[ISN] Secunia Weekly Summary - Issue: 2007-34

From: InfoSec News (alerts@private)
Date: Fri Aug 24 2007 - 01:32:01 PDT


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2007-08-16 - 2007-08-23                        

                       This week: 49 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

BETA test the new Secunia Personal Software Inspector!

The Secunia PSI detects installed software on your computer and
categorises it as either Insecure, End-of-Life, or Up-To-Date.
Effectively enabling you to focus your attention on software
installations where more secure versions are available from the
vendors.

Download the free PSI BETA from the Secunia website:
https://psi.secunia.com/

========================================================================
2) This Week in Brief:

Yahoo! confirmed two vulnerabilities in Yahoo! Messenger this week,
which can be exploited by malicious people to compromise a vulnerable
system.

The vulnerabilities are caused by input validation errors in ywcvwr.dll
and kdu_v32m.dll when processing JPEG 2000 streams sent via the webcam
stream, which may lead to a heap-based buffer overflow. An attack
scenario is possible if a user is tricked into viewing a malicious
webcam stream by a remote attacker.

Successful exploitation may cause a Denial of Service or execution of
arbitrary code.

Yahoo! has released a security update to solve these vulnerabilities.
Users are urged to download and install the updated Yahoo! Messenger
version.

For more information refer to:
http://secunia.com/advisories/26501/

--

Several vulnerabilities in various Trend Micro products were disclosed
this week.

Trend Micro ServerProtect has an integer overflow error and a number of
boundary errors that can be used by malicious people within the network
to compromise a vulnerable system.

Users of Trend Micro ServerProtect for Windows are urged to install the
patches available from the vendor.

For more information refer to:
http://secunia.com/advisories/26523/

Trend Micro Anti-Spyware and Pc-cillin have a vulnerability caused by a
boundary error within the SSAPI module in vstlib32.dll when processing
path names. This can cause a stack-based buffer overflow by e.g.
creating a file with an overly long path name. 

Successful exploitation allows execution of arbitrary code with SYSTEM
privileges, but requires that the Venus Spy Trap (VST) functionality of
SSAPI is enabled.

Users of Trend Micro Anti-Spyware and PC-cillin 2007 are advised to
install the patches available from the vendor.

For more information refer to:
http://secunia.com/advisories/26557/

--

ClamAV has acknowledged two vulnerabilities this week as well, which
can potentially be exploited by malicious people to crash the ClamAV
service.

A NULL-pointer dereference error within the "cli_scanrtf()" function in
libclamav/rtf.c  can potentially be exploited to crash ClamAV by
scanning a specially crafted RTF file.

A NULL-pointer dereference error within the "cli_html_normalise()"
function in libclamav/htmlnorm.c can potentially be exploited to crash
ClamAV by scanning a specially crafted HTML file containing a "data"
URL scheme.

The vendor has released an updated version of the software.

For more information refer to:
http://secunia.com/advisories/26530/

 --

VIRUS ALERTS:

During the past week Secunia collected 155 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA26477] Opera JavaScript Invalid Pointer Vulnerability
2.  [SA26402] Sun JRE Font Parsing Vulnerability
3.  [SA26495] BlueCat Networks Adonis CLI Privilege Escalation
              Vulnerability
4.  [SA26493] rsync "f_name()" Off-By-One Vulnerability
5.  [SA26494] Sun Solaris RBAC Rules Privilege Escalation Vulnerability
6.  [SA26511] Symantec Enterprise Firewall User Enumeration Weakness
7.  [SA26471] IBM DB2 Multiple Vulnerabilities
8.  [SA26443] Ubuntu update for apache
9.  [SA26459] Cisco VPN Client Privilege Escalation Vulnerabilities
10. [SA26450] Debian update for kernel

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA26571] Rogue Trooper Asura Engine Packet Handling Buffer Overflow
[SA26532] Lhaz Archive Processing Unspecified Code Execution
[SA26526] rFactor Multiple Vulnerabilities
[SA26525] eCentrex VOIP Client Component ActiveX Control Buffer
Overflow
[SA26519] Mercury Mail Transport System SMTP AUTH CRAM-MD5 Buffer
Overflow
[SA26557] Trend Micro Products SSAPI Module Long Path Processing Buffer
Overflow
[SA26523] Trend Micro ServerProtect Multiple Buffer Overflow
Vulnerabilities
[SA26560] Search Engine Builder "searWords" Cross-Site Scripting
[SA26506] Unreal Engine Web Server Logging Denial of Service
[SA26513] ZoneAlarm Products Insecure Directory Permissions and IOCTL
Handler Privilege Escalation

UNIX/Linux:
[SA26545] Gentoo update for opera
[SA26521] Slackware update for tcpdump
[SA26505] Gentoo update for lighttpd
[SA26553] Asterisk SIP Channel Driver Dialog History Memory Exhaustion
[SA26548] rPath update for rsync
[SA26543] SUSE Update for Multiple Packages
[SA26537] Mandriva update for rsync
[SA26535] Mandriva update for libvorbis
[SA26531] IBM AIX BIND Predictable DNS Query IDs Vulnerability
[SA26518] Ubuntu update for rsync
[SA26514] Debian update for koffice
[SA26509] Gentoo update for bind
[SA26546] NuFW Time Based Filtering Rules Security Bypass
[SA26542] Ampache Session Fixation and SQL Injection
[SA26522] Mandriva update for vim
[SA26516] Ubuntu update for jasper
[SA26512] Gentoo update for mod_jk
[SA26508] Avaya Products Perl Net::DNS and Apache Vulnerabilities
[SA26527] Sysstat systat.in Insecure Temporary Files
[SA26558] Sun Solaris ATA Disk Driver IOCTLs Denial of Service
[SA26540] Sudo Kerberos 5 Security Bypass Vulnerability
[SA26520] Mandriva update for gdm

Other:
[SA26547] Cisco IP Phone 7940/7960 SIP Message Sequence Denial of
Service

Cross Platform:
[SA26533] OlateDownload Multiple Vulnerabilities
[SA26507] Toribash Multiple Vulnerabilities
[SA26556] Joomla SimpleFAQ Component "aid" SQL Injection
[SA26552] Kolab Server ClamAV Multiple Denial of Service
Vulnerabilities
[SA26544] TT4XBT Multiple SQL Injection Vulnerabilities
[SA26530] ClamAV Multiple Denial of Service Vulnerabilities
[SA26515] Nortel Products BIND Predictable DNS Query IDs Vulnerability
[SA26504] TorrentTrader Multiple SQL Injection Vulnerabilities
[SA26517] EMC NetWorker Remote Exec Service Buffer Overflow
[SA26565] OlateDownload files.php URL Cross-Site Scripting
[SA26563] WordPress Pool Theme URL Cross-Site Scripting Vulnerability
[SA26541] Cach Unspecified Data Manipulation Vulnerability
[SA26510] Drupal Project and Project Issue Tracking Modules Insecure
Permissions
[SA26555] Novell Identity Manager Client Login Extension Information
Disclosure
[SA26536] id3lib Insecure Temporary File Privilege Escalation

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA26571] Rogue Trooper Asura Engine Packet Handling Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-08-23

Luigi Auriemma has reported a vulnerability in Rogue Trooper, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26571/

 --

[SA26532] Lhaz Archive Processing Unspecified Code Execution

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-08-20

A vulnerability has been reported in Lhaz, which can be exploited by
malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26532/

 --

[SA26526] rFactor Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-08-20

Luigi Auriemma has reported some vulnerabilities in rFactor, which
potentially can be exploited by malicious people to cause a DoS (Denial
of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26526/

 --

[SA26525] eCentrex VOIP Client Component ActiveX Control Buffer
Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-08-23

rgod has discovered a vulnerability in the eCentrex VOIP Client
Component ActiveX control, which can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26525/

 --

[SA26519] Mercury Mail Transport System SMTP AUTH CRAM-MD5 Buffer
Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-08-20

eliteb0y has discovered a vulnerability in Mercury Mail Transport
System, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/26519/

 --

[SA26557] Trend Micro Products SSAPI Module Long Path Processing Buffer
Overflow

Critical:    Moderately critical
Where:       From local network
Impact:      Privilege escalation, System access
Released:    2007-08-22

A vulnerability has been reported in Trend Micro products, which can be
exploited by malicious, local users to gain escalated privileges or
potentially by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26557/

 --

[SA26523] Trend Micro ServerProtect Multiple Buffer Overflow
Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-08-22

Some vulnerabilities have been reported in Trend Micro ServerProtect,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/26523/

 --

[SA26560] Search Engine Builder "searWords" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-08-22

MustLive has discovered a vulnerability in Search Engine Builder, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/26560/

 --

[SA26506] Unreal Engine Web Server Logging Denial of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-08-20

Luigi Auriemma has reported a vulnerability in the Unreal Engine, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/26506/

 --

[SA26513] ZoneAlarm Products Insecure Directory Permissions and IOCTL
Handler Privilege Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-08-21

Some vulnerabilities and a security issue have been reported in
ZoneAlarm products, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/26513/


UNIX/Linux:--

[SA26545] Gentoo update for opera

Critical:    Highly critical
Where:       From remote
Impact:      Spoofing, System access
Released:    2007-08-23

Gentoo has issued an update for opera. This fixes some vulnerabilities,
which can be exploited by malicious people to conduct spoofing attacks
or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26545/

 --

[SA26521] Slackware update for tcpdump

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-08-20

Slackware has issued an update for tcpdump. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/26521/

 --

[SA26505] Gentoo update for lighttpd

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2007-08-17

Gentoo has issued an update for lighttpd. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, cause a DoS (Denial of Service), or
potentially to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26505/

 --

[SA26553] Asterisk SIP Channel Driver Dialog History Memory Exhaustion

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-08-22

A vulnerability has been reported in Asterisk, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/26553/

 --

[SA26548] rPath update for rsync

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-08-23

rPath has issued an update for rsync. This fixes a vulnerability, which
can potentially be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/26548/

 --

[SA26543] SUSE Update for Multiple Packages

Critical:    Moderately critical
Where:       From remote
Impact:      Spoofing, DoS, System access
Released:    2007-08-20

SUSE has issued an update for multiple packages. This fixes some
security issues, which can be exploited by malicious, local users to
cause a DoS (Denial of Service), and some vulnerabilities, which can be
exploited by malicious people to poison the DNS cache, cause a DoS, or
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26543/

 --

[SA26537] Mandriva update for rsync

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-08-21

Mandriva has issued an update for rsync. This fixes a vulnerability,
which can potentially be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/26537/

 --

[SA26535] Mandriva update for libvorbis

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-08-21

Mandriva has issued an update for libvorbis. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise an application using
the library.

Full Advisory:
http://secunia.com/advisories/26535/

 --

[SA26531] IBM AIX BIND Predictable DNS Query IDs Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Spoofing
Released:    2007-08-22

IBM has acknowledged a vulnerability in AIX, which can be exploited by
malicious people to poison the DNS cache.

Full Advisory:
http://secunia.com/advisories/26531/

 --

[SA26518] Ubuntu update for rsync

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-08-21

Ubuntu has issued an update for rsync. This fixes a vulnerability,
which can potentially be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/26518/

 --

[SA26514] Debian update for koffice

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-08-21

Debian has issued an update for koffice. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/26514/

 --

[SA26509] Gentoo update for bind

Critical:    Moderately critical
Where:       From remote
Impact:      Spoofing
Released:    2007-08-20

Gentoo has issued an update for bind. This fixes a vulnerability, which
can be exploited by malicious people to poison the DNS cache.

Full Advisory:
http://secunia.com/advisories/26509/

 --

[SA26546] NuFW Time Based Filtering Rules Security Bypass

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-08-21

A security issue has been reported in NuFW, which can be exploited by
malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/26546/

 --

[SA26542] Ampache Session Fixation and SQL Injection

Critical:    Less critical
Where:       From remote
Impact:      Hijacking, Manipulation of data
Released:    2007-08-20

Some vulnerabilities have been reported in Ampache, which can be
exploited by malicious users to conduct SQL injection attacks and by
malicious people to conduct session fixation attacks.

Full Advisory:
http://secunia.com/advisories/26542/

 --

[SA26522] Mandriva update for vim

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2007-08-22

Mandriva has issued an update for vim. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/26522/

 --

[SA26516] Ubuntu update for jasper

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-08-21

Ubuntu has issued an update for jasper. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/26516/

 --

[SA26512] Gentoo update for mod_jk

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-08-20

Gentoo has issued an update for mod_jk. This fixes a security issue,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/26512/

 --

[SA26508] Avaya Products Perl Net::DNS and Apache Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, Spoofing, DoS
Released:    2007-08-17

Avaya has acknowledged some vulnerabilities in Avaya products, which
can be exploited by malicious people to conduct cross-site scripting
attacks, or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/26508/

 --

[SA26527] Sysstat systat.in Insecure Temporary Files

Critical:    Less critical
Where:       Local system
Impact:      Manipulation of data
Released:    2007-08-21

A vulnerability has been reported in Sysstat, which can be exploited by
malicious, local users to perform certain actions with escalated
privileges.

Full Advisory:
http://secunia.com/advisories/26527/

 --

[SA26558] Sun Solaris ATA Disk Driver IOCTLs Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-08-22

Some security issues have been reported in Sun Solaris, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/26558/

 --

[SA26540] Sudo Kerberos 5 Security Bypass Vulnerability

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2007-08-20

A vulnerability has been reported in Sudo, which can be exploited by
malicious, local users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/26540/

 --

[SA26520] Mandriva update for gdm

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-08-22

Mandriva has issued an update for gdm. This fixes a vulnerability,
which can be exploited by malicious, local users to cause a DoS (Denial
of Service).

Full Advisory:
http://secunia.com/advisories/26520/


Other:--

[SA26547] Cisco IP Phone 7940/7960 SIP Message Sequence Denial of
Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-08-21

The Madynes research team at INRIA Lorraine has reported some
vulnerabilities in Cisco IP Phone 7940 and 7960, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/26547/


Cross Platform:--

[SA26533] OlateDownload Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data, System access
Released:    2007-08-21

imei addmimistrator has reported some vulnerabilities in OlateDownload,
which can be exploited by malicious people to bypass certain security
restrictions, conduct SQL injection attacks, and compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/26533/

 --

[SA26507] Toribash Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-08-20

Luigi Auriemma has reported some vulnerabilities in Toribash, which can
be exploited by malicious people to cause a DoS (Denial of Service) or
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26507/

 --

[SA26556] Joomla SimpleFAQ Component "aid" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-08-22

k1tk4t has discovered a vulnerability in the SimpleFAQ component for
Joomla, which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/26556/

 --

[SA26552] Kolab Server ClamAV Multiple Denial of Service
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-08-22

Some vulnerabilities have been reported in Kolab Server, which can
potentially be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/26552/

 --

[SA26544] TT4XBT Multiple SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-08-20

Some vulnerabilities have been reported in TT4XBT, which can be
exploited by malicious users to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/26544/

 --

[SA26530] ClamAV Multiple Denial of Service Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-08-22

Some vulnerabilities have been reported in ClamAV, which can
potentially be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/26530/

 --

[SA26515] Nortel Products BIND Predictable DNS Query IDs Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Spoofing
Released:    2007-08-17

Nortel has acknowledged a vulnerability in BIND included in various
Nortel products, which can be exploited by malicious people to poison
the DNS cache.

Full Advisory:
http://secunia.com/advisories/26515/

 --

[SA26504] TorrentTrader Multiple SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-08-20

Some vulnerabilities have been reported in Torrent Trader, which can be
exploited by malicious users to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/26504/

 --

[SA26517] EMC NetWorker Remote Exec Service Buffer Overflow

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-08-21

A vulnerability has been reported in EMC NetWorker, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26517/

 --

[SA26565] OlateDownload files.php URL Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-08-23

imei addmimistrator has discovered a vulnerability in OlateDownload,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/26565/

 --

[SA26563] WordPress Pool Theme URL Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-08-22

MustLive has discovered a vulnerability in the Pool theme for
WordPress, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/26563/

 --

[SA26541] Cach Unspecified Data Manipulation Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-08-22

A vulnerability has been reported in Cach, which can be exploited by
malicious users to manipulate data.

Full Advisory:
http://secunia.com/advisories/26541/

 --

[SA26510] Drupal Project and Project Issue Tracking Modules Insecure
Permissions

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information
Released:    2007-08-20

Some security issues have been reported in the Drupal Project and
Project issue tracking modules, which can be exploited by malicious
users to disclose sensitive information and bypass certain access
restrictions.

Full Advisory:
http://secunia.com/advisories/26510/

 --

[SA26555] Novell Identity Manager Client Login Extension Information
Disclosure

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2007-08-23

A security issue has been reported in the Client Login Extension for
Novell Identity Manager, which can be exploited by malicious, local
users to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/26555/

 --

[SA26536] id3lib Insecure Temporary File Privilege Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-08-20

Nikolaus Schulz has reported a security issue in id3lib, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/26536/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45



____________________________________
Attend HITBSecConf2007 - Malaysia 
Taking place September 3-6 2007 featuring seven tracks of technical 
training and a dual-track security conference with keynote speakers 
Lance Spitzner and Mikko Hypponen!  -  Book your seats today! 
http://conference.hitb.org/hitbsecconf2007kl/



This archive was generated by hypermail 2.1.3 : Fri Aug 24 2007 - 01:50:35 PDT