======================================================================== The Secunia Weekly Advisory Summary 2007-11-22 - 2007-11-29 This week: 55 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=summary_sm ======================================================================== 2) This Week in Brief: A vulnerability in Apple QuickTime, which can be exploited by malicious people to compromise a user's system. The extremely vulnerability, which is unpatched, is currently being exploited and has a number of attack vectors, including via plug-ins, and QTL file download. The vulnerability is caused due to a boundary error when processing RTSP replies and can be exploited to cause a stack-based buffer overflow via a specially crafted RTSP reply containing an overly long "Content-Type" header. Successful exploitation allows execution of arbitrary code and requires that the user is, for example, tricked into opening a malicious QTL file or visiting a malicious web site. The vulnerability is confirmed in version 7.3. Users are urged to avoid browsing untrusted sites and, following untrusted links, and opening untrusted QTL files. For more information, refer to: http://secunia.com/advisories/27755/ -- Secunia Research has discovered several vulnerabilities in Symantec Backup Exec for Windows servers. These vulnerabilities are rated as "Less critical" by Secunia because they can only be exploited by malicious people from the local network to cause a Denial of Service (DoS). A NULL-pointer dereference error in the Backup Exec Job Engine service (bengine.exe) when handling exceptions can be exploited to crash the service by sending a specially crafted packet to default port 5633/TCP. Two integer overflow errors within the Backup Exec Job Engine service can be exploited to cause the service to enter an infinite loop and exhaust all available memory or consume large amounts of CPU resource by sending a specially crafted packet to default port 5633/TCP. The vulnerabilities are confirmed in Symantec Backup Exec for Windows Servers version 11d build 11.0.7170 and also affect version 11d build 11.0.6.6235. Symantec has released hotfixes for both affected versions. For more information, refer to: http://secunia.com/advisories/26975/ Corporate users can request for a trial of the Secunia Network Software Inspector, which you can use to check which systems in your network are vulnerable: http://secunia.com/network_software_inspector/ -- Some vulnerabilities were reported this week in IBM Lotus Notes, which can be exploited by malicious people to compromise a user's system. The vulnerabilities are caused due to boundary errors within the Lotus 1-2-3 file viewer (l123sr.dll), and can be exploited to cause buffer overflows by tricking a user into viewing a specially crafted Lotus 1-2-3 attachment with, for example, a specially crafted type SRANGE record. Successful exploitation allows execution of arbitrary code. The vulnerabilities reportedly affect versions 7.0 and 8.0. The vendor has supplied patches for both affected versions. For more information, refer to: http://secunia.com/advisories/27835/ Corporate users can request for a trial of the Secunia Network Software Inspector, which you can use to check which systems in your network are vulnerable: http://secunia.com/network_software_inspector/ -- Mozilla has released version 2.0.0.10 of the Firefox browser. This release fixes some vulnerabilities in Mozilla Firefox, which can be exploited by malicious people to conduct cross-site request forgery attacks and potentially compromise a user's system. A race condition when setting the "window.location" property can be exploited to generate a fake HTTP Referer header, which can be used to conduct cross-site request forgery attacks. Some errors within the XBL component, the "drawImage()" function, and the "nsCSSFrameConstructor" can be exploited to cause memory corruption and potentially allow execution of arbitrary code. This release also fixed a security issue disclosed in early November regarding "jar:" protocol handling. Users are urged to upgrade to the latest version of Mozilla Firefox to fix these vulnerabilities. For more information, refer to: http://secunia.com/advisories/27725/ http://secunia.com/advisories/27605/ Secunia has constructed the Secunia Personal Software Inspector, which you can use to check if your personal system is vulnerable: https://psi.secunia.com/ Corporate users can request for a trial of the Secunia Network Software Inspector, which you can use to check which systems in your network are vulnerable: http://secunia.com/network_software_inspector/ -- VIRUS ALERTS: During the past week Secunia collected 193 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA27755] Apple QuickTime RTSP "Content-Type" Header Buffer Overflow 2. [SA27785] Apple Mail Command Execution Vulnerability 3. [SA27725] Mozilla Firefox Multiple Vulnerabilities 4. [SA27777] Wireshark Multiple Denial of Service Vulnerabilities 5. [SA27787] Debian update for samba 6. [SA27756] SUSE Update for Multiple Packages 7. [SA27789] Gadu-Gadu "emots.txt" Buffer Overflow Vulnerability 8. [SA27778] MySpace Scripts Poll Creator Script Insertion Vulnerabilities 9. [SA27765] DevMass Shopping Cart "kfm_base_path" File Inclusion 10. [SA27782] K+B-Bestellsystem "domain"/"tld" Command Execution Vulnerabilities ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA27849] Autonomy Keyview SDK Lotus 1-2-3 File Viewer Buffer Overflows [SA27836] IBM Lotus Notes 5 / 6 Lotus 1-2-3 File Viewer Buffer Overflows [SA27835] IBM Lotus Notes Lotus 1-2-3 File Viewer Buffer Overflows [SA27822] DWD Realty Two SQL Injection Vulnerabilities [SA27813] NetAuctionHelp Classified Ads Two SQL Injection Vulnerabilities [SA27812] Dora Emlak Script Multiple SQL Injection Vulnerabilities [SA27811] SafeNet Sentinel Protection Server/Key Server Directory Traversal Vulnerability [SA27803] E-Lite POS Login SQL Injection Vulnerability and User Enumeration [SA27798] My-Time Two SQL Injection Vulnerabilities UNIX/Linux: [SA27856] rPath update for cups, poppler, and tetex [SA27855] Fedora update for firefox [SA27845] Slackware update for firefox [SA27804] Red Hat update for java-1.5.0-ibm [SA27797] Red Hat update for firefox [SA27796] Ubuntu update for firefox [SA27817] Debian update for wireshark [SA27806] Debian update for tk8.3 [SA27801] Debian update for tk8.4 [SA27857] Mandriva update for cpio [SA27818] Debian update for ruby1.9 [SA27830] Samhain Random Number Generator Weakness [SA27823] Debian update for mysql-dfsg, mysql-dfsg-5.0, and mysql-dfsg-4.1 [SA27860] IBM Lotus Notes Client for Linux Insecure File Permissions [SA27847] Fedora scanbuttond Insecure Temporary Files [SA27841] Audacity Insecure Temporary Files [SA27858] Ubuntu update for pidgin [SA27799] Fedora update for blam Other: [SA27870] Avaya Products OpenSSL Vulnerabilities [SA27869] Avaya Products PCRE Regex Parsing Multiple Vulnerabilities [SA27862] Avaya Products PCRE Character Class Processing Vulnerability [SA27832] Sun Solaris libTIFF Multiple Vulnerabilities [SA27829] Cisco Unified IP Phone Extension Mobility Weakness [SA27831] Sun Solaris Remote Procedure Call Module Denial of Service Cross Platform: [SA27854] Charray's CMS "ccms_library_path" File Inclusion [SA27852] PHP_CON "webappcfg[APPPATH]" File Inclusion [SA27800] Netscape Multiple Vulnerabilities [SA27866] TuMusika Evolution Multiple Vulnerabilities [SA27848] GNUMP3d Authentication Bypass Security Issue [SA27843] wpQuiz Two SQL Injection Vulnerabilities [SA27825] Ruby-GNOME2 "Gtk::MessageDialog.new()" Format String Vulnerability [SA27820] Project Alumni Multiple Vulnerabilities [SA27816] SeaMonkey Multiple Vulnerabilities [SA27815] Amber Script "id" Local File Inclusion Vulnerability [SA27810] PHP-Nuke NSN Script Depository Module Information Disclosure [SA27808] Softbiz Freelancers Cross-Site Scripting and SQL Injection [SA27837] @Mail "func" Cross-Site Scripting Vulnerability [SA27834] Basic Analysis and Security Engine "base_qry_main.php" Cross-Site Scripting [SA27828] PHPDevShell Privilege Escalation Vulnerability [SA27826] FMDeluxe "id" Cross-Site Scripting Vulnerability [SA27821] Liferay Portal "emailAddress" Cross-Site Scripting [SA27814] vBTube "search" Cross-Site Scripting Vulnerability [SA27809] PHPSlideshow "directory" Cross-Site Scripting [SA27807] JAF CMS Two Cross-Site Scripting Vulnerabilities [SA27833] ManageEngine EventLog Analyzer Insecure MySQL Installation [SA27840] BEA AquaLogic Interaction Plumtree Portal Information Disclosure ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA27849] Autonomy Keyview SDK Lotus 1-2-3 File Viewer Buffer Overflows Critical: Highly critical Where: From remote Impact: System access Released: 2007-11-29 Some vulnerabilities have been reported in Autonomy Keyview SDK, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/27849/ -- [SA27836] IBM Lotus Notes 5 / 6 Lotus 1-2-3 File Viewer Buffer Overflows Critical: Highly critical Where: From remote Impact: System access Released: 2007-11-27 Some vulnerabilities have been reported in IBM Lotus Notes, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/27836/ -- [SA27835] IBM Lotus Notes Lotus 1-2-3 File Viewer Buffer Overflows Critical: Highly critical Where: From remote Impact: System access Released: 2007-11-27 Some vulnerabilities have been reported in IBM Lotus Notes, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/27835/ -- [SA27822] DWD Realty Two SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data Released: 2007-11-27 Aria-Security Team have reported two vulnerabilities in DWD Realty, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27822/ -- [SA27813] NetAuctionHelp Classified Ads Two SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-11-27 Aria-Security Team have reported two vulnerabilities in NetAuctionHelp Classified Ads, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27813/ -- [SA27812] Dora Emlak Script Multiple SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-11-26 GeFORC3 has reported some vulnerabilities in Dora Emlak Script, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27812/ -- [SA27811] SafeNet Sentinel Protection Server/Key Server Directory Traversal Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-11-27 A vulnerability has been reported in SafeNet Sentinel Protection Server and Key Server, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/27811/ -- [SA27803] E-Lite POS Login SQL Injection Vulnerability and User Enumeration Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of system information Released: 2007-11-26 A vulnerability and a weakness have been reported in E-Lite POS, which can be exploited by malicious people to enumerate valid user accounts or conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27803/ -- [SA27798] My-Time Two SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data Released: 2007-11-26 Aria-Security Team have reported two vulnerabilities in My-Time (Timesheet), which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27798/ UNIX/Linux:-- [SA27856] rPath update for cups, poppler, and tetex Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-11-29 rPath has issued an update for cups, poppler, and tetex. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27856/ -- [SA27855] Fedora update for firefox Critical: Highly critical Where: From remote Impact: Cross Site Scripting, DoS, System access Released: 2007-11-29 Fedora has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks or potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/27855/ -- [SA27845] Slackware update for firefox Critical: Highly critical Where: From remote Impact: Cross Site Scripting, DoS, System access Released: 2007-11-28 Slackware has issued an update for firefox. This fixes a security issue and some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks or potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/27845/ -- [SA27804] Red Hat update for java-1.5.0-ibm Critical: Highly critical Where: From remote Impact: Security Bypass, Manipulation of data, Exposure of system information, Exposure of sensitive information, System access Released: 2007-11-28 Red Hat has issued an update for java-1.5.0-ibm. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, manipulate data, disclose sensitive/system information, or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27804/ -- [SA27797] Red Hat update for firefox Critical: Highly critical Where: From remote Impact: Cross Site Scripting, DoS, System access Released: 2007-11-27 Red Hat has issued an update for firefox. This fixes a security issue and some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/27797/ -- [SA27796] Ubuntu update for firefox Critical: Highly critical Where: From remote Impact: Cross Site Scripting, DoS, System access Released: 2007-11-27 Ubuntu has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/27796/ -- [SA27817] Debian update for wireshark Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-11-27 Debian has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/27817/ -- [SA27806] Debian update for tk8.3 Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-11-28 Debian has issued an update for tk8.3. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/27806/ -- [SA27801] Debian update for tk8.4 Critical: Moderately critical Where: From remote Impact: System access Released: 2007-11-28 Debian has issued an update for tk8.4. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/27801/ -- [SA27857] Mandriva update for cpio Critical: Less critical Where: From remote Impact: DoS, System access Released: 2007-11-29 Mandriva has issued an update for cpio. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system. Full Advisory: http://secunia.com/advisories/27857/ -- [SA27818] Debian update for ruby1.9 Critical: Less critical Where: From remote Impact: Spoofing Released: 2007-11-26 Debian has issued an update for ruby1.9. This fixes some security issues, which can be exploited by malicious people to conduct spoofing attacks. Full Advisory: http://secunia.com/advisories/27818/ -- [SA27830] Samhain Random Number Generator Weakness Critical: Less critical Where: From local network Impact: Brute force, Exposure of sensitive information Released: 2007-11-27 A weakness has been reported in Samhain, which can be exploited by malicious people to disclose potentially sensitive information and to perform brute force attacks. Full Advisory: http://secunia.com/advisories/27830/ -- [SA27823] Debian update for mysql-dfsg, mysql-dfsg-5.0, and mysql-dfsg-4.1 Critical: Less critical Where: From local network Impact: Security Bypass, Privilege escalation, DoS Released: 2007-11-27 Debian has issued an update for mysql-dfsg, mysql-dfsg-5.0, and mysql-dfsg-4.1. This fixes some security issues and vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions, gain escalated privileges, or cause a DoS (Denial of Service), and by malicious people to cause a DoS. Full Advisory: http://secunia.com/advisories/27823/ -- [SA27860] IBM Lotus Notes Client for Linux Insecure File Permissions Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-11-29 Some security issues have been reported in Lotus Notes for Linux, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/27860/ -- [SA27847] Fedora scanbuttond Insecure Temporary Files Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-11-28 Michal Jaegermann has reported a security issue in Fedora, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/27847/ -- [SA27841] Audacity Insecure Temporary Files Critical: Less critical Where: Local system Impact: Manipulation of data, DoS Released: 2007-11-28 Viktor Griph has reported a security issue in Audacity, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or to delete arbitrary files and directories. Full Advisory: http://secunia.com/advisories/27841/ -- [SA27858] Ubuntu update for pidgin Critical: Not critical Where: From remote Impact: DoS Released: 2007-11-29 Ubuntu has issued an update for pidgin. This fixes a weakness, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/27858/ -- [SA27799] Fedora update for blam Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2007-11-27 Fedora has issued an update for blam. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/27799/ Other:-- [SA27870] Avaya Products OpenSSL Vulnerabilities Critical: Highly critical Where: From remote Impact: Exposure of sensitive information, System access Released: 2007-11-29 Avaya has acknowledged a vulnerability and a weakness in various Avaya products, which can be exploited by malicious, local users to disclose sensitive information and by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27870/ -- [SA27869] Avaya Products PCRE Regex Parsing Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-11-29 Avaya has acknowledged some vulnerabilities in various Avaya products, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/27869/ -- [SA27862] Avaya Products PCRE Character Class Processing Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-11-29 Avaya has acknowledged a vulnerability in various Avaya products, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27862/ -- [SA27832] Sun Solaris libTIFF Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-11-29 Sun has acknowledged some vulnerabilities in Sun Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27832/ -- [SA27829] Cisco Unified IP Phone Extension Mobility Weakness Critical: Not critical Where: From local network Impact: Security Bypass Released: 2007-11-29 Joffrey Czarney has reported a weakness in Cisco Unified IP Phones, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/27829/ -- [SA27831] Sun Solaris Remote Procedure Call Module Denial of Service Critical: Not critical Where: Local system Impact: DoS Released: 2007-11-29 Sun has acknowledged a vulnerability in Sun Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/27831/ Cross Platform:-- [SA27854] Charray's CMS "ccms_library_path" File Inclusion Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2007-11-29 MhZ91 has discovered two vulnerabilities in Charray's CMS, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27854/ -- [SA27852] PHP_CON "webappcfg[APPPATH]" File Inclusion Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2007-11-29 GoLd_M has reported a vulnerability in PHP_CON, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27852/ -- [SA27800] Netscape Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Cross Site Scripting, DoS, System access Released: 2007-11-28 Netscape has acknowledged some vulnerabilities in Netscape Navigator, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks or potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/27800/ -- [SA27866] TuMusika Evolution Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-11-29 Some vulnerabilities have been discovered in TuMusika Evolution, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/27866/ -- [SA27848] GNUMP3d Authentication Bypass Security Issue Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2007-11-28 James has reported a security issue in GNUMP3d, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/27848/ -- [SA27843] wpQuiz Two SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-11-28 Kacper has discovered two vulnerabilities in wpQuiz, which can be exploited by malicious people and malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27843/ -- [SA27825] Ruby-GNOME2 "Gtk::MessageDialog.new()" Format String Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-11-28 Chris Rohlf has reported a vulnerability in Ruby-GNOME2, which can potentially be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/27825/ -- [SA27820] Project Alumni Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data, Exposure of system information, Exposure of sensitive information Released: 2007-11-26 tomplixsee has discovered some vulnerabilities in Project Alumni, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks and to disclose sensitive information. Full Advisory: http://secunia.com/advisories/27820/ -- [SA27816] SeaMonkey Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, DoS, System access Released: 2007-11-27 Some vulnerabilities have been reported in Mozilla SeaMonkey, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/27816/ -- [SA27815] Amber Script "id" Local File Inclusion Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-11-26 Crackers_Child has reported a vulnerability in Amber Script, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/27815/ -- [SA27810] PHP-Nuke NSN Script Depository Module Information Disclosure Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-11-27 KiNgOfThEwOrLd has discovered a vulnerability in the NSN Script Depository module for PHP-Nuke, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/27810/ -- [SA27808] Softbiz Freelancers Cross-Site Scripting and SQL Injection Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2007-11-29 IRCRASH (Dr.Crash) has reported some vulnerabilities in Softbiz Freelancers Script, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/27808/ -- [SA27837] @Mail "func" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-11-29 A vulnerability has been reported in @Mail, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/27837/ -- [SA27834] Basic Analysis and Security Engine "base_qry_main.php" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-11-27 Two vulnerabilities have been reported in Base Analysis and Security Engine, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/27834/ -- [SA27828] PHPDevShell Privilege Escalation Vulnerability Critical: Less critical Where: From remote Impact: Privilege escalation Released: 2007-11-28 A vulnerability has been reported in PHPDevShell, which can be exploited by malicious users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/27828/ -- [SA27826] FMDeluxe "id" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-11-27 Jose Luis Gngora Fernndez has discovered a vulnerability in FMDeluxe, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/27826/ -- [SA27821] Liferay Portal "emailAddress" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-11-28 Joshua Morin has reported a vulnerability in Liferay Portal, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/27821/ -- [SA27814] vBTube "search" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-11-28 Crackers_Child has reported a vulnerability in vBTube, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/27814/ -- [SA27809] PHPSlideshow "directory" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-11-26 Jose Luis Gngora Fernndez has discovered a vulnerability in PHPSlideshow, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/27809/ -- [SA27807] JAF CMS Two Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-11-26 lammat has discovered two vulnerabilities in JAF CMS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/27807/ -- [SA27833] ManageEngine EventLog Analyzer Insecure MySQL Installation Critical: Less critical Where: From local network Impact: Security Bypass Released: 2007-11-28 A security issue has been reported in ManageEngine EventLog Analyzer, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/27833/ -- [SA27840] BEA AquaLogic Interaction Plumtree Portal Information Disclosure Critical: Not critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-11-28 Adrian Pastor and Jan Fry have reported some weaknesses in BEA AquaLogic Interaction, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/27840/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 __________________________________________________________________ Visit InfoSec News http://www.infosecnews.org/
This archive was generated by hypermail 2.1.3 : Fri Nov 30 2007 - 01:20:17 PST