======================================================================== The Secunia Weekly Advisory Summary 2007-11-29 - 2007-12-06 This week: 74 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: New blog entry: Vendors still use the "legal" weapon In these days, one would have believed that vendors have learned the lesson not to threaten with legal actions to withhold and suppress significant information about vulnerabilities in their products. Well, nonetheless, Secunia just received a sequel of letters from Autonomy, likely not known to many, but it is the software company that supplies the "Swiss Army Knife" in handling and opening documents in well known software like IBM Lotus Notes and Symantec Mail Security. ...[more information in the full blog]... Our response to these claims and accusations Despite Autonomy's unsubstantiated legal threats, Secunia will quite legally continue to do vulnerability research in Autonomy products and any other products of interest. Naturally, Secunia will also continue to publish research articles and advisories in an unbiased, balanced, accurate, and truthful manner as we serve one purpose only: To provide accurate and reliable Vulnerability Intelligence to our customers and the Internet in general. Secunia is in continuous, ongoing, and positive dialogues with most vendors including large professional organisations like Microsoft, IBM, Adobe, Symantec, Novell, Apple, and CA. All understand and respect the need for informing the public about vulnerabilities and prefer to co-ordinate and synchronise the publication with important Vulnerability Intelligence sources such as Secunia rather than battling to keep things secret. It is truly sad to see that certain vendors like Autonomy still behave like many software vendors did back in the previous millennium. Read more and see the correspondance: http://secunia.com/blog/15/ ======================================================================== 2) This Week in Brief: Some vulnerabilities have been acknowledged in Novell BorderManager, which can be exploited by malicious people to bypass certain security restrictions or compromise a vulnerable system. An unspecified error in Novell Client Trust can be exploited to execute arbitrary code. This may be related to a prior Secunia advisory in the same application reported early last month: http://secunia.com/advisories/27468/ An error in the handling of full-width and half-width unicode-encoded HTTP traffic can be exploited to bypass certain security controls. This may be related to a prior Secunia advisory on the same software reported in early September 2007: http://secunia.com/advisories/26698/ Novell also reports that proxy authentication and access controls are bypassed when requests come through another proxy. Patches are available in Support Pack5 Interim Release 1. Users are urged to apply updates as soon as possible. For more information: http://secunia.com/advisories/27963/ -- A highly critical vulnerability has been reported in avast! Home/Professional, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an error within the handling of specially crafted TAR files. This can be exploited to corrupt heap memory via certain unspecified TAR fields. The vendor has released a patch solving this vulnerability in versions prior to 4.7.1098. For more information: http://secunia.com/advisories/27929/ Secunia has constructed the Secunia Personal Software Inspector, which you can use to check if your personal system is vulnerable: https://psi.secunia.com/ Corporate users can request for a trial of the Secunia Network Software Inspector, which you can use to check which systems in your network are vulnerable: http://secunia.com/network_software_inspector/ -- A highly critical vulnerability has been reported in OpenOffice, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error in the HSQLDB database engine and can be exploited to execute arbitrary static Java code via a specially crafted database document. A fixed version is available for users. For more information: http://secunia.com/advisories/27928/ Secunia has constructed the Secunia Personal Software Inspector, which you can use to check if your personal system is vulnerable: https://psi.secunia.com/ Corporate users can request for a trial of the Secunia Network Software Inspector, which you can use to check which systems in your network are vulnerable: http://secunia.com/network_software_inspector/ -- A moderately critical vulnerability has been reported in Cisco Security Agent for Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. The vulnerability is caused by a boundary error in an unspecified system driver used by the application. This can be exploited to cause a buffer overflow via a specially crafted packet sent to port 139/TCP or 445/TCP, and successful exploitation may allow execution of arbitrary code. The vulnerability is reported in all versions of Cisco Security Agent for Windows. For more information: http://secunia.com/advisories/27947/ Corporate users are urged to request for a trial of the Secunia Network Software Inspector, which you can use to check which systems in your network are vulnerable: http://secunia.com/network_software_inspector/ -- VIRUS ALERTS: During the past week Secunia collected 171 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA27755] Apple QuickTime RTSP "Content-Type" Header Buffer Overflow 2. [SA27842] Linux Kernel "isdn_net_setcfg()" Buffer Overflow Vulnerability 3. [SA27863] rsync Two Security Bypass Vulnerabilities 4. [SA27875] FTP Admin Multiple Vulnerabilities 5. [SA27860] IBM Lotus Notes Client for Linux Insecure File Permissions 6. [SA27873] Asterisk Postgres Realtime Engine SQL Injection 7. [SA27827] Asterisk Call Detail Record Postgres SQL Injection 8. [SA27829] Cisco Unified IP Phone Extension Mobility Weakness 9. [SA27883] Hitachi JP1/Cm2/Network Node Manager Unspecified Cross-Site Scripting 10. [SA27872] rPath update for idle and python ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA27963] Novell BorderManager Multiple Vulnerabilities [SA27929] avast! Home/Professional TAR File Processing Heap Corruption [SA27930] HTTP File Server File Upload Directory Traversal Vulnerability [SA27923] Absolute News Manager .NET Multiple Vulnerabilities [SA27911] Snitz Forums 2000 "BuildTime" SQL Injection Vulnerability [SA27947] Cisco Security Agent Unspecified System Driver Buffer Overflow Vulnerability [SA27917] SonicWALL Global VPN Client Configuration File Format String Vulnerability [SA27901] Microsoft Web Proxy Auto-Discovery Feature Security Issue [SA27935] Citrix EdgeSight Configuration File Information Disclosure Weakness UNIX/Linux: [SA27944] SUSE update for MozillaFirefox [SA27933] Mandriva update for openssl [SA27931] Debian update for openoffice.org and hsqldb [SA27916] Red Hat update for openoffice.org2 [SA27914] Red Hat update for openoffice.org and hsqldb [SA27875] FTP Admin Multiple Vulnerabilities [SA27965] SUSE Update for Multiple Packages [SA27950] Gentoo update for cacti [SA27943] Debian update for wesnoth [SA27936] Ubuntu update for perl [SA27920] Fedora update for wesnoth [SA27919] Fedora update for kernel [SA27910] Squid Cache Update Denial of Service Vulnerability [SA27896] Slackware update for rsync [SA27891] Debian update for cacti [SA27888] SUSE update for kernel [SA27887] Ubuntu update for cairo [SA27880] Cairo PNG Image Processing Integer Overflow [SA27927] SUSE update for samba [SA27937] Ubuntu update for mono [SA27912] SUSE update for kernel [SA27892] Debian update for asterisk [SA27890] Red Hat update for htdig [SA27882] Mandriva update for apache [SA27879] FreeBSD sys_dev_random Random Data Replay Vulnerability [SA27915] Xen "mov_to_rr" Security Bypass Vulnerability [SA27913] Red Hat update for kernel [SA27899] Zsh difflog.pl Insecure Temporary Files [SA27897] Claws Mail sylprint.pl Insecure Temporary Files [SA27948] Debian update for zabbix [SA27903] Zabbix "UserParameter" Privilege Escalation Weakness [SA27952] Gentoo update for hugin [SA27939] OpenVMS for Integrity Servers Denial of Service Vulnerabilities [SA27921] Avaya Products Xterm Security Bypass Security Issue [SA27908] Linux Kernel "do_coredump()" Information Disclosure [SA27886] Mandriva update for vixie-cron [SA27884] Mac OS X Local Denial of Service Vulnerability [SA27877] Solaris 10 Linux Branded Zones Denial of Service Other: [SA27904] F5 FirePass 4100 SSL VPN Cross-Site Scripting Vulnerabilities [SA27898] Cisco IP Phone 7940 SIP INVITE Denial of Service Vulnerability [SA27926] Sun SPARC Enterprise XCP Firmware Denial Of Service Vulnerabilities [SA27945] Nokia N95 SIP Message Processing Denial of Service Weakness Cross Platform: [SA27928] OpenOffice Database Document Processing Unspecified Code Execution [SA27895] tellmatic "tm_includepath" File Inclusion Vulnerabilities [SA27878] VLC Media Player ActiveX Plugin and FLAC Vulnerabilities [SA27876] p.mapper "_SESSION[PM_INCPHP]" File Inclusion [SA27951] vbDrupal "taxonomy_select_nodes()" SQL Injection [SA27949] SineCms SQL Injection and Script Insertion [SA27932] Drupal "taxonomy_select_nodes()" SQL Injection [SA27924] HP Select Identity Unspecified Unauthorised Access Vulnerability [SA27909] Beehive Forum SQL Injection and Unspecified Vulnerabilities [SA27905] Typespeed Division By Zero Denial of Service [SA27881] Seditio "pag_sub[]" SQL Injection Vulnerability [SA27873] Asterisk Postgres Realtime Engine SQL Injection [SA27953] Drupal Shoutbox Module Script Insertion Vulnerabilities [SA27941] IBM Lotus Sametime Meeting WebRunMenuFrame Page Cross-Site Scripting [SA27925] Jetty Multiple Vulnerabilities [SA27918] Fusion News Cross-Site Request Forgery [SA27906] Apache HTTP Method Request Entity Too Large Cross-Site Scripting [SA27902] CiscoWorks Common Services Cross-Site Scripting Vulnerability [SA27900] IBM Tivoli Netcool Security Manager Unspecified Cross-Site Scripting [SA27889] e2fsprogs libext2fs Integer Overflow Vulnerabilities [SA27883] Hitachi JP1/Cm2/Network Node Manager Unspecified Cross-Site Scripting [SA27874] CRM-CTT "CheckCustomerAccess()" Security Bypass [SA27907] Firefox Charset Inheritance Cross-Site Scripting Security Issue ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA27963] Novell BorderManager Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Security Bypass, System access Released: 2007-12-06 Some vulnerabilities have been reported in Novell BorderManager, which can be exploited by malicious people to bypass certain security restrictions or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27963/ -- [SA27929] avast! Home/Professional TAR File Processing Heap Corruption Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-05 A vulnerability has been reported in avast! Home/Professional, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27929/ -- [SA27930] HTTP File Server File Upload Directory Traversal Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2007-12-06 Luigi Auriemma has reported a vulnerability in HTTP File Server, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27930/ -- [SA27923] Absolute News Manager .NET Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data, Exposure of system information, Exposure of sensitive information Released: 2007-12-05 Some vulnerabilities have been reported in Absolute News Manager .NET, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks, or to disclose sensitive information. Full Advisory: http://secunia.com/advisories/27923/ -- [SA27911] Snitz Forums 2000 "BuildTime" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-12-04 Soroush Dalili has discovered a vulnerability in Snitz Forums, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27911/ -- [SA27947] Cisco Security Agent Unspecified System Driver Buffer Overflow Vulnerability Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2007-12-06 A vulnerability has been reported in Cisco Security Agent for Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27947/ -- [SA27917] SonicWALL Global VPN Client Configuration File Format String Vulnerability Critical: Less critical Where: From remote Impact: System access Released: 2007-12-05 A vulnerability has been discovered in SonicWALL GLobal VPN Client, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/27917/ -- [SA27901] Microsoft Web Proxy Auto-Discovery Feature Security Issue Critical: Less critical Where: From remote Impact: Security Bypass, Exposure of sensitive information Released: 2007-12-04 A security issue has been reported in Microsoft's Web Proxy Auto-Discovery (WPAD) feature, which can be exploited by malicious people to conduct man-in-the-middle (MITM) attacks. Full Advisory: http://secunia.com/advisories/27901/ -- [SA27935] Citrix EdgeSight Configuration File Information Disclosure Weakness Critical: Not critical Where: Local system Impact: Exposure of sensitive information Released: 2007-12-05 A weakness has been reported in Citrix EdgeSight, which can be exploited by malicious, local users to disclose sensitive information. Full Advisory: http://secunia.com/advisories/27935/ UNIX/Linux:-- [SA27944] SUSE update for MozillaFirefox Critical: Highly critical Where: From remote Impact: Cross Site Scripting, DoS, System access Released: 2007-12-06 SUSE has issued an update for MozillaFirefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site request forgery and cross-site scripting attacks or potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/27944/ -- [SA27933] Mandriva update for openssl Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-12-05 Mandriva has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27933/ -- [SA27931] Debian update for openoffice.org and hsqldb Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-06 Debian has issued an update for openoffice.org and hsqldb. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/27931/ -- [SA27916] Red Hat update for openoffice.org2 Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-06 Red Hat has issued an update for openoffice.org2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/27916/ -- [SA27914] Red Hat update for openoffice.org and hsqldb Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-06 Red Hat has issued an update for openoffice.org and hsqldb. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/27914/ -- [SA27875] FTP Admin Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Exposure of system information, Exposure of sensitive information, System access Released: 2007-11-30 Omni has discovered some vulnerabilities in FTP Admin, which can be exploited by malicious users to compromise a vulnerable system, and by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/27875/ -- [SA27965] SUSE Update for Multiple Packages Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Exposure of sensitive information, DoS, System access Released: 2007-12-06 SUSE has issued an update for multiple packages. This fixes a security issue and some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, cause a DoS (Denial of Service), and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27965/ -- [SA27950] Gentoo update for cacti Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-12-06 Gentoo has issued an update for cacti. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27950/ -- [SA27943] Debian update for wesnoth Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2007-12-06 Debian has issued an update for wesnoth. This fixes a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/27943/ -- [SA27936] Ubuntu update for perl Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-12-05 Ubuntu has issued an update for perl. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27936/ -- [SA27920] Fedora update for wesnoth Critical: Moderately critical Where: From remote Impact: Exposure of system information, DoS, System access Released: 2007-12-04 Fedora has issued an update for wesnoth. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose potentially sensitive information, or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27920/ -- [SA27919] Fedora update for kernel Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-12-04 Fedora has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users and by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/27919/ -- [SA27910] Squid Cache Update Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-12-04 A vulnerability has been reported in Squid, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/27910/ -- [SA27896] Slackware update for rsync Critical: Moderately critical Where: From remote Impact: Security Bypass, DoS, System access Released: 2007-12-03 Slackware has issued an update for rsync. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27896/ -- [SA27891] Debian update for cacti Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-12-03 Debian has issued an update for cacti. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27891/ -- [SA27888] SUSE update for kernel Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-12-04 SUSE has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to cause a DoS and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27888/ -- [SA27887] Ubuntu update for cairo Critical: Moderately critical Where: From remote Impact: System access Released: 2007-12-04 Ubuntu has issued an update for cairo. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/27887/ -- [SA27880] Cairo PNG Image Processing Integer Overflow Critical: Moderately critical Where: From remote Impact: System access Released: 2007-11-30 A vulnerability has been reported in Cairo, which potentially can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/27880/ -- [SA27927] SUSE update for samba Critical: Moderately critical Where: From local network Impact: System access Released: 2007-12-06 SUSE has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27927/ -- [SA27937] Ubuntu update for mono Critical: Less critical Where: From remote Impact: System access, DoS Released: 2007-12-05 Ubuntu has issued an update for mono. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27937/ -- [SA27912] SUSE update for kernel Critical: Less critical Where: From remote Impact: Unknown, Security Bypass, Privilege escalation, DoS, System access Released: 2007-12-04 SUSE has issued an update for the kernel. This fixes a weakness, a security issue, and some vulnerabilities, where one has unknown impacts and others can be exploited by malicious, local users to bypass certain security restrictions, cause a DoS (Denial of Service), and gain escalated privileges, or by malicious people to cause a DoS or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27912/ -- [SA27892] Debian update for asterisk Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2007-12-03 Debian has issued an update for asterisk. This fixes a vulnerability, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27892/ -- [SA27890] Red Hat update for htdig Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-04 Red Hat has issued an update for htdig. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/27890/ -- [SA27882] Mandriva update for apache Critical: Less critical Where: From remote Impact: DoS Released: 2007-12-04 Mandriva has issued an update for apache. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/27882/ -- [SA27879] FreeBSD sys_dev_random Random Data Replay Vulnerability Critical: Less critical Where: From local network Impact: Exposure of sensitive information Released: 2007-11-30 A vulnerability has been reported in FreeBSD, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/27879/ -- [SA27915] Xen "mov_to_rr" Security Bypass Vulnerability Critical: Less critical Where: Local system Impact: Security Bypass Released: 2007-12-05 A vulnerability has been reported in Xen, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/27915/ -- [SA27913] Red Hat update for kernel Critical: Less critical Where: Local system Impact: Security Bypass, DoS Released: 2007-12-04 Red Hat has issued an update for the kernel. This fixes some security issues and vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/27913/ -- [SA27899] Zsh difflog.pl Insecure Temporary Files Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-12-03 A security issue has been reported in Zsh, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/27899/ -- [SA27897] Claws Mail sylprint.pl Insecure Temporary Files Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-12-03 A security issue has been reported in Claws Mail, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/27897/ -- [SA27948] Debian update for zabbix Critical: Not critical Where: From local network Impact: Privilege escalation Released: 2007-12-06 Debian has issued an update for zabbix. This fixes a weakness, which can be exploited by malicious users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/27948/ -- [SA27903] Zabbix "UserParameter" Privilege Escalation Weakness Critical: Not critical Where: From local network Impact: Privilege escalation Released: 2007-12-03 A weakness has been reported in Zabbix, which can be exploited by malicious users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/27903/ -- [SA27952] Gentoo update for hugin Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2007-12-06 Gentoo has issued an update for hugin. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/27952/ -- [SA27939] OpenVMS for Integrity Servers Denial of Service Vulnerabilities Critical: Not critical Where: Local system Impact: DoS Released: 2007-12-05 Some vulnerabilities have been reported in OpenVMS for Integrity Servers, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/27939/ -- [SA27921] Avaya Products Xterm Security Bypass Security Issue Critical: Not critical Where: Local system Impact: Security Bypass Released: 2007-12-05 Avaya has acknowledged a security issue in various Avaya products, which potentially can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/27921/ -- [SA27908] Linux Kernel "do_coredump()" Information Disclosure Critical: Not critical Where: Local system Impact: Exposure of sensitive information Released: 2007-12-05 A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/27908/ -- [SA27886] Mandriva update for vixie-cron Critical: Not critical Where: Local system Impact: DoS Released: 2007-12-04 Mandriva has issued an update for vixie-cron. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/27886/ -- [SA27884] Mac OS X Local Denial of Service Vulnerability Critical: Not critical Where: Local system Impact: DoS Released: 2007-12-05 A vulnerability has been discovered in Mac OS X, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/27884/ -- [SA27877] Solaris 10 Linux Branded Zones Denial of Service Critical: Not critical Where: Local system Impact: DoS Released: 2007-12-03 A vulnerability has been reported in Solaris 10, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/27877/ Other:-- [SA27904] F5 FirePass 4100 SSL VPN Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-03 Some vulnerabilities have been reported in F5 FirePass 4100 SSL VPN, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/27904/ -- [SA27898] Cisco IP Phone 7940 SIP INVITE Denial of Service Vulnerability Critical: Less critical Where: From remote Impact: DoS Released: 2007-12-06 The Madynes research team has reported a vulnerability in Cisco IP Phone 7940, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/27898/ -- [SA27926] Sun SPARC Enterprise XCP Firmware Denial Of Service Vulnerabilities Critical: Less critical Where: From local network Impact: DoS Released: 2007-12-05 Some vulnerabilities have been reported in the XSCF Control Package (XCP) firmware for Sun SPARC Enterprise M4000/M5000/M8000/M9000, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/27926/ -- [SA27945] Nokia N95 SIP Message Processing Denial of Service Weakness Critical: Not critical Where: From remote Impact: DoS Released: 2007-12-06 Humberto J. Abdelnur, Radu State, and Olivier Festor have reported a weakness in Nokia N95, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/27945/ Cross Platform:-- [SA27928] OpenOffice Database Document Processing Unspecified Code Execution Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-05 A vulnerability has been reported in OpenOffice, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/27928/ -- [SA27895] tellmatic "tm_includepath" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-03 ShAy6oOoN has discovered some vulnerabilities in tellmatic, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27895/ -- [SA27878] VLC Media Player ActiveX Plugin and FLAC Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-12-03 Some vulnerabilities have been reported in VLC Media Player, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/27878/ -- [SA27876] p.mapper "_SESSION[PM_INCPHP]" File Inclusion Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2007-12-03 ShAy6oOoN has reported a vulnerability in p.mapper, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27876/ -- [SA27951] vbDrupal "taxonomy_select_nodes()" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-12-06 A vulnerability has been reported in vbDrupal, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27951/ -- [SA27949] SineCms SQL Injection and Script Insertion Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data, Exposure of sensitive information Released: 2007-12-06 KiNgOfThEwOrLd has discovered some vulnerabilities in SineCms, which can be exploited by malicious people to conduct script insertion and SQL injection attacks. Full Advisory: http://secunia.com/advisories/27949/ -- [SA27932] Drupal "taxonomy_select_nodes()" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-12-06 A vulnerability has been reported in Drupal, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27932/ -- [SA27924] HP Select Identity Unspecified Unauthorised Access Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2007-12-05 A vulnerability has been reported in HP Select Identity, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/27924/ -- [SA27909] Beehive Forum SQL Injection and Unspecified Vulnerabilities Critical: Moderately critical Where: From remote Impact: Unknown, Manipulation of data, Exposure of sensitive information Released: 2007-12-04 Some vulnerabilities have been reported in Beehive Forum, some with unknown impact and one which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27909/ -- [SA27905] Typespeed Division By Zero Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-12-03 A vulnerability has been reported in Typespeed, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/27905/ -- [SA27881] Seditio "pag_sub[]" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-11-30 InATeam have discovered a vulnerability in Seditio, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27881/ -- [SA27873] Asterisk Postgres Realtime Engine SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-11-30 A vulnerability has been reported in Asterisk, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27873/ -- [SA27953] Drupal Shoutbox Module Script Insertion Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-06 Some vulnerabilities have been reported in the Shoutbox module for Drupal, which can be exploited by malicious users to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/27953/ -- [SA27941] IBM Lotus Sametime Meeting WebRunMenuFrame Page Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-06 A vulnerability has been reported in IBM Lotus Sametime, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/27941/ -- [SA27925] Jetty Multiple Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting, Hijacking Released: 2007-12-05 Some vulnerabilities have been reported in Jetty, which can be exploited by malicious people to conduct HTTP response splitting and cross-site scripting attacks and potentially hijack a user session. Full Advisory: http://secunia.com/advisories/27925/ -- [SA27918] Fusion News Cross-Site Request Forgery Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-06 A vulnerability has been reported in Fusion News, which can be exploited by malicious users to conduct cross-site request forgery attacks. Full Advisory: http://secunia.com/advisories/27918/ -- [SA27906] Apache HTTP Method Request Entity Too Large Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-03 Adrian Pastor and Amir Azam have discovered a vulnerability in Apache, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/27906/ -- [SA27902] CiscoWorks Common Services Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-06 Dave Lewis has reported a vulnerability in CiscoWorks Common Services, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/27902/ -- [SA27900] IBM Tivoli Netcool Security Manager Unspecified Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-03 A vulnerability has been reported in IBM Tivoli Netcool Security Manager, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/27900/ -- [SA27889] e2fsprogs libext2fs Integer Overflow Vulnerabilities Critical: Less critical Where: From remote Impact: DoS, System access Released: 2007-12-06 Some vulnerabilities have been reported in the libext2fs library of e2fsprogs, which potentially can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/27889/ -- [SA27883] Hitachi JP1/Cm2/Network Node Manager Unspecified Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-11-30 A vulnerability has been reported in Hitachi JP1/Cm2/Network Node Manager, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/27883/ -- [SA27874] CRM-CTT "CheckCustomerAccess()" Security Bypass Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-12-03 A security issue has been reported in CRM-CTT, which can be exploited by malicious users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/27874/ -- [SA27907] Firefox Charset Inheritance Cross-Site Scripting Security Issue Critical: Not critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-04 Paul Szabo has discovered a security issue in Firefox, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/27907/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 __________________________________________________________________ Visit InfoSec News http://www.infosecnews.org/
This archive was generated by hypermail 2.1.3 : Thu Dec 06 2007 - 23:24:55 PST