[ISN] Secunia Weekly Summary - Issue: 2007-47

From: InfoSec News (alerts@private)
Date: Sun Nov 25 2007 - 23:06:16 PST


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2007-11-16 - 2007-11-23                        

                       This week: 73 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published

How do you know which Secunia advisories are important to you?

The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively.

Get a free trial of the Secunia Vulnerability Intelligence Solutions:
http://corporate.secunia.com/how_to_buy/38/vi/?ref=summary_sm

========================================================================
2) This Week in Brief:

A vulnerability has been fixed in the BitDefender Online Scanner, which
can be exploited by malicious people to compromise a user's system.

The vulnerability is due to an input validation error within the Online
Scanner (OScan8.ocx / Oscan81.ocx) ActiveX control when handling
arguments passed to the "InitX()" method. By prepending two "%"
characters to the argument of the affected method, a remote attacker
can trigger a heap-based buffer overflow.

Successful exploitation allows execution of arbitrary code, and
requires that a user visits a web page containing the malicious code.

The vulnerability is reported in version 8.0 of the product. The vendor
has released an updated version of the ActiveX control. Customers are
urged to download the fixed version immediately.

Fore more information, refer to:
http://secunia.com/advisories/27717/

 --

Some vulnerabilities have been reported in IBM WebSphere Application
Server, one of which has an unknown impact, while the other can be
exploited by malicious people to cause a DoS (Denial of Service).

An error within the Apache mod_proxy module used by the IBM HTTP Server
component can be exploited to cause a DoS. This is caused by a
documented vulnerability in Apache reported from August of this year.

In addition, a security concern with monitor role users in the
Administrative Console component has been reported. No further
information is available.

Users are urged to apply Fix Pack 13 to solve the issues. For more
information, refer to:
http://secunia.com/advisories/27762/

 --

Samba has released an updated version to fix two vulnerabilities, which
can be exploited by malicious people to compromise a vulnerable system.

A boundary error discovered by Secunia Research exists within the
"reply_netbios_packet()" function in nmbd/nmbd_packets.c when sending
NetBIOS replies. This can be exploited to cause a stack-based buffer
overflow by sending multiple specially crafted WINS "Name Registration"
requests followed by a WINS "Name Query" request.

Successful exploitation of this vulnerability allows execution of
arbitrary code, but requires that Samba is configured to run as a WINS
server (the "wins support" option is enabled).

The vendor also reported a boundary error within the processing of
GETDC logon requests. This can be exploited to cause a buffer overflow
by sending specially crafted GETDC mailslot requests.

Successful exploitation of this vulnerability requires that Samba is
configured as a Primary or Backup Domain Controller.

The vulnerabilities are reported in version 3.0.26a, and are fixed in
version 3.0.27. Patches are also available for 3.0.26a.

For more information, refer to:
http://secunia.com/advisories/27450/

 --

VIRUS ALERTS:

During the past week Secunia collected 207 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA27643] Apple Mac OS X Security Update Fixes Multiple
              Vulnerabilities
2.  [SA27450] Samba Multiple Buffer Overflow Vulnerabilities
3.  [SA27695] Apple Mac OS X Application Firewall Weaknesses and
              Security Issue
4.  [SA27717] BitDefender Online Scanner ActiveX Control Buffer
              Overflow
5.  [SA27664] Linux Kernel Multiple Denial of Service Vulnerabilities
6.  [SA27584] Microsoft Windows DNS Service Cache Poisoning
              Vulnerability
7.  [SA27694] Ubuntu update for vmware
8.  [SA27679] Ubuntu update for samba
9.  [SA27672] teTeX Multiple Vulnerabilities
10. [SA27693] HP-UX update for JRE/JDK

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA27717] BitDefender Online Scanner ActiveX Control Buffer Overflow
[SA27779] VU Case Manager "default.asp" SQL Injection Vulnerabilities
[SA27774] GWExtranet Information Disclosure and Script Insertion
Vulnerabilities
[SA27758] VU Mass Mailer "redir.asp" SQL Injection Vulnerability
[SA27734] Lhaplus LZH Archive Processing Unspecified Buffer Overflow
[SA27700] Click&BaneX Two SQL Injection Vulnerabilities
[SA27736] Ability Mail Server Unspecified IMAP4 Command Processing
Denial of Service
[SA27751] Invensys Wonderware InTouch Insecure NetDDE Share Permissions
Security Issue

UNIX/Linux:
[SA27785] Apple Mail Command Execution Vulnerability
[SA27772] Debian update for kdegraphics
[SA27744] Slackware update for mozilla-thunderbird
[SA27716] SUSE update for java-1_5_0-ibm
[SA27706] Gentoo update for vmware
[SA27705] Gentoo update for poppler, koffice, kword, kdegraphics, and
kpdf
[SA27704] Gentoo update for mozilla-thunderbird
[SA27702] Gentoo update for link-grammar
[SA27693] HP-UX update for JRE/JDK
[SA27780] rPath update for flac
[SA27761] IRC Services Denial of Service Vulnerability
[SA27754] I Hear U Multiple Denial of Service Vulnerabilities
[SA27745] Fedora update for cacti
[SA27743] Mandriva update for tetex
[SA27741] Gentoo update for pcre
[SA27728] Fedora update for emacs
[SA27724] Mandriva update for cups
[SA27721] Mandriva update for pdftohtml
[SA27718] Fedora update for tetex
[SA27703] rPath update for kernel
[SA27692] ngIRCd "JOIN" Denial of Service Vulnerability
[SA27742] Gentoo update for samba
[SA27731] Slackware update for samba
[SA27720] Mandriva update for samba
[SA27712] Debian update for cupsys
[SA27701] rPath update for samba
[SA27694] Ubuntu update for vmware
[SA27691] Red Hat update for samba
[SA27715] Gentoo update for bochs
[SA27753] Fedora update for phpmyadmin
[SA27746] Slackware update for libpng
[SA27732] SUSE update for apache2
[SA27727] Fedora update for tomcat5
[SA27695] Apple Mac OS X Application Firewall Weaknesses and Security
Issue
[SA27747] Avaya Products Kernel Multiple Vulnerabilities
[SA27740] Gentoo update for net-snmp
[SA27733] Fedora update for net-snmp
[SA27690] nss-mdns Denial of Service Vulnerability
[SA27689] Red Hat update for net-snmp
[SA27739] Gentoo update for feynmf
[SA27737] feynmf Insecure Temporary File Creation
[SA27710] OmniPCX Enterprise Communications Server IP Touch Phone Audio
Unavailability Weakness
[SA27771] Liferea Insecure LD_LIBRARY_PATH Privilege Escalation

Other:
[SA27696] HP-UX update for BIND 8
[SA27738] Linksys WAG54GS Cross-Site Scripting and Cross-Site Request
Forgery Vulnerabilities

Cross Platform:
[SA27767] TalkBack Multiple File Inclusion Vulnerabilities
[SA27723] datecomm "pg" File Inclusion Vulnerability
[SA27722] meBiblio "action" File Inclusion Vulnerability
[SA27708] Sciurus Hosting Panel Security Bypass and PHP Code Execution
[SA27698] phpBBViet "phpbb_root_path" File Inclusion Vulnerability
[SA27777] Wireshark Multiple Denial of Service Vulnerabilities
[SA27765] DevMass Shopping Cart "kfm_base_path" File Inclusion
[SA27762] IBM WebSphere Application Server Two Vulnerabilities
[SA27735] JP1/File Transmission Server/FTP Authentication Bypass and
DoS
[SA27730] ProfileCMS "id" SQL Injection Vulnerability
[SA27729] Rigs Of Rods Denial of Service Vulnerability
[SA27719] Cacti Unspecified SQL Injection Vulnerability
[SA27713] JiRo's Banner System "Email"/"Password" SQL Injection
[SA27711] LIVE555 Media Server "parseRTSPRequestString()" Denial of
Service
[SA27709] IceBB "X-Forwarded-For" SQL Injection
[SA27750] FileMaker Pro/Server Instant Web Publishing Cross-Site
Scripting
[SA27749] Feed2JS Feed URL Cross-Site Scripting
[SA27748] phpMyAdmin "convcharset" Cross-Site Scripting
[SA27752] IBM Director CIM Server Denial of Service Vulnerability
[SA27714] WordPress Cookies Security Bypass Weakness

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA27717] BitDefender Online Scanner ActiveX Control Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-11-21

Greg Linares has reported a vulnerability in BitDefender Online
Scanner, which can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/27717/

 --

[SA27779] VU Case Manager "default.asp" SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-11-22

Aria-Security.Net has reported some vulnerabilities in VU Case Manager,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/27779/

 --

[SA27774] GWExtranet Information Disclosure and Script Insertion
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of system information,
Exposure of sensitive information
Released:    2007-11-22

Joseph.giron13 has reported some vulnerabilities in GWExtranet, which
can be exploited by malicious people to disclose sensitive information,
and by malicious users to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/27774/

 --

[SA27758] VU Mass Mailer "redir.asp" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-11-22

Aria-Security.Net has reported a vulnerability in VU Mass Mailer, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27758/

 --

[SA27734] Lhaplus LZH Archive Processing Unspecified Buffer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-11-22

A vulnerability has been reported in Lhaplus, which can be exploited by
malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27734/

 --

[SA27700] Click&BaneX Two SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2007-11-20

Aria-Security Team have reported two vulnerabilities in Click&BaneX,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/27700/

 --

[SA27736] Ability Mail Server Unspecified IMAP4 Command Processing
Denial of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-11-21

A vulnerability has been reported in Ability Mail Server, which
potentially can be exploited by malicious users to cause a DoS (Denial
of Service).

Full Advisory:
http://secunia.com/advisories/27736/

 --

[SA27751] Invensys Wonderware InTouch Insecure NetDDE Share Permissions
Security Issue

Critical:    Less critical
Where:       From local network
Impact:      System access
Released:    2007-11-21

A security issue has been reported in Invensys Wonderware InTouch,
which potentially can be exploited by malicious users to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/27751/


UNIX/Linux:--

[SA27785] Apple Mail Command Execution Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-11-22

A vulnerability has been reported in Apple Mail, which can be exploited
by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27785/

 --

[SA27772] Debian update for kdegraphics

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-11-22

Debian has issued an update for kdegraphics. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/27772/

 --

[SA27744] Slackware update for mozilla-thunderbird

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-11-21

Slackware has issued an update for mozilla-thunderbird. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27744/

 --

[SA27716] SUSE update for java-1_5_0-ibm

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data, Exposure of system
information, Exposure of sensitive information, DoS, System access
Released:    2007-11-19

SUSE has issued an update for java-1_5_0-ibm. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, manipulate data, disclose
sensitive/system information, cause a DoS (Denial of Service), or
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27716/

 --

[SA27706] Gentoo update for vmware

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Privilege escalation, DoS, System access
Released:    2007-11-19

Gentoo has issued an update for vmware. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
bypass certain security restrictions, perform certain actions with
escalated privileges, or to cause a DoS (Denial of Service), by
malicious users to bypass certain security restrictions, and by
malicious people to cause a DoS (Denial of Service) or compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/27706/

 --

[SA27705] Gentoo update for poppler, koffice, kword, kdegraphics, and
kpdf

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-11-19

Gentoo has issued an update for poppler, koffice, kword, kdegraphics,
and kpdf. These fix some vulnerabilities, which can be exploited by
malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27705/

 --

[SA27704] Gentoo update for mozilla-thunderbird

Critical:    Highly critical
Where:       From remote
Impact:      System access, DoS
Released:    2007-11-19

Gentoo has issued an update for mozilla-thunderbird. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27704/

 --

[SA27702] Gentoo update for link-grammar

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-11-19

Gentoo has issued an update for link-grammar. This fixes a
vulnerability, which can be exploited by malicious people to compromise
an application using the library.

Full Advisory:
http://secunia.com/advisories/27702/

 --

[SA27693] HP-UX update for JRE/JDK

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data, Exposure of system
information, Exposure of sensitive information, System access
Released:    2007-11-16

HP has issued an update for JRE/JDK. This fixes some vulnerabilities,
which can be exploited by malicious people to bypass certain security
restrictions, manipulate data, disclose sensitive/system information,
or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27693/

 --

[SA27780] rPath update for flac

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-11-22

rPath has issued an update for flac. This fixes some vulnerabilities,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/27780/

 --

[SA27761] IRC Services Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-11-21

A vulnerability has been reported in IRC Services, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27761/

 --

[SA27754] I Hear U Multiple Denial of Service Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-11-21

Luigi Auriemma has reported some vulnerabilities in I Hear U, which can
be exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27754/

 --

[SA27745] Fedora update for cacti

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-11-22

Fedora has issued an update for cacti. This fixes a vulnerability,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/27745/

 --

[SA27743] Mandriva update for tetex

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information,
DoS, System access
Released:    2007-11-21

Mandriva has issued an update for tetex. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
disclose and manipulate sensitive information, and by malicious people
to potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27743/

 --

[SA27741] Gentoo update for pcre

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, DoS, System access
Released:    2007-11-21

Gentoo has issued an update for pcre. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service), disclose sensitive information, or potentially compromise an
application using the library.

Full Advisory:
http://secunia.com/advisories/27741/

 --

[SA27728] Fedora update for emacs

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-11-19

Fedora has issued an update for emacs. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/27728/

 --

[SA27724] Mandriva update for cups

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-11-20

Mandriva has issued an update for cups. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27724/

 --

[SA27721] Mandriva update for pdftohtml

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-11-19

Mandriva has issued an update for pdftohtml. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27721/

 --

[SA27718] Fedora update for tetex

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information,
DoS, System access
Released:    2007-11-21

Fedora has issued an update for tetex. This fixes some vulnerabilities,
which can be exploited by malicious, local users to disclose and
manipulate sensitive information and by malicious people to potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27718/

 --

[SA27703] rPath update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-11-22

rPath has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users and
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27703/

 --

[SA27692] ngIRCd "JOIN" Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-11-19

A vulnerability has been reported in ngIRCd, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27692/

 --

[SA27742] Gentoo update for samba

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-11-21

Gentoo has issued an update for samba. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/27742/

 --

[SA27731] Slackware update for samba

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-11-19

Slackware has issued an update for samba. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27731/

 --

[SA27720] Mandriva update for samba

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-11-19

Mandriva has issued an update for samba. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27720/

 --

[SA27712] Debian update for cupsys

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-11-19

Debian has issued an update for cupsys. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/27712/

 --

[SA27701] rPath update for samba

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-11-19

rPath has issued an update for samba. This fixes some vulnerabilities,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/27701/

 --

[SA27694] Ubuntu update for vmware

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2007-11-16

Ubuntu has issued an update for vmware. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27694/

 --

[SA27691] Red Hat update for samba

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-11-16

Red Hat has issued an update for samba. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27691/

 --

[SA27715] Gentoo update for bochs

Critical:    Moderately critical
Where:       Local system
Impact:      System access, DoS
Released:    2007-11-19

Gentoo has issued an update for bochs. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27715/

 --

[SA27753] Fedora update for phpmyadmin

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2007-11-22

Fedora has issued an update for phpmyadmin. This fixes some
vulnerabilities, which can be exploited by malicious users to conduct
script insertion and SQL injection attacks and by malicious people to
conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/27753/

 --

[SA27746] Slackware update for libpng

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-11-21

Slackware has issued an update for libpng. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27746/

 --

[SA27732] SUSE update for apache2

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, DoS
Released:    2007-11-20

SUSE has issued an update for apache2. This fixes some vulnerabilities,
which can be exploited by malicious, local users to cause a DoS (Denial
of Service), and by malicious people to conduct cross-site scripting
attacks or to cause a DoS.

Full Advisory:
http://secunia.com/advisories/27732/

 --

[SA27727] Fedora update for tomcat5

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of sensitive information
Released:    2007-11-19

Fedora has issued an update for tomcat5. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting attacks or to disclose potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/27727/

 --

[SA27695] Apple Mac OS X Application Firewall Weaknesses and Security
Issue

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-11-16

Some weaknesses and a security issue have been reported in Apple Mac OS
X, which can lead to exposure of certain services.

Full Advisory:
http://secunia.com/advisories/27695/

 --

[SA27747] Avaya Products Kernel Multiple Vulnerabilities

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass, Exposure of sensitive information, DoS
Released:    2007-11-21

Avaya has acknowledged some vulnerabilities, security issues, and a
weakness in various Avaya products, which can be exploited by
malicious, local users to cause a DoS (Denial of Service) and disclose
potentially sensitive information, and by malicious users and malicious
people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/27747/

 --

[SA27740] Gentoo update for net-snmp

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-11-21

Gentoo has issued an update for net-snmp. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/27740/

 --

[SA27733] Fedora update for net-snmp

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-11-21

Fedora has issued an update for net-snmp. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/27733/

 --

[SA27690] nss-mdns Denial of Service Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-11-22

A vulnerability has been reported in nss-mdns, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27690/

 --

[SA27689] Red Hat update for net-snmp

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-11-16

Red Hat has issued an update for net-snmp. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/27689/

 --

[SA27739] Gentoo update for feynmf

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-11-21

Gentoo has issued an update for feynmf. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/27739/

 --

[SA27737] feynmf Insecure Temporary File Creation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-11-21

A vulnerability has been reported in feynmf, which can be exploited by
malicious, local users to perform certain actions with escalated
privileges.

Full Advisory:
http://secunia.com/advisories/27737/

 --

[SA27710] OmniPCX Enterprise Communications Server IP Touch Phone Audio
Unavailability Weakness

Critical:    Not critical
Where:       From local network
Impact:      DoS
Released:    2007-11-20

A weakness has been reported in OmniPCX Enterprise Communications
Server, which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/27710/

 --

[SA27771] Liferea Insecure LD_LIBRARY_PATH Privilege Escalation

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-11-22

A security issue has been reported in Liferea, which can be exploited
by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/27771/


Other:--

[SA27696] HP-UX update for BIND 8

Critical:    Moderately critical
Where:       From remote
Impact:      Spoofing
Released:    2007-11-21

HP-UX has issued an update for BIND 8. This fixes a vulnerability,
which can be exploited by malicious people to poison the DNS cache.

Full Advisory:
http://secunia.com/advisories/27696/

 --

[SA27738] Linksys WAG54GS Cross-Site Scripting and Cross-Site Request
Forgery Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-11-21

Adrian Pastor has reported some vulnerabilities in Linksys WAG54GS,
which can be exploited by malicious people to conduct cross-site
scripting and cross-site request forgery attacks.

Full Advisory:
http://secunia.com/advisories/27738/


Cross Platform:--

[SA27767] TalkBack Multiple File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-11-22

NoGe has discovered some vulnerabilities in TalkBack, which can be
exploited by malicious people to disclose sensitive information or to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27767/

 --

[SA27723] datecomm "pg" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-11-19

VerY-SecReT has reported a vulnerability in datecomm, which can be
exploited by malicious people to disclose sensitive information or to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27723/

 --

[SA27722] meBiblio "action" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-11-19

ShAy6oOoN has discovered a vulnerability in meBiblio, which can be
exploited by malicious people to disclose sensitive information or to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27722/

 --

[SA27708] Sciurus Hosting Panel Security Bypass and PHP Code Execution

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, System access
Released:    2007-11-19

Liz0ziM has discovered two vulnerabilities in Sciurus Hosting Panel,
which can be exploited by malicious people to bypass certain security
restrictions and to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27708/

 --

[SA27698] phpBBViet "phpbb_root_path" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-11-19

xoron has discovered a vulnerability in phpBBViet, which can be
exploited by malicious people to disclose sensitive information or to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27698/

 --

[SA27777] Wireshark Multiple Denial of Service Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-11-22

Some vulnerabilities have been reported in Wireshark, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27777/

 --

[SA27765] DevMass Shopping Cart "kfm_base_path" File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-11-22

S.W.A.T. has reported a vulnerability in DevMass Shopping Cart, which
can be exploited by malicious people to disclose sensitive information
or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27765/

 --

[SA27762] IBM WebSphere Application Server Two Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, DoS
Released:    2007-11-22

Some vulnerabilities have been reported in IBM WebSphere Application
Server, one of which has an unknown impact, while the other can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27762/

 --

[SA27735] JP1/File Transmission Server/FTP Authentication Bypass and
DoS

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS
Released:    2007-11-22

Two vulnerabilities have been reported in JP1/File Transmission
Server/FTP, which can be exploited by malicious users to cause a DoS
(Denial of Service) and by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/27735/

 --

[SA27730] ProfileCMS "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-11-22

M.Hasran Addahroni has reported a vulnerability in ProfileCMS, which
can be exploited by malicious users to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27730/

 --

[SA27729] Rigs Of Rods Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-11-20

Luigi Auriemma has reported a vulnerability in Rigs of Rods, which can
be exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27729/

 --

[SA27719] Cacti Unspecified SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-11-19

A vulnerability has been reported in Cacti, which potentially can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27719/

 --

[SA27713] JiRo's Banner System "Email"/"Password" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-11-19

Some vulnerabilities have been reported in JiRo's Banner System, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27713/

 --

[SA27711] LIVE555 Media Server "parseRTSPRequestString()" Denial of
Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-11-19

Luigi Auriemma has reported a vulnerability in LIVE555 Media Server,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/27711/

 --

[SA27709] IceBB "X-Forwarded-For" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-11-19

Gu1ll4um3r0m41n has discovered a vulnerability in IceBB, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27709/

 --

[SA27750] FileMaker Pro/Server Instant Web Publishing Cross-Site
Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-11-21

A vulnerability has been reported in FileMaker Pro/Server, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/27750/

 --

[SA27749] Feed2JS Feed URL Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-11-21

A vulnerability has been reported in Feed2JS, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/27749/

 --

[SA27748] phpMyAdmin "convcharset" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-11-21

Tim Brown has discovered a vulnerability in phpMyAdmin, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/27748/

 --

[SA27752] IBM Director CIM Server Denial of Service Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-11-21

A vulnerability has been reported in IBM Director, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27752/

 --

[SA27714] WordPress Cookies Security Bypass Weakness

Critical:    Not critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-11-21

Steven J. Murdoch has discovered a weakness in WordPress, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/27714/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


__________________________________________________________________      
Visit InfoSec News
http://www.infosecnews.org/



This archive was generated by hypermail 2.1.3 : Sun Nov 25 2007 - 23:15:08 PST