======================================================================== The Secunia Weekly Advisory Summary 2007-12-06 - 2007-12-13 This week: 100 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=summary_sm ======================================================================== 2) This Week in Brief: Secunia Research has discovered a vulnerability in Samba, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused by a boundary error within the "send_mailslot()" function. This can be exploited to cause a stack-based buffer overflow with zero bytes via a specially crafted "SAMLOGON" domain logon packet containing a username string placed at an odd offset followed by an overly long GETDC string. Successful exploitation allows execution of arbitrary code, but requires that the "domain logons" option is enabled. The vulnerability is confirmed in version 3.0.27a and is fixed in version 3.0.28. The vendor has also released a patch for 3.0.27a. For more information: http://secunia.com/advisories/27760/ -- Some vulnerabilities have been discovered in the MPEG-4 format from 3ivx, which can be exploited by malicious people to compromise a user's system. The vulnerabilities are caused due to boundary errors in 3ivxDSMediaSplitter.ax when processing certain atoms ("art", "nam", "cmt", "des", and "cpy") in MP4 files. These can be exploited to cause stack-based buffer overflows via a specially crafted MP4 file. Successful exploitation allows execution of arbitrary code. The vulnerabilities are confirmed in version 5.0.1 of the file, with the following applications as attack vectors: * Windows Media Player version 6.4.09.1130 (mplayer2.exe) * Media Player Classic version 6.4.9.0 Other versions and applications may also be affected. The vulnerabilities are currently unpatched. For more information: http://secunia.com/advisories/27998/ -- Microsoft released its last batch of Security Bulletins for the year. Seven Security Bulletins were released, with one Extremely Critical advisory, two Highly Critical advisories, two Moderately Critical advisories, and two Less Critical advisories. The Extremely Critical advisory discusses a cumulative update for Internet Explorer. One of the vulnerabilities discussed in the advisory is reportedly currently being exploited to execute arbitrary code. For more information: http://secunia.com/advisories/28036/ Several highly critical vulnerabilities in the Windows Media Format Runtime / Windows Media Services were also disclosed, which could be exploited to execute arbitrary code. For more information: http://secunia.com/advisories/28034/ Two highly critical vulnerabilities in Microsoft DirectX were also reported, which could be exploited to execute arbitrary code. For more information: http://secunia.com/advisories/28010/ Two moderately critical vulnerabilities, one in the Message Queuing Service (MSMQ) in Windows, and another in Vista SMBv2 signing, can be exploited to cause arbitrary code, but requires that the MSMQ component is installed (not the default setting), and SMBv2 is enabled (not the default setting), respectively. For more information: http://secunia.com/advisories/28051/ http://secunia.com/advisories/27997/ Two less critical vulnerabilities, one in Windows Advanced Local Procedure Call (ALPC) in Vista, and another in Message Queuing Service (MSMQ) can be exploited to allow malicious, local users to gain escalated privileges. For more information: http://secunia.com/advisories/28015/ http://secunia.com/advisories/28011/ Users are urged to run Windows Updates as soon as possible. Secunia has constructed the Secunia Personal Software Inspector, which you can use to check if your personal system is vulnerable: https://psi.secunia.com/ Corporate users can request for a trial of the Secunia Network Software Inspector, which you can use to check which systems in your network are vulnerable: http://secunia.com/network_software_inspector/ -- VIRUS ALERTS: During the past week Secunia collected 257 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA27934] Skype skype4com URI Handler Buffer Overflow 2. [SA28036] Internet Explorer Multiple Code Execution Vulnerabilities 3. [SA27938] Mac OS X vpnd Denial of Service Vulnerability 4. [SA27947] Cisco Security Agent Unspecified System Driver Buffer Overflow Vulnerability 5. [SA27945] Nokia N95 SIP Message Processing Denial of Service Weakness 6. [SA27889] e2fsprogs libext2fs Integer Overflow Vulnerabilities 7. [SA27941] IBM Lotus Sametime Meeting WebRunMenuFrame Page Cross-Site Scripting 8. [SA27964] HP OpenView Network Node Manager Multiple Vulnerabilities 9. [SA27965] SUSE Update for Multiple Packages 10. [SA27898] Cisco IP Phone 7940 SIP INVITE Denial of Service Vulnerability ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA28036] Internet Explorer Multiple Code Execution Vulnerabilities [SA27992] JustSystems Ichitaro Document Processing Buffer Overflow [SA28055] HP Info Center HPInfo Class ActiveX Control Insecure Methods [SA28034] Windows Media Format Runtime ASF Parsing Vulnerabilities [SA28031] BadBlue Multiple Vulnerabilities [SA28010] Microsoft DirectX SAMI/WAV/AVI File Parsing Vulnerabilities [SA27998] 3ivx MPEG-4 MP4 File Processing Buffer Overflows [SA28038] Trend Micro Products UUE File Parsing Buffer Overflow [SA28032] BarracudaDrive Web Server Multiple Vulnerabilities [SA28007] Easy File Sharing Web Server Multiple Vulnerabilities [SA27976] PenPal Three SQL Injection Vulnerabilities [SA28051] Microsoft Windows Message Queuing Buffer Overflow [SA27997] Microsoft Windows Vista SMBv2 Signing Vulnerability [SA28019] Websense "username" Cross-Site Scripting Vulnerability [SA28015] Windows Vista Kernel Legacy Reply Path Validation Privilege Escalation [SA28011] Microsoft Windows Message Queuing Privilege Escalation [SA28072] Kerio WinRoute Firewall Proxy Server Unspecified Security Bypass UNIX/Linux: [SA28068] Sun Solaris update for Adobe Flash Player [SA28056] Red Hat update for java-1.4.2-bea [SA28043] Fedora update for poppler [SA28039] SUSE update for OpenOffice_org [SA28001] Debian update for iceweasel [SA27979] Fedora update for seamonkey [SA27972] Fedora update for openoffice.org [SA28060] Debian update for ruby-gnome2 [SA28050] Red Hat update for python [SA28044] IBM AIX Multiple Unspecified Vulnerabilities [SA28041] Avaya Products PCRE Multiple Vulnerabilities [SA28033] Debian update for kernel [SA28027] Red Hat update for python [SA28022] Gentoo update for ruby-gtk2 [SA28021] Gentoo update for emul-linux-x86-qtlibs [SA28008] Debian update for sitebar [SA28002] wwwstats "link" Script Insertion Vulnerability [SA27996] Debian update for qt-x11-free [SA27989] Fedora update for eggdrop [SA27985] Gentoo update for cairo [SA27984] Gentoo update for emacs [SA27975] Fedora update for ruby-gnome [SA27973] Fedora update for drupal [SA28067] Mandriva update for samba [SA28029] Gentoo update for samba [SA28028] rPath update for samba and samba-swat [SA28003] SUSE update for samba [SA27999] Debian update for samba [SA27993] Slackware update for samba [SA27982] Gentoo update for firebird [SA27977] Fedora update for samba [SA28062] Debian update for htdig [SA28061] Debian update for libnss-ldap [SA28042] Mandriva update for e2fsprogs [SA28030] rPath update for e2fsprogs [SA28000] Ubuntu update for e2fsprogs [SA27987] Debian update for e2fsprogs [SA27983] Gentoo update for PEAR-MDB2 [SA27980] Fedora update for nagios [SA27971] Avaya Products Apache mod_proxy "date" Denial of Service [SA27967] Ubuntu update for tetex-bin and texlive-bin [SA28040] Mandriva update for MySQL [SA28052] Red Hat autofs "/net" Privilege Escalation Vulnerability [SA28023] Gentoo update for lookup [SA28004] Fedora update for xorg-x11-xfs [SA27978] Fedora update for zabbix [SA28070] Linux Kernel "mmap_min_addr" Security Bypass [SA28057] Avaya CMS / IR Solaris Remote Procedure Call Module Denial of Service [SA28048] Mac OS X "cs_validate_page()" Local Denial of Service Other: [SA27970] IBM HMC Version 3 Privilege Escalation Vulnerabilities Cross Platform: [SA28066] ViArt CMS/HelpDesk/Shop "root_folder_path" File Inclusion [SA28058] CityWriter "path" File Inclusion Vulnerability [SA28054] Fastpublish CMS designconfig.php File Inclusion [SA28047] Falcon Series One Multiple Vulnerabilities [SA28018] Sun StarOffice/StarSuite Database Document Processing Arbitrary Java Method Execution [SA27974] Novell NetMail AntiVirus Agent Integer Overflow Vulnerability [SA28080] Robocode Arbitrary Java Code Execution Security Issue [SA28075] MMS Gallery PHP "id" File Inclusion Vulnerabilities [SA28071] xml2owl "file" Information Disclosure Vulnerability [SA28053] Mcms Easy Web Make "template" Local File Inclusion [SA28045] Falt4 CMS Cross-Site Scripting and SQL Injection Vulnerabilities [SA28035] Cybozu Office Multiple Vulnerabilities [SA28014] aurora framework "pack_var()" SQL Injection Vulnerability [SA28013] PolDoc Document Management System "filename" Information Disclosure [SA27990] DWdirectory "search" SQL Injection Vulnerability [SA27988] Ace Image Hosting Script "id" SQL Injection Vulnerability [SA27986] Content Injector "id" SQL Injection Vulnerability [SA28082] Hitachi Web Server Cross-Site Scripting Vulnerabilities [SA28081] Apache mod_imap Module Cross-Site Scripting Vulnerability [SA28078] BEA WebLogic Mobility Server Image Converter Security Bypass [SA28077] JBoss Seam "order" EJBQL Injection Vulnerability [SA28073] Apache mod_imap Module Cross-Site Scripting Vulnerability [SA28069] Rainboard Unspecified Cross-Site Scripting [SA28063] MySQL Security Issue and Two Vulnerabilities [SA28049] Cybozu Products Cross-Site Scripting and HTTP Header Injection [SA28046] Apache mod_imagemap Module Cross-Site Scripting Vulnerability [SA28024] bitweaver Cross-Site Scripting Vulnerabilities [SA28012] Serendipity Remote RSS Sidebar Plugin Script Insertion [SA28006] WebSPELL Multiple Cross-Site Scripting Vulnerabilities [SA28005] WordPress GBK/Big5 Character Set "s" SQL Injection [SA27966] OpenNewsletter "type" Cross-Site Scripting [SA28026] Websense User-Agent Filtering Bypass Security Issue [SA27981] MySQL System Table Information Overwrite Vulnerability ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA28036] Internet Explorer Multiple Code Execution Vulnerabilities Critical: Extremely critical Where: From remote Impact: System access Released: 2007-12-11 Some vulnerabilities have been reported in Internet Explorer, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/28036/ -- [SA27992] JustSystems Ichitaro Document Processing Buffer Overflow Critical: Extremely critical Where: From remote Impact: System access Released: 2007-12-13 A vulnerability has been reported in JustSystems Ichitaro, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27992/ -- [SA28055] HP Info Center HPInfo Class ActiveX Control Insecure Methods Critical: Highly critical Where: From remote Impact: Manipulation of data, Exposure of system information, System access Released: 2007-12-12 porkythepig has reported some vulnerabilities in HP Info Center, which can be exploited by malicious people to gain knowledge of certain system information, manipulate registry data, and to compromise a user's system. Full Advisory: http://secunia.com/advisories/28055/ -- [SA28034] Windows Media Format Runtime ASF Parsing Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-11 IBM X-Force has reported four vulnerabilities in Windows Media Format Runtime / Windows Media Services, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/28034/ -- [SA28031] BadBlue Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Security Bypass, Exposure of sensitive information, System access Released: 2007-12-11 Luigi Auriemma has reported some vulnerabilities in BadBlue, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28031/ -- [SA28010] Microsoft DirectX SAMI/WAV/AVI File Parsing Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-11 Two vulnerabilities have been reported in Microsoft DirectX, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/28010/ -- [SA27998] 3ivx MPEG-4 MP4 File Processing Buffer Overflows Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-10 SYS 49152 has discovered some vulnerabilities in 3ivx MPEG-4, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/27998/ -- [SA28038] Trend Micro Products UUE File Parsing Buffer Overflow Critical: Moderately critical Where: From remote Impact: System access Released: 2007-12-12 Sowhat has reported a vulnerability in some Trend Micro products, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/28038/ -- [SA28032] BarracudaDrive Web Server Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data, Exposure of system information, Exposure of sensitive information, DoS Released: 2007-12-11 Luigi Auriemma has reported some vulnerabilities in BarracudaDrive Web Server, which can be exploited by malicious users to manipulate certain data and cause a DoS (Denial of Service), and by malicious people to conduct script insertion attacks and disclose sensitive information. Full Advisory: http://secunia.com/advisories/28032/ -- [SA28007] Easy File Sharing Web Server Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information, System access Released: 2007-12-10 Luigi Auriemma has reported some vulnerabilities in Easy File Sharing Web Server, which can be exploited by malicious people to disclose sensitive information and by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28007/ -- [SA27976] PenPal Three SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-12-07 Aria-Security Team have reported some vulnerabilities in PenPal, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27976/ -- [SA28051] Microsoft Windows Message Queuing Buffer Overflow Critical: Moderately critical Where: From local network Impact: System access Released: 2007-12-11 A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28051/ -- [SA27997] Microsoft Windows Vista SMBv2 Signing Vulnerability Critical: Moderately critical Where: From local network Impact: System access Released: 2007-12-11 A vulnerability has been reported in Microsoft Windows Vista, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/27997/ -- [SA28019] Websense "username" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-11 Dave Lewis has reported a vulnerability in Websense Enterprise and Websense Web Security Suite, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/28019/ -- [SA28015] Windows Vista Kernel Legacy Reply Path Validation Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-12-11 A vulnerability has been reported in Microsoft Windows Vista, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/28015/ -- [SA28011] Microsoft Windows Message Queuing Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-12-11 A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/28011/ -- [SA28072] Kerio WinRoute Firewall Proxy Server Unspecified Security Bypass Critical: Not critical Where: Local system Impact: Security Bypass Released: 2007-12-13 A weakness has been reported in Kerio WinRoute Firewall, which potentially can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/28072/ UNIX/Linux:-- [SA28068] Sun Solaris update for Adobe Flash Player Critical: Highly critical Where: From remote Impact: Exposure of sensitive information, System access Released: 2007-12-12 Sun has issued an update for Adobe Flash Player. This fixes some vulnerabilities, which can be exploited by malicious people to gain knowledge of sensitive information or compromise a user's system. Full Advisory: http://secunia.com/advisories/28068/ -- [SA28056] Red Hat update for java-1.4.2-bea Critical: Highly critical Where: From remote Impact: System access, DoS Released: 2007-12-12 Red Hat has issued an update for java-1.4.2-bea. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a user's system. Full Advisory: http://secunia.com/advisories/28056/ -- [SA28043] Fedora update for poppler Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-11 Fedora has issued an update for poppler. This fixes some vulnerabilities, which can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/28043/ -- [SA28039] SUSE update for OpenOffice_org Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-11 SUSE has issued an update for OpenOffice_org. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/28039/ -- [SA28001] Debian update for iceweasel Critical: Highly critical Where: From remote Impact: Cross Site Scripting, DoS, System access Released: 2007-12-10 Debian has issued an update for iceweasel. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site request forgery and cross-site scripting attacks or potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/28001/ -- [SA27979] Fedora update for seamonkey Critical: Highly critical Where: From remote Impact: Cross Site Scripting, DoS, System access Released: 2007-12-10 Fedora has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/27979/ -- [SA27972] Fedora update for openoffice.org Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-10 Fedora has issued an update for openoffice.org. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/27972/ -- [SA28060] Debian update for ruby-gnome2 Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-12-12 Debian has issued an update for ruby-gnome2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/28060/ -- [SA28050] Red Hat update for python Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information, DoS, System access Released: 2007-12-11 Red Hat has issued an update for python. This fixes a security issue and a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28050/ -- [SA28044] IBM AIX Multiple Unspecified Vulnerabilities Critical: Moderately critical Where: From remote Impact: Unknown Released: 2007-12-12 Multiple vulnerabilities have been reported in IBM AIX, which have unknown impacts. Full Advisory: http://secunia.com/advisories/28044/ -- [SA28041] Avaya Products PCRE Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information, DoS, System access Released: 2007-12-13 Avaya has acknowledged some vulnerabilities in various Avaya products, which can be exploited by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/28041/ -- [SA28033] Debian update for kernel Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-12-11 Debian has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users and by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28033/ -- [SA28027] Red Hat update for python Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information, DoS, System access Released: 2007-12-11 Red Hat has issued an update for python. This fixes some security issues and a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28027/ -- [SA28022] Gentoo update for ruby-gtk2 Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-12-10 Gentoo has issued an update for ruby-gtk2. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/28022/ -- [SA28021] Gentoo update for emul-linux-x86-qtlibs Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-12-10 Gentoo has issued an update for emul-linux-x86-qtlibs. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/28021/ -- [SA28008] Debian update for sitebar Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Exposure of sensitive information, System access Released: 2007-12-10 Debian has issued an update for sitebar. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, and by malicious users to disclose potentially sensitive information and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28008/ -- [SA28002] wwwstats "link" Script Insertion Vulnerability Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-10 Jesus Olmos Gonzalez has reported a vulnerability in wwwstats, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/28002/ -- [SA27996] Debian update for qt-x11-free Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-12-10 Debian has issued an update for qt-x11-free. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. Full Advisory: http://secunia.com/advisories/27996/ -- [SA27989] Fedora update for eggdrop Critical: Moderately critical Where: From remote Impact: System access Released: 2007-12-11 Fedora has issued an update for eggdrop. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27989/ -- [SA27985] Gentoo update for cairo Critical: Moderately critical Where: From remote Impact: System access Released: 2007-12-10 Gentoo has issued an update for cairo. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/27985/ -- [SA27984] Gentoo update for emacs Critical: Moderately critical Where: From remote Impact: System access Released: 2007-12-10 Gentoo has issued an update for emacs. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/27984/ -- [SA27975] Fedora update for ruby-gnome Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-12-10 Fedora has issued an update for ruby-gnome. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/27975/ -- [SA27973] Fedora update for drupal Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-12-10 Fedora has issued an update for drupal. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27973/ -- [SA28067] Mandriva update for samba Critical: Moderately critical Where: From local network Impact: System access Released: 2007-12-12 Mandriva has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28067/ -- [SA28029] Gentoo update for samba Critical: Moderately critical Where: From local network Impact: System access Released: 2007-12-11 Gentoo has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28029/ -- [SA28028] rPath update for samba and samba-swat Critical: Moderately critical Where: From local network Impact: System access Released: 2007-12-11 rPath has issued an update for samba and samba-swat. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28028/ -- [SA28003] SUSE update for samba Critical: Moderately critical Where: From local network Impact: System access Released: 2007-12-12 SUSE has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28003/ -- [SA27999] Debian update for samba Critical: Moderately critical Where: From local network Impact: System access Released: 2007-12-11 Debian has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27999/ -- [SA27993] Slackware update for samba Critical: Moderately critical Where: From local network Impact: System access Released: 2007-12-11 Slackware has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27993/ -- [SA27982] Gentoo update for firebird Critical: Moderately critical Where: From local network Impact: System access Released: 2007-12-10 Gentoo has issued an update for firebird. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27982/ -- [SA27977] Fedora update for samba Critical: Moderately critical Where: From local network Impact: System access Released: 2007-12-11 Fedora has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27977/ -- [SA28062] Debian update for htdig Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-12 Debian has issued an update for htdig. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/28062/ -- [SA28061] Debian update for libnss-ldap Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2007-12-12 Debian has issued an update for nss-ldap. This fixes a security issue, which can be exploited by malicious persons to manipulate certain data. Full Advisory: http://secunia.com/advisories/28061/ -- [SA28042] Mandriva update for e2fsprogs Critical: Less critical Where: From remote Impact: DoS, System access Released: 2007-12-11 Mandriva has issued an update for e2fsprogs. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/28042/ -- [SA28030] rPath update for e2fsprogs Critical: Less critical Where: From remote Impact: DoS, System access Released: 2007-12-12 rPath has issued an update for e2fsprogs. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/28030/ -- [SA28000] Ubuntu update for e2fsprogs Critical: Less critical Where: From remote Impact: DoS, System access Released: 2007-12-10 Ubuntu has issued an update for e2fsprogs. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/28000/ -- [SA27987] Debian update for e2fsprogs Critical: Less critical Where: From remote Impact: DoS, System access Released: 2007-12-10 Debian has issued an update for e2fsprogs. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/27987/ -- [SA27983] Gentoo update for PEAR-MDB2 Critical: Less critical Where: From remote Impact: Exposure of sensitive information Released: 2007-12-10 Gentoo has issued an update for PEAR-MDB2. This fixes a security issue, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/27983/ -- [SA27980] Fedora update for nagios Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-10 Fedora has issued an update for nagios. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/27980/ -- [SA27971] Avaya Products Apache mod_proxy "date" Denial of Service Critical: Less critical Where: From remote Impact: DoS Released: 2007-12-07 Avaya has acknowledged a vulnerability in various Avaya products, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/27971/ -- [SA27967] Ubuntu update for tetex-bin and texlive-bin Critical: Less critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information, DoS, System access Released: 2007-12-07 Ubuntu has issued an update for tetex-bin and texlive-bin. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose and manipulate sensitive information and by malicious people to potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27967/ -- [SA28040] Mandriva update for MySQL Critical: Less critical Where: From local network Impact: Security Bypass, Manipulation of data, DoS Released: 2007-12-11 Mandriva has issued an update for MySQL. This fixes some vulnerabilities, which can be exploited by malicious, local users to manipulate certain data and by malicious users to bypass certain security restrictions or cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28040/ -- [SA28052] Red Hat autofs "/net" Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-12-12 A vulnerability has been reported in Red Hat Enterprise Linux, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/28052/ -- [SA28023] Gentoo update for lookup Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-12-10 Gentoo has issued an update for lookup. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/28023/ -- [SA28004] Fedora update for xorg-x11-xfs Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-12-11 Fedora has issued an update for xorg-x11-xfs. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/28004/ -- [SA27978] Fedora update for zabbix Critical: Not critical Where: From local network Impact: Privilege escalation Released: 2007-12-10 Fedora has issued an update for zabbix. This fixes a weakness, which can be exploited by malicious users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/27978/ -- [SA28070] Linux Kernel "mmap_min_addr" Security Bypass Critical: Not critical Where: Local system Impact: Security Bypass Released: 2007-12-12 A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/28070/ -- [SA28057] Avaya CMS / IR Solaris Remote Procedure Call Module Denial of Service Critical: Not critical Where: Local system Impact: DoS Released: 2007-12-12 Avaya has acknowledged a vulnerability in Avaya CMS / IR, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28057/ -- [SA28048] Mac OS X "cs_validate_page()" Local Denial of Service Critical: Not critical Where: Local system Impact: DoS Released: 2007-12-13 mu-b has reported a vulnerability in Mac OS X, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28048/ Other:-- [SA27970] IBM HMC Version 3 Privilege Escalation Vulnerabilities Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-12-07 Some vulnerabilities have been reported in IBM HMC, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/27970/ Cross Platform:-- [SA28066] ViArt CMS/HelpDesk/Shop "root_folder_path" File Inclusion Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2007-12-12 RoMaNcYxHaCkEr has discovered a vulnerability in various ViArt products, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28066/ -- [SA28058] CityWriter "path" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-13 RoMaNcYxHaCkEr has discovered a vulnerability in CityWriter, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28058/ -- [SA28054] Fastpublish CMS designconfig.php File Inclusion Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2007-12-13 RoMaNcYxHaCkEr has discovered a vulnerability in Fastpublish CMS, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28054/ -- [SA28047] Falcon Series One Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Cross Site Scripting, System access Released: 2007-12-11 MhZ91 has reported some vulnerabilities in Falcon Series One, which can be exploited by malicious people to conduct script insertion and cross-site request forgery attacks and to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28047/ -- [SA28018] Sun StarOffice/StarSuite Database Document Processing Arbitrary Java Method Execution Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-10 Sun has acknowledged a vulnerability in Sun StarOffice and StarSuite, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/28018/ -- [SA27974] Novell NetMail AntiVirus Agent Integer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-07 A vulnerability has been reported in Novell NetMail, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/27974/ -- [SA28080] Robocode Arbitrary Java Code Execution Security Issue Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2007-12-13 A security issue has been reported in Robocode, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/28080/ -- [SA28075] MMS Gallery PHP "id" File Inclusion Vulnerabilities Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-12-13 GoLd_M has reported some vulnerabilities in MMS Gallery PHP, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/28075/ -- [SA28071] xml2owl "file" Information Disclosure Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-12-13 GoLd_M has discovered a vulnerability in xml2owl, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/28071/ -- [SA28053] Mcms Easy Web Make "template" Local File Inclusion Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-12-12 MhZ91 has discovered a vulnerability in Mcms Easy Web Make, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/28053/ -- [SA28045] Falt4 CMS Cross-Site Scripting and SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2007-12-11 Mesut Timur has reported some vulnerabilities in Falt4 CMS, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/28045/ -- [SA28035] Cybozu Office Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, DoS Released: 2007-12-11 Some vulnerabilities have been reported in Cybozu Office, which can be exploited by malicious people to conduct cross-site scripting attacks, HTTP header injection attacks, or cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28035/ -- [SA28014] aurora framework "pack_var()" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-12-12 A vulnerability has been reported in aurora framework, which can be exploited by malicious people to conduct SQL injection attacks against applications using the framework. Full Advisory: http://secunia.com/advisories/28014/ -- [SA28013] PolDoc Document Management System "filename" Information Disclosure Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-12-10 GoLd_M has discovered a vulnerability in PolDoc Document Management System (PDDMS), which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/28013/ -- [SA27990] DWdirectory "search" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-12-10 t0pP8uZz & xprog have reported a vulnerability in DWdirectory, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27990/ -- [SA27988] Ace Image Hosting Script "id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-12-10 t0pP8uZz & xprog have reported a vulnerability in Ace Image Hosting Script, which can be exploited by malicious people to conduct SQL injections attacks. Full Advisory: http://secunia.com/advisories/27988/ -- [SA27986] Content Injector "id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-12-10 S.W.A.T. has discovered a vulnerability in Content Injector, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/27986/ -- [SA28082] Hitachi Web Server Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-13 Hitachi has acknowledged some vulnerabilities in the Hitachi Web Server, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/28082/ -- [SA28081] Apache mod_imap Module Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-13 A vulnerability has been reported in the mod_imap module for Apache, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/28081/ -- [SA28078] BEA WebLogic Mobility Server Image Converter Security Bypass Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-12-13 A vulnerability has been reported in the BEA WebLogic Mobility Server, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/28078/ -- [SA28077] JBoss Seam "order" EJBQL Injection Vulnerability Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2007-12-13 A vulnerability has been reported in JBoss Seam, which potentially can be exploited by malicious people to conduct SQL injection attacks against applications using the framework. Full Advisory: http://secunia.com/advisories/28077/ -- [SA28073] Apache mod_imap Module Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-12 A vulnerability has been reported in the mod_imap module for Apache, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/28073/ -- [SA28069] Rainboard Unspecified Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-12 A vulnerability has been reported in Rainboard, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/28069/ -- [SA28063] MySQL Security Issue and Two Vulnerabilities Critical: Less critical Where: From remote Impact: Manipulation of data, Privilege escalation, DoS Released: 2007-12-12 A security issue and two vulnerabilities have been reported in MySQL, which can be exploited by malicious users to gain escalated privileges, manipulate certain data, or to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28063/ -- [SA28049] Cybozu Products Cross-Site Scripting and HTTP Header Injection Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-11 Some vulnerabilities have been reported in Cybozu products, which can be exploited by malicious people to conduct cross-site scripting and HTTP header injection attacks. Full Advisory: http://secunia.com/advisories/28049/ -- [SA28046] Apache mod_imagemap Module Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-12 A vulnerability has been reported in the mod_imagemap module for Apache, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/28046/ -- [SA28024] bitweaver Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-10 DoZ has discovered some vulnerabilities in bitweaver, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/28024/ -- [SA28012] Serendipity Remote RSS Sidebar Plugin Script Insertion Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-10 A vulnerability has been reported in Serendipity, which can be exploited by malicious people to conduct script-insertion attacks. Full Advisory: http://secunia.com/advisories/28012/ -- [SA28006] WebSPELL Multiple Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-11 Brainhead has discovered some vulnerabilities in WebSPELL, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/28006/ -- [SA28005] WordPress GBK/Big5 Character Set "s" SQL Injection Critical: Less critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-12-11 Abel Cheung has discovered a vulnerability in WordPress, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/28005/ -- [SA27966] OpenNewsletter "type" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-07 Manuel Fernandez has discovered a vulnerability in OpenNewsletter, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/27966/ -- [SA28026] Websense User-Agent Filtering Bypass Security Issue Critical: Less critical Where: From local network Impact: Security Bypass Released: 2007-12-13 mrhinkydink has reported a security issue in Websense, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/28026/ -- [SA27981] MySQL System Table Information Overwrite Vulnerability Critical: Less critical Where: Local system Impact: Manipulation of data Released: 2007-12-10 A vulnerability has been reported in MySQL, which can be exploited by malicious, local users to manipulate certain data. Full Advisory: http://secunia.com/advisories/27981/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 __________________________________________________________________ Visit InfoSec News http://www.infosecnews.org/
This archive was generated by hypermail 2.1.3 : Thu Dec 13 2007 - 22:39:48 PST