [SA26190] CA Message Queuing Server Buffer Overflow Vulnerability Critical: Moderately critical Where: From local network Impact: System access Released: 2007-07-25 IBM ISS X-Force has reported a vulnerability in CA Message Queuing (CAM/CAFT), which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26190/ -- [SA26189] Borland InterBase "create" Request Buffer Overflow Vulnerability Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2007-07-25 TippingPoint has reported a vulnerability in Borland InterBase, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26189/ -- [SA26157] Panda AdminSecure Agent Buffer Overflow Vulnerability Critical: Moderately critical Where: From local network Impact: System access Released: 2007-07-25 A vulnerability has been reported in Panda AdminSecure, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26157/ -- [SA26182] W1L3D4 Philboard "searchterms" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-07-25 GeFORC3 has reported a vulnerability in W1L3D4 Philboard, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26182/ -- [SA26174] Asp cvmatik Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-07-23 GeFORC3 has discovered a vulnerability in Asp cvmatik, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26174/ -- [SA26141] TeamSpeak Denial of Service Vulnerability Critical: Less critical Where: From remote Impact: DoS Released: 2007-07-24 Yag Kohha has reported a vulnerability in TeamSpeak, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26141/ -- [SA26197] Windows RSH daemon Packet Processing Buffer Overflow Vulnerability Critical: Less critical Where: From local network Impact: System access Released: 2007-07-25 Joey Mengele has discovered a vulnerability in Windows RSH daemon, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26197/ UNIX/Linux:-- [SA26228] Gentoo update for mit-krb5 Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-07-26 Gentoo has issued an update for mit-krb5. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26228/ -- [SA26223] Mandriva update for tcpdump Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-26 Mandriva has issued an update for tcpdump. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26223/ -- [SA26216] SUSE update for MozillaFirefox Critical: Highly critical Where: From remote Impact: Cross Site Scripting, Spoofing, Exposure of sensitive information, DoS, System access Released: 2007-07-26 SUSE has issued an update for MozillaFirefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks, disclose sensitive information and compromise a user's system. Full Advisory: http://secunia.com/advisories/26216/ -- [SA26211] SGI Advanced Linux Environment Multiple Updates Critical: Highly critical Where: From remote Impact: Cross Site Scripting, Spoofing, Exposure of sensitive information, DoS, System access Released: 2007-07-25 SGI has issued multiple updates for SGI Advanced Linux Environment. These fix some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), and by malicious people to disclose potentially sensitive information, conduct spoofing and cross-site scripting attack, cause a DoS, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/26211/ -- [SA26205] Slackware update for seamonkey Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-07-25 Slackware has issued an update for seamonkey. This fixes some vulnerabilities, which can potentially be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26205/ -- [SA26204] Slackware update for thunderbird Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-07-25 Slackware has issued an update for thunderbird. This fixes some vulnerabilities, which can potentially be exploited to compromise a user's system. Full Advisory: http://secunia.com/advisories/26204/ -- [SA26179] rPath update for firefox and thunderbird Critical: Highly critical Where: From remote Impact: Cross Site Scripting, Spoofing, Exposure of sensitive information, DoS, System access Released: 2007-07-23 rPath has issued an update for firefox and thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting and spoofing attacks, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/26179/ -- [SA26177] Mandriva update for ImageMagick Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-07-23 Mandriva has issued an update for ImageMagick. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26177/ -- [SA26168] rPath update for tcpdump Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-23 rPath has issued an update for tcpdump. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26168/ -- [SA26166] HP Oracle for OpenView Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Unknown, Security Bypass, Manipulation of data, DoS, System access Released: 2007-07-24 HP has acknowledged some vulnerabilities in HP OfO (Oracle for Openview). Some of these have unknown impacts, while others can be exploited to bypass certain security restrictions and conduct SQL injection attacks, cause a DoS (Denial of Service), and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26166/ -- [SA26159] Debian update for iceape Critical: Highly critical Where: From remote Impact: Cross Site Scripting, Spoofing, Exposure of sensitive information, DoS, System access Released: 2007-07-24 Debian has issued an update for iceape. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing and cross-site scripting attacks, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/26159/ -- [SA26151] Debian update for iceweasel Critical: Highly critical Where: From remote Impact: Cross Site Scripting, Spoofing, Exposure of sensitive information, DoS, System access Released: 2007-07-24 Debian has issued an update for iceweasel. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing and cross-site scripting attacks, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/26151/ -- [SA26149] Slackware update for firefox Critical: Highly critical Where: From remote Impact: Cross Site Scripting, Spoofing, Exposure of sensitive information, DoS, System access Released: 2007-07-20 Slackware has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks, disclose sensitive information, and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/26149/ -- [SA26227] Mandriva update for bind Critical: Moderately critical Where: From remote Impact: Spoofing Released: 2007-07-26 Mandriva has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache. Full Advisory: http://secunia.com/advisories/26227/ -- [SA26221] Cisco Products Java Secure Socket Extension SSL/TLS Request Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-07-26 Cisco has acknowledged a vulnerability in some products, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26221/ -- [SA26209] Kolab Server ClamAV RAR Archive Processing Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-07-25 A vulnerability has been reported in Kolab Server, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26209/ -- [SA26207] Gentoo update for mplayer Critical: Moderately critical Where: From remote Impact: System access Released: 2007-07-25 Gentoo has issued an update for mplayer. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26207/ -- [SA26195] Red Hat update for bind Critical: Moderately critical Where: From remote Impact: Spoofing Released: 2007-07-25 Red Hat has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache. Full Advisory: http://secunia.com/advisories/26195/ -- [SA26184] fsplib Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: System access Released: 2007-07-24 Some vulnerabilities in have been reported fsplib, which potentially can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/26184/ -- [SA26164] Debian update for clamav Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-07-24 Debian has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26164/ -- [SA26160] Sun Solaris BIND Predictable DNS Query IDs Vulnerability Critical: Moderately critical Where: From remote Impact: Spoofing Released: 2007-07-26 Sun has acknowledged a vulnerability in BIND for Sun Solaris, which can be exploited by malicious people to poison the DNS cache. Full Advisory: http://secunia.com/advisories/26160/ -- [SA26158] rPath update for lighttpd Critical: Moderately critical Where: From remote Impact: Security Bypass, DoS Released: 2007-07-20 rPath has issued an update for lighttpd. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26158/ -- [SA26148] Ubuntu update for bind Critical: Moderately critical Where: From remote Impact: Spoofing Released: 2007-07-26 Ubuntu has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache. Full Advisory: http://secunia.com/advisories/26148/ -- [SA26147] RSBAC User Management Authentication Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2007-07-23 A vulnerability has been reported in RSBAC, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/26147/ -- [SA26203] Avaya Products file "file_printf()" Integer Underflow Vulnerability Critical: Less critical Where: From remote Impact: DoS, System access Released: 2007-07-25 Avaya has acknowledged a vulnerability in various Avaya products, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26203/ -- [SA26229] Gentoo festival Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-07-26 Gentoo has acknowledged a vulnerability in the festival package, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/26229/ -- [SA26220] Sun Solaris lbxproxy Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Exposure of system information, Exposure of sensitive information, Privilege escalation Released: 2007-07-26 A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/26220/ -- [SA26208] NVClock "set_default_speeds()" Insecure Temporary Files Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-07-25 Tavis Ormandy has reported a vulnerability in NVClock, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/26208/ -- [SA26200] Gentoo update for nvclock Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-07-25 Gentoo has issued an update for nvclock. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/26200/ -- [SA26210] Avaya CMS / IR Solaris rcp Command Line Shell Command Injection Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2007-07-25 Avaya has acknowledged a weakness in Avaya CMS / IR, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/26210/ Other:-- [SA26161] Cisco Multiple Products Wireless ARP Requests Denial of Service Critical: Moderately critical Where: From local network Impact: DoS Released: 2007-07-25 Some vulnerabilities have been reported in multiple Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26161/ -- [SA26192] Aruba Mobility Controller Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-07-25 A vulnerability has been reported in Aruba Mobility Controller, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26192/ Cross Platform:-- [SA26176] Mozilla SeaMonkey Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-07-25 Some vulnerabilities have been reported in SeaMonkey, which can potentially be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26176/ -- [SA26175] epesi framework Gallery File Upload Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-25 A vulnerability has been reported in the epesi framework, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26175/ -- [SA26171] Panda Antivirus EXE File Parsing Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-07-23 Sergio Alvarez has reported a vulnerability in Panda Antivirus, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26171/ -- [SA26143] Citrix Access Gateway Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Cross Site Scripting, Exposure of sensitive information, System access Released: 2007-07-20 Some vulnerabilities and a security issue have been reported in Citrix Access Gateway, which can be exploited by malicious people to disclose sensitive information, conduct cross-site request forgery attacks, or to compromise a user's system. Full Advisory: http://secunia.com/advisories/26143/ -- [SA26215] Gentoo update for gimp Critical: Moderately critical Where: From remote Impact: System access Released: 2007-07-26 Gentoo has issued an update for gimp. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26215/ -- [SA26194] Entertainment Media Sharing "pagename" Local File Inclusion Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-07-25 Kw3rLn has reported a vulnerability in Entertainment Media Sharing, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/26194/ -- [SA26185] Kerio MailServer Attachment Filter Unspecified Vulnerability Critical: Moderately critical Where: From remote Impact: Unknown Released: 2007-07-24 A vulnerability with an unknown impact has been reported in Kerio MailServer. Full Advisory: http://secunia.com/advisories/26185/ -- [SA26183] IBM WebSphere Application Server Unspecified Vulnerability Critical: Moderately critical Where: From remote Impact: Unknown Released: 2007-07-24 A vulnerability with an unknown impact has been reported in IBM WebSphere Application Server. Full Advisory: http://secunia.com/advisories/26183/ -- [SA26170] BlogSite Professional "news_id" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-07-23 t0pP8uZz & xprog have reported a vulnerability in BlogSite Professional, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/26170/ -- [SA26165] JBlog Security Bypass and Cross-Site Scripting Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting Released: 2007-07-23 S4mi has discovered some vulnerabilities in JBlog, which can be exploited by malicious people to conduct cross-site scripting attacks and to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/26165/ -- [SA26156] phpMyForum editpost.php SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-07-23 A vulnerability has been reported in phpMyForum, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/26156/ -- [SA26155] CA Products CHM and RAR File Processing Denial of Service Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-07-25 Two vulnerabilities have been reported in various CA products, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26155/ -- [SA26152] BIND Predictable DNS Query IDs Vulnerability Critical: Moderately critical Where: From remote Impact: Spoofing Released: 2007-07-24 Amit Klein has reported a vulnerability in BIND, which can be exploited by malicious people to poison the DNS cache. Full Advisory: http://secunia.com/advisories/26152/ -- [SA26146] Itaka "/screenshot" URL Security Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of sensitive information Released: 2007-07-20 A vulnerability has been discovered in Itaka, which can be exploited by malicious people to bypass certain security restrictions and disclose sensitive information. Full Advisory: http://secunia.com/advisories/26146/ -- [SA26206] FORMfields AdMan login.php Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-07-25 r0t has reported a vulnerability in AdMan, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26206/ -- [SA26196] Vikingboard Two Vulnerabilities and Debug Information Weakness Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-07-25 Lostmon has discovered a weakness and two vulnerabilities in Vikingboard, which can be exploited by malicious users to disclose system information and conduct script-insertion attacks, and malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26196/ -- [SA26186] iFoto "dir" Directory Traversal Critical: Less critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-07-26 Lostmon has discovered a vulnerability in iFoto, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/26186/ -- [SA26150] DokuWiki "spell_utf8test()" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-07-20 Cyrill Brunschwiler has reported a vulnerability in DokuWiki, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26150/ -- [SA26144] dirLIST "folder" Directory Traversal and Security Bypass Critical: Less critical Where: From remote Impact: Security Bypass, Exposure of sensitive information Released: 2007-07-20 Some vulnerabilities have been discovered in dirLIST, which can be exploited by malicious people to disclose sensitive information and to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/26144/ -- [SA26142] VHCS Session Fixation Vulnerability Critical: Less critical Where: From remote Impact: Hijacking Released: 2007-07-23 David Vieira-Kurz has reported a vulnerability in VHCS, which can be exploited by malicious people to conduct session fixation attacks. Full Advisory: http://secunia.com/advisories/26142/ -- [SA26140] Tor Multiple Weaknesses and Vulnerability Critical: Less critical Where: From remote Impact: Security Bypass, Exposure of sensitive information, DoS Released: 2007-07-24 Some weaknesses and a vulnerability have been reported in Tor, which potentially can be exploited by malicious people to bypass certain security restrictions, disclose certain sensitive information, or potentially cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26140/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _____________________________________________________ Attend Black Hat USA, July 28-August 2 in Las Vegas, the world's premier technical event for ICT security experts. Featuring 30 hands-on training courses and 90 Briefings presentations with lots of new content and new tools. Network with 4,000 delegates from 70 nations. Visit product displays by 30 top sponsors in a relaxed setting. Rates increase on June 1 so register today. http://www.blackhat.com
This archive was generated by hypermail 2.1.3 : Thu Jul 26 2007 - 23:30:45 PDT