======================================================================== The Secunia Weekly Advisory Summary 2007-09-13 - 2007-09-20 This week: 80 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ======================================================================== 2) This Week in Brief: A week after Microsoft released its security patches for August, several vulnerabilities have been reported in various Microsoft products, which can be exploited by malicious people to compromise vulnerable systems. The first, a vulnerability in Microsoft Windows, is caused by a boundary error in the "FindFile()" function of the CFileFind class in the mfc42.dll and mfc42u.dll files. Passing an overly long argument to the affected function exploits the vulnerability, and causes a heap-based buffer overflow. Two Hewlett-Packard products are known to contain vectors that may allow exploitation of this vulnerability: HP All-in-One Series Web Release software/driver installer version 2.1.0, and HP Photo & Imaging Gallery version 1.1. The vulnerability is confirmed on a fully-patched Windows XP SP2 including mfc42.dll version 6.2.4131.0 and mfc42u.dll version 6.2.8071.0, and remains unpatched. For more information, refer to: http://secunia.com/advisories/26800/ Several other vulnerabilities were reported in two Microsoft Visual Studio ActiveX controls. The PDWizard.ocx ActiveX control contains the insecure methods "StartProcess()" and "SyncShell()", which can be exploited to execute arbitrary commands on the system. Other insecure methods have also been reported, such as "SaveAs()", "CABDefaultURL()", "CABFileName()", and "CABRunFile()". The "Load()" and "SaveAs()" methods of the VBTOVSI.DLL ActiveX control can also be exploited to, for example, load a local file and save it in an arbitrary location or overwrite an arbitrary file. The vulnerabilities are reported in version 6.0, and remain unpatched. -- Some vulnerabilities have been reported in OpenOffice, which potentially can be exploited by malicious people to compromise a user's system. By tricking a user into, for example, opening a specially crafted document that requires processing of TIFF images, integer overflows can occur, which when exploited trigger heap-based buffer overflows. Successful exploitation may allow the execution of arbitrary code. The vulnerabilities are reported in versions prior to 2.3. Users of OpenOffice versions prior to 2.3 are urged to upgrade to the fixed version. Users of the OpenOffice 1.1.x and 1.0.x branches should note that these versions are not patched, and should instead upgrade to version 2.3. For more information, refer to: http://secunia.com/advisories/26816/ -- A vulnerability in the popular virtual world Second Life was reported this week, which could potentially give a malicious person access to a legitimate player's user account. The problem is that SecondLife registers the "secondlife://" URI handler and allows invoking SecondLife with arbitrary command line arguments. By using certain parameters, such as "-autologin" and "-loginuri", it is possible to gain knowledge of, for example, a user's username and password hash by specifying a malicious server. Successful exploitation requires that the legitimate user is, for example, tricked into visiting a malicious website. The vulnerability, which is reported in version 1.x, remains unpatched. Users are urged not to browse untrusted sites. For more information, refer to: http://secunia.com/advisories/26845/ -- VIRUS ALERTS: During the past week Secunia collected 167 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA26800] Microsoft Windows CFileFind Class "FindFile()" Buffer Overflow 2. [SA26806] Media Player Classic AVI File Processing Buffer Overflow 3. [SA26820] WinSCP Protocol Handler Command Line Switch Injection 4. [SA26753] Microsoft Agent ActiveX Control URL Handling Buffer Overflow Vulnerability 5. [SA26779] Microsoft Visual Studio Two ActiveX Controls Insecure Methods 6. [SA26819] Alien Arena 2007 Multiple Vulnerabilities 7. [SA26809] Joomla joomlaradio Component "mosConfig_live_site" File Inclusion 8. [SA26741] Plesk "PLESKSESSID" SQL Injection Vulnerability 9. [SA26788] Invision Power Board Multiple Vulnerabilities 10. [SA26760] Red Hat update for kernel ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA26835] RemoteDocs R-Viewer RDZ Code Execution and Information Disclosure [SA26830] PhotoChannel Networks Photo Upload Plugin ActiveX Control Buffer Overflows [SA26820] WinSCP Protocol Handler Command Line Switch Injection [SA26878] Mercury Mail Transport System IMAPD SEARCH Buffer Overflow [SA26815] jetCast Server HTTP Request Processing Denial of Service [SA26889] WebBatch Information Disclosure and Cross-Site Scripting [SA26845] Second Life URI Handler Registration Vulnerability [SA26836] MW6 Technologies QRCode ActiveX Control Two Insecure Methods [SA26832] WinImage Directory Traversal Vulnerability UNIX/Linux: [SA26909] VMware ESX Server Multiple Security Updates [SA26861] rPath update for openoffice.org [SA26855] Fedora update for openoffice.org [SA26844] Red Hat update for openoffice.org [SA26828] Gentoo update for realplayer [SA26824] rPath update for lighttpd [SA26822] Trustix Update for Multiple Packages [SA26817] Debian update for openoffice.org [SA26896] Red Hat update for nfs-utils-lib [SA26882] Fedora update for qt [SA26880] Gentoo update for phpwiki [SA26868] Ubuntu update for qt [SA26865] Red Hat update for libvorbis [SA26862] Gentoo update for poppler [SA26860] rPath update for kdebase [SA26858] Sun Solaris BIND 8 Predictable DNS Query IDs Vulnerability [SA26857] SGI Advanced Linux Environment Multiple Updates [SA26856] Fedora update for gd [SA26852] Avaya Products Qt QTextEdit Error Message Handling Format String Vulnerability [SA26847] Avaya Products BIND Predictable DNS Query IDs Vulnerability [SA26838] rPath Update for Multiple php Packages [SA26827] Gentoo flac123 Comment Parsing Vulnerability [SA26826] Gentoo update for eggdrop [SA26821] PHP Webquest "id_actividad" SQL Injection [SA26814] Gentoo update for streamripper [SA26813] Gentoo update for kvirc [SA26811] Qt QUtf8Decoder Off-By-One Vulnerability [SA26823] rPath update for xorg-x11 [SA26901] Ubuntu update for t1lib [SA26872] Fedora update for cacti [SA26870] Fedora update for mediawiki [SA26863] Fedora update for quagga [SA26842] Fedora update for httpd [SA26831] AXIS 207W Network Camera Multiple Vulnerabilities [SA26829] Ubuntu update for quagga [SA26825] inotify-tools "inotifytools_snprintf()" Buffer Overflow Vulnerability [SA26897] Red Hat update for xorg-x11 [SA26873] HP-UX logins(1M) Command Security Issue [SA26866] SKK Tools skkdic-expr.c Insecure Temporary Files [SA26859] Ubuntu update for xorg-server [SA26834] rPath update for samba and samba-swat [SA26818] Gentoo update for id3lib [SA26900] rPath update for gdm [SA26894] KDE KDM Login Password Check Security Bypass [SA26879] Gentoo update for gdm [SA26810] Gentoo update for po4a Other: [SA26853] OmniPCX Enterprise Unified Maintenance Tool Shell Command Injection [SA26869] AirDefense Airsensor M520 HTTPS Request Handling Denial of Service Vulnerabilities Cross Platform: [SA26849] Joomla Joomla!12Pictures Component "mosConfig_live_site" File Inclusion [SA26840] Shop-Script FREE Security Bypass and PHP Code Execution [SA26839] OpenOffice TIFF Parsing Integer Overflow Vulnerabilities [SA26819] Alien Arena 2007 Multiple Vulnerabilities [SA26816] OpenOffice 2 TIFF Parsing Integer Overflow Vulnerabilities [SA26812] phpFFL "PHPFFL_FILE_ROOT" File Inclusion Vulnerabilities [SA26809] Joomla joomlaradio Component "mosConfig_live_site" File Inclusion [SA26908] PhpWebGallery "author" Script Insertion [SA26902] OneCMS "abc" SQL Injection Vulnerability [SA26877] Merak Mail Server Email Body Script Insertion Vulnerability [SA26875] phpBB Styles Demo Module SQL Injection and Cross-Site Scripting [SA26851] Chupix "fichier" Directory Traversal Vulnerability [SA26890] VMWare Products Multiple Vulnerabilities [SA26883] IBM Tivoli Storage Manager Client Information Disclosure and Buffer Overflow [SA26886] Phormer Multiple Cross-Site Scripting Vulnerabilities [SA26881] Firefox "-chrome" Parameter Security Issue [SA26854] b1gMail "chapter" Cross-Site Scripting [SA26848] Bugzilla "createemailregexp" Security Bypass Vulnerability [SA26843] Coppermine Photo Gallery Cross-Site Scripting and Local File Inclusion [SA26841] TinyWebGallery Multiple URL Cross-Site Scripting [SA26837] Python imageop "tovideo()" Integer Overflow Security Issue [SA26833] osCMax URL Cross-Site Scripting Vulnerability [SA26876] Dibbler Multiple Denial of Service Vulnerabilities ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA26835] RemoteDocs R-Viewer RDZ Code Execution and Information Disclosure Critical: Highly critical Where: From remote Impact: Exposure of sensitive information, System access Released: 2007-09-18 Adam Baldwin has reported a vulnerability and a security issue in RemoteDocs R-Viewer, which potentially can be exploited by malicious, local users to disclose sensitive information and by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26835/ -- [SA26830] PhotoChannel Networks Photo Upload Plugin ActiveX Control Buffer Overflows Critical: Highly critical Where: From remote Impact: System access Released: 2007-09-17 Will Dormann has reported some vulnerabilities in PhotoChannel Networks Photo Upload Plugin ActiveX Control, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26830/ -- [SA26820] WinSCP Protocol Handler Command Line Switch Injection Critical: Highly critical Where: From remote Impact: Manipulation of data, System access Released: 2007-09-14 Kender.Security has discovered a vulnerability in WinSCP, which can be exploited by malicious people to manipulate certain files on a user's system and potentially to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26820/ -- [SA26878] Mercury Mail Transport System IMAPD SEARCH Buffer Overflow Critical: Moderately critical Where: From remote Impact: System access Released: 2007-09-20 void has discovered a vulnerability in Mercury Mail Transport System, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26878/ -- [SA26815] jetCast Server HTTP Request Processing Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-09-14 vCore has discovered a vulnerability in jetCast Server, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26815/ -- [SA26889] WebBatch Information Disclosure and Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting, Exposure of sensitive information Released: 2007-09-20 Doz has reported a vulnerability and a security issue in WebBatch, which can be exploited by malicious people to disclose system information or conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26889/ -- [SA26845] Second Life URI Handler Registration Vulnerability Critical: Less critical Where: From remote Impact: Exposure of sensitive information Released: 2007-09-18 pdp has reported a vulnerability in Second Life, which can be exploited by malicious people to disclose certain sensitive information. Full Advisory: http://secunia.com/advisories/26845/ -- [SA26836] MW6 Technologies QRCode ActiveX Control Two Insecure Methods Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2007-09-18 shinnai has discovered two vulnerabilities in MW6 Technologies QRCode ActiveX control, which can be exploited by malicious people to overwrite arbitrary files. Full Advisory: http://secunia.com/advisories/26836/ -- [SA26832] WinImage Directory Traversal Vulnerability Critical: Less critical Where: From remote Impact: System access Released: 2007-09-18 j00ru has discovered a vulnerability in WinImage, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26832/ UNIX/Linux:-- [SA26909] VMware ESX Server Multiple Security Updates Critical: Highly critical Where: From remote Impact: Security Bypass, Privilege escalation, DoS, System access Released: 2007-09-20 VMware has issued an update for VMware ESX Server. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions, perform certain actions with escalated privileges, or to cause a DoS (Denial of Service), by malicious users to bypass certain security restrictions, and by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26909/ -- [SA26861] rPath update for openoffice.org Critical: Highly critical Where: From remote Impact: System access Released: 2007-09-19 rPath has issued an update for openoffice.org. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26861/ -- [SA26855] Fedora update for openoffice.org Critical: Highly critical Where: From remote Impact: System access Released: 2007-09-19 Fedora has issued an update for openoffice.org. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26855/ -- [SA26844] Red Hat update for openoffice.org Critical: Highly critical Where: From remote Impact: System access Released: 2007-09-18 Red Hat has issued an update for openoffice.org. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26844/ -- [SA26828] Gentoo update for realplayer Critical: Highly critical Where: From remote Impact: System access Released: 2007-09-17 Gentoo has issued an update for realplayer. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26828/ -- [SA26824] rPath update for lighttpd Critical: Highly critical Where: From remote Impact: System access Released: 2007-09-17 rPath has issued an update for lighttpd. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26824/ -- [SA26822] Trustix Update for Multiple Packages Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, DoS, System access Released: 2007-09-18 Trustix has issued an update for multiple packages. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or bypass certain security restrictions, and by malicious people to cause a DoS, conduct cross-site scripting attacks, or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26822/ -- [SA26817] Debian update for openoffice.org Critical: Highly critical Where: From remote Impact: System access Released: 2007-09-18 Debian has issued an update for openoffice.org. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26817/ -- [SA26896] Red Hat update for nfs-utils-lib Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-09-20 Red Hat has issued an update for nfs-utils-lib. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26896/ -- [SA26882] Fedora update for qt Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-09-19 Fedora has issued an update for qt. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. Full Advisory: http://secunia.com/advisories/26882/ -- [SA26880] Gentoo update for phpwiki Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2007-09-19 Gentoo has issued an update for phpwiki. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/26880/ -- [SA26868] Ubuntu update for qt Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-09-19 Ubuntu has issued an update for qt. This fixes a vulnerability, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) or to compromise an application using the library. Full Advisory: http://secunia.com/advisories/26868/ -- [SA26865] Red Hat update for libvorbis Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-09-20 Red Hat has issued an update for libvorbis. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/26865/ -- [SA26862] Gentoo update for poppler Critical: Moderately critical Where: From remote Impact: System access Released: 2007-09-20 Gentoo has issued an update for poppler. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/26862/ -- [SA26860] rPath update for kdebase Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2007-09-19 rPath has issued an update for kdebase. This fixes a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/26860/ -- [SA26858] Sun Solaris BIND 8 Predictable DNS Query IDs Vulnerability Critical: Moderately critical Where: From remote Impact: Spoofing Released: 2007-09-19 Sun has acknowledged a vulnerability in BIND 8 for Sun Solaris, which can be exploited by malicious people to poison the DNS cache. Full Advisory: http://secunia.com/advisories/26858/ -- [SA26857] SGI Advanced Linux Environment Multiple Updates Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, DoS, System access Released: 2007-09-20 SGI has issued multiple updates for SGI Advanced Linux Environment. These fix some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, cause a DoS (Denial of Service), and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26857/ -- [SA26856] Fedora update for gd Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-09-19 Fedora has issued an update for gd. This fixes some vulnerabilities, which can potentially be exploited to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26856/ -- [SA26852] Avaya Products Qt QTextEdit Error Message Handling Format String Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2007-09-17 Avaya has acknowledged a vulnerability in various Avaya products, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26852/ -- [SA26847] Avaya Products BIND Predictable DNS Query IDs Vulnerability Critical: Moderately critical Where: From remote Impact: Spoofing Released: 2007-09-17 Avaya has acknowledged a vulnerability in various Avaya products, which can be exploited by malicious people to poison the DNS cache. Full Advisory: http://secunia.com/advisories/26847/ -- [SA26838] rPath Update for Multiple php Packages Critical: Moderately critical Where: From remote Impact: Unknown, Security Bypass Released: 2007-09-18 rPath has issued an update for multiple php packages. This fixes some vulnerabilities, where some have unknown impacts and others can be exploited by malicious, local users and malicious users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/26838/ -- [SA26827] Gentoo flac123 Comment Parsing Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2007-09-17 Gentoo has acknowledged a vulnerability in flac123, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26827/ -- [SA26826] Gentoo update for eggdrop Critical: Moderately critical Where: From remote Impact: System access Released: 2007-09-17 Gentoo has issued an update for eggdrop. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26826/ -- [SA26821] PHP Webquest "id_actividad" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-09-17 D4real_TeaM has discovered a vulnerability in PHP Webquest, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/26821/ -- [SA26814] Gentoo update for streamripper Critical: Moderately critical Where: From remote Impact: System access Released: 2007-09-14 Gentoo has issued an update for streamripper. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26814/ -- [SA26813] Gentoo update for kvirc Critical: Moderately critical Where: From remote Impact: System access Released: 2007-09-14 Gentoo has issues an update for kvirc. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26813/ -- [SA26811] Qt QUtf8Decoder Off-By-One Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-09-14 A vulnerability has been reported in Qt, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) or to compromise an application using the library. Full Advisory: http://secunia.com/advisories/26811/ -- [SA26823] rPath update for xorg-x11 Critical: Moderately critical Where: Local system Impact: Privilege escalation Released: 2007-09-17 rPath has issued an update for xorg-x11. This fixes a vulnerability, which can potentially be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/26823/ -- [SA26901] Ubuntu update for t1lib Critical: Less critical Where: From remote Impact: DoS, System access Released: 2007-09-20 Ubuntu has issued an update for t1lib. This fixes a vulnerability, which can be exploited by malicious users to potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26901/ -- [SA26872] Fedora update for cacti Critical: Less critical Where: From remote Impact: DoS Released: 2007-09-19 Fedora has issued an update for cacti. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26872/ -- [SA26870] Fedora update for mediawiki Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-09-19 Fedora has issued an update for mediawiki. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26870/ -- [SA26863] Fedora update for quagga Critical: Less critical Where: From remote Impact: DoS Released: 2007-09-19 Fedora has issued an update for quagga. This fixes some vulnerabilities, which potentially can be exploited by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26863/ -- [SA26842] Fedora update for httpd Critical: Less critical Where: From remote Impact: Exposure of sensitive information, DoS Released: 2007-09-19 Fedora has issued an update for httpd. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/26842/ -- [SA26831] AXIS 207W Network Camera Multiple Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting, DoS Released: 2007-09-17 Seth Fogie has reported some vulnerabilities in the AXIS 207W Network Camera, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks, or by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26831/ -- [SA26829] Ubuntu update for quagga Critical: Less critical Where: From remote Impact: DoS Released: 2007-09-17 Ubuntu has issued an update for quagga. This fixes some vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26829/ -- [SA26825] inotify-tools "inotifytools_snprintf()" Buffer Overflow Vulnerability Critical: Less critical Where: From remote Impact: DoS, System access Released: 2007-09-19 A vulnerability has been reported in inotify-tools, which can potentially be exploited by malicious users to compromise an application using the library. Full Advisory: http://secunia.com/advisories/26825/ -- [SA26897] Red Hat update for xorg-x11 Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-09-20 Red Hat has issued an update for xorg-x11. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/26897/ -- [SA26873] HP-UX logins(1M) Command Security Issue Critical: Less critical Where: Local system Impact: Security Bypass Released: 2007-09-20 A security issue has been reported in HP-UX, which may result in password problems not being detected. Full Advisory: http://secunia.com/advisories/26873/ -- [SA26866] SKK Tools skkdic-expr.c Insecure Temporary Files Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-09-19 A security issue has been reported in SKK Tools. This can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/26866/ -- [SA26859] Ubuntu update for xorg-server Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-09-19 Ubuntu has issued an update for xorg-server. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/26859/ -- [SA26834] rPath update for samba and samba-swat Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-09-17 rPath has issued an update for samba and samba-swat. This fixes a security issue, which can be exploited by malicious, local users gain escalated privileges. Full Advisory: http://secunia.com/advisories/26834/ -- [SA26818] Gentoo update for id3lib Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-09-17 Gentoo has issued an update for id3lib. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/26818/ -- [SA26900] rPath update for gdm Critical: Not critical Where: Local system Impact: DoS Released: 2007-09-20 rPath has issued an update for gdm. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26900/ -- [SA26894] KDE KDM Login Password Check Security Bypass Critical: Not critical Where: Local system Impact: Security Bypass Released: 2007-09-20 KDE has acknowledged a security issue in KDM, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/26894/ -- [SA26879] Gentoo update for gdm Critical: Not critical Where: Local system Impact: DoS Released: 2007-09-19 Gentoo has issued an update for gdm. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26879/ -- [SA26810] Gentoo update for po4a Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2007-09-14 Gentoo has issued an update for po4a. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/26810/ Other:-- [SA26853] OmniPCX Enterprise Unified Maintenance Tool Shell Command Injection Critical: Highly critical Where: From remote Impact: System access Released: 2007-09-17 A vulnerability has been reported in the OmniPCX Enterprise Unified Maintenance Tool, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26853/ -- [SA26869] AirDefense Airsensor M520 HTTPS Request Handling Denial of Service Vulnerabilities Critical: Less critical Where: From local network Impact: DoS Released: 2007-09-19 Alex Hernandez has reported some vulnerabilities in AirDefense Airsensor M520, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26869/ Cross Platform:-- [SA26849] Joomla Joomla!12Pictures Component "mosConfig_live_site" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2007-09-19 Morgan has reported a vulnerability in the Joomla!12Pictures component for Joomla, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26849/ -- [SA26840] Shop-Script FREE Security Bypass and PHP Code Execution Critical: Highly critical Where: From remote Impact: Security Bypass, System access Released: 2007-09-18 Raz0r has discovered some vulnerabilities in Shop-Script FREE, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26840/ -- [SA26839] OpenOffice TIFF Parsing Integer Overflow Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2007-09-18 Some vulnerabilities have been reported in OpenOffice, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26839/ -- [SA26819] Alien Arena 2007 Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-09-14 Luigi Auriemma has reported some vulnerabilities in Alien Arena 2007, which can be exploited by malicious people to conduct DoS (Denial of Service) attacks or to potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26819/ -- [SA26816] OpenOffice 2 TIFF Parsing Integer Overflow Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2007-09-18 Some vulnerabilities have been reported in OpenOffice, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26816/ -- [SA26812] phpFFL "PHPFFL_FILE_ROOT" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2007-09-17 Some vulnerabilities have been discovered in phpFFL (Fantasy Football League Manager), which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26812/ -- [SA26809] Joomla joomlaradio Component "mosConfig_live_site" File Inclusion Critical: Highly critical Where: From remote Impact: Exposure of sensitive information, System access Released: 2007-09-14 Morgan has discovered a vulnerability in the joomlaradio component for Joomla, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26809/ -- [SA26908] PhpWebGallery "author" Script Insertion Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2007-09-20 nights_shadow has discovered a vulnerability in PhpWebGallery, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/26908/ -- [SA26902] OneCMS "abc" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-09-20 str0ke has reported a vulnerability in OneCMS, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/26902/ -- [SA26877] Merak Mail Server Email Body Script Insertion Vulnerability Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2007-09-19 MWR InfoSecurity has reported a vulnerability in Merak Mail Server, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/26877/ -- [SA26875] phpBB Styles Demo Module SQL Injection and Cross-Site Scripting Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data, Exposure of sensitive information Released: 2007-09-19 nexen has discovered two vulnerabilities in the Styles Demo module for phpBB, which can be exploited by malicious people to conduct cross-site scripting attacks and SQL injection attacks. Full Advisory: http://secunia.com/advisories/26875/ -- [SA26851] Chupix "fichier" Directory Traversal Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-09-17 GoLd_M has discovered a vulnerability in Chupix, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/26851/ -- [SA26890] VMWare Products Multiple Vulnerabilities Critical: Moderately critical Where: From local network Impact: Privilege escalation, DoS, System access Released: 2007-09-20 Multiple vulnerabilities have been reported in various VMware products, which can be exploited by malicious, local users to gain escalated privileges or cause a DoS (Denial of Service) or by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26890/ -- [SA26883] IBM Tivoli Storage Manager Client Information Disclosure and Buffer Overflow Critical: Moderately critical Where: From local network Impact: Exposure of sensitive information, System access Released: 2007-09-20 Two vulnerabilities have been reported in IBM Tivoli Storage Manager (TSM) Client, which can be exploited by malicious people to disclose sensitive information or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26883/ -- [SA26886] Phormer Multiple Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-09-20 nights.shadow has discovered some vulnerabilities in Phormer, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26886/ -- [SA26881] Firefox "-chrome" Parameter Security Issue Critical: Less critical Where: From remote Impact: System access Released: 2007-09-19 Mozilla has acknowledged a security issue in Firefox, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/26881/ -- [SA26854] b1gMail "chapter" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-09-18 malibu.r has reported a vulnerability in b1gMail, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26854/ -- [SA26848] Bugzilla "createemailregexp" Security Bypass Vulnerability Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-09-19 A vulnerability has been reported in Bugzilla, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/26848/ -- [SA26843] Coppermine Photo Gallery Cross-Site Scripting and Local File Inclusion Critical: Less critical Where: From remote Impact: Cross Site Scripting, Exposure of system information, Exposure of sensitive information Released: 2007-09-18 L4teral has discovered two vulnerabilities in Coppermine Photo Gallery, which can be exploited by malicious people to conduct cross-site scripting attacks and by malicious users to disclose sensitive information. Full Advisory: http://secunia.com/advisories/26843/ -- [SA26841] TinyWebGallery Multiple URL Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-09-17 VIRANGAR UNDER GR0UND TEAM has discovered some vulnerabilities in TinyWebGallery, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26841/ -- [SA26837] Python imageop "tovideo()" Integer Overflow Security Issue Critical: Less critical Where: From remote Impact: DoS, System access Released: 2007-09-19 Slythers Bro has discovered a security issue in the imageop module for Python, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/26837/ -- [SA26833] osCMax URL Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-09-17 VIRANGAR UNDER GR0UND TEAM has discovered a vulnerability in osCMax, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/26833/ -- [SA26876] Dibbler Multiple Denial of Service Vulnerabilities Critical: Less critical Where: From local network Impact: DoS Released: 2007-09-20 Mu Security research team has reported some vulnerabilities in Dibbler, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/26876/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 __________________________________________________________________ CSI 2007 is the only conference that delivers a business-focused overview of enterprise security. It will convene 1,500+ delegates, 80 exhibitors and features 100+ sessions/seminars providing a roadmap for integrating policies and procedures with new tools and techniques. Register now for savings on conference fees and/or free exhibits admission. - www.csiannual.com
This archive was generated by hypermail 2.1.3 : Thu Sep 20 2007 - 22:16:41 PDT