======================================================================== The Secunia Weekly Advisory Summary 2007-12-13 - 2007-12-20 This week: 71 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ======================================================================== 2) This Week in Brief: Some highly critical vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system. A boundary error in the handling of QTL files can be exploited to cause a heap-based buffer overflow when a user views a specially crafted QTL file. Various unspecified errors also exist in QuickTime's Flash media handler. Successful exploitation of any of these issues may allow execution of arbitrary code. Quicktime 7.3.1 is patched against these vulnerabilities, and is available for Mac and Windows users. For more information: http://secunia.com/advisories/28092/ The Secunia Personal Software Inspector - Release Candidate 1 is now available, which you can use to check if your personal system is vulnerable: https://psi.secunia.com/ -- Various vulnerabilities in Java have been reported and acknowledged in Mac OS X, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, to cause a DoS (Denial of Service), or to compromise a user's system. An error in Java due to an improper access check can be exploited via a specially crafted Java applet to add or remove items from a user's Keychain, without prompting the user. This vulnerability affects Mac OS X versions prior to 10.5. Some vulnerabilities in Java 1.4 and J2SE 5.0 can be exploited to bypass certain security restrictions, conduct cross-site scripting attacks, to cause a DoS (Denial of Service), or to compromise a user's system. Most of these vulnerabilities are known issues in Java from 2006 and 2007. These vulnerabilities are reported in Mac OS X 10.4.10 and Mac OS X Server 10.4.10. Mac OS X v10.5 is reportedly not affected. Java Release 6 for Mac OS X 10.4 is now available for all users to resolve the issues. For more information, including a complete list of Java vulnerabilities: http://secunia.com/advisories/28115/ -- Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities. Some of these vulnerabilities are due to known vulnerabilities in third-party software (such as Tar, CUPS, perl, and python), while some are vulnerabilities in Mac OS X components. Apple has released Security Update 2007-09 to resolve these issues. Both Mac OS X 10.4 and 10.5 are affected. All users are urged to update their systems immediately. For more information, including the complete list of all vulnerabilities: http://secunia.com/advisories/28136/ -- Some vulnerabilities have been reported in Adobe Flash Player, where one vulnerability has an unknown impact and others can be exploited by malicious, local users to gain escalated privileges and by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP request splitting attacks, disclose sensitive information, cause a Denial of Service (DoS), or to potentially compromise a user's system. One of the vulnerabilities is due to the use of vulnerable PCRE code, while another is a vulnerability present in the Flash Player in Opera browsers. Some vulnerabilities may be exploited to allow the execution of arbitrary code, making them highly critical issues. Secunia urges all users to install version 9.0.115.0 to fix these issues. For more information, including the complete list of all vulnerabilities: http://secunia.com/advisories/28161/ The Secunia Personal Software Inspector - Release Candidate 1 is now available, which you can use to check if your personal system is vulnerable: https://psi.secunia.com/ Corporate users can request for a trial of the Secunia Network Software Inspector, which you can use to check which systems in your network are vulnerable: http://secunia.com/network_software_inspector/ -- VIRUS ALERTS: During the past week Secunia collected 116 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA28036] Internet Explorer Multiple Code Execution Vulnerabilities 2. [SA28092] Apple QuickTime Multiple Vulnerabilities 3. [SA28095] SquirrelMail Package Compromise 4. [SA28161] Adobe Flash Player Multiple Vulnerabilities 5. [SA27992] JustSystems Ichitaro Document Processing Buffer Overflow 6. [SA28096] Sun Solaris 10 NFS "netgroups" Security Bypass Vulnerability 7. [SA28048] Mac OS X "cs_validate_page()" Local Denial of Service 8. [SA28072] Kerio WinRoute Firewall Proxy Server Unspecified Security Bypass 9. [SA28059] WebGUI Create Admin Security Bypass 10. [SA27969] TYPO3 "indexed_search" SQL Injection Vulnerability ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA28144] Rosoft Media Player File Processing Buffer Overflow Vulnerability [SA28134] iMesh IMWebControl Class ActiveX Control Code Execution [SA28120] PeerCast "handshakeHTTP()" Buffer Overflow Vulnerability [SA28160] WFTPD Explorer LIST Reply Buffer Overflow Vulnerability [SA28143] RaidenHTTPD "ulang" Local File Inclusion Vulnerability [SA28111] phPay Local File Inclusion Vulnerability [SA28131] St. Bernard Open File Manager Buffer Overflow Vulnerability [SA28177] HP Software Update ContentCollection Class ActiveX Control Insecure Method [SA28150] Citrix Web Interface Unspecified Cross-Site Scripting Vulnerability [SA28142] SurgeMail Webmail "Host" Header Processing Denial of Service UNIX/Linux: [SA28157] Red Hat update for flash-plugin [SA28136] Apple Mac OS X Security Update Fixes Multiple Vulnerabilities [SA28135] Sun Solaris Firefox / Thunderbird Multiple Vulnerabilities [SA28115] Mac OS X Java Multiple Vulnerabilities [SA28112] Centreon "fileOreonConf" File Inclusion Vulnerabilities [SA28084] HP-UX update for OpenSSL [SA28170] Ubuntu update for kernel [SA28167] IBM AIX Perl Regular Expressions Unicode Data Buffer Overflow [SA28147] Ubuntu update for libgd2 [SA28132] Exiv2 EXIF Parsing Integer Overflow Vulnerability [SA28114] Sun Solaris Gimp Multiple Vulnerabilities [SA28113] Gentoo update for cups [SA28109] Red Hat update for squid [SA28103] Debian update for centericq [SA28101] Debian update for link-grammar [SA28091] Fedora update for squid [SA28090] Gentoo update for ircservices [SA28086] Debian update for mydns [SA28151] Sun Management Center Default Account Security Issue [SA28129] CUPS SNMP Backend "asn1_get_string()" Signedness Vulnerability [SA28089] Avaya Products Samba "send_mailslot()" Buffer Overflow [SA28087] HP-UX DCE swagentd Buffer Overflow Vulnerability [SA28162] Red Hat update for kernel [SA28107] rPath update for tetex [SA28148] Sun Ray Device Manager Daemon Data Manipulation and DoS [SA28108] Slackware update for mysql [SA28099] Red Hat update for mysql [SA28139] Alternate pdftops Filter for CUPS Insecure Temporary Files [SA28123] scponly Command Passthrough Security Bypass [SA28105] Linux Kernel "hrtimer_start()" Integer Overflow Vulnerability [SA28097] Fedora update for autofs [SA28094] Gentoo Portage "etc-update" Information Disclosure [SA28088] rPath update for kernel [SA28181] rPath update for kdebase [SA28104] KDE KDM Local Denial of Service Weakness Other: [SA28175] Cisco Firewall Services Module Denial of Service Vulnerability [SA28100] Juniper JUNOS BGP UPDATE Message Processing Denial of Service [SA28096] Sun Solaris 10 NFS "netgroups" Security Bypass Vulnerability [SA28093] NeoOffice Unspecified OpenOffice.org Vulnerability Cross Platform: [SA28169] Opera Multiple Vulnerabilities [SA28161] Adobe Flash Player Multiple Vulnerabilities [SA28117] ClamAV "cli_scanpe()" MEW Handling Integer Overflow [SA28095] SquirrelMail Package Compromise [SA28092] Apple QuickTime Multiple Vulnerabilities [SA28155] phpMyRealty Two SQL Injection Vulnerabilities [SA28154] Dokeos "My productions" Multiple Extensions File Upload Vulnerability [SA28138] PunBB Automatic Image Upload with Thumbnails Module File Upload [SA28137] LineShout Two Script Insertion Vulnerabilities [SA28126] FreeWebshop.org Admin Credentials Information Disclosure [SA28124] Hammer of Thyrion "HuffDecode()" Buffer Overflow Vulnerability [SA28119] PHP Real Estate Classifieds "id" SQL Injection [SA28110] exiftags Multiple Vulnerabilities [SA28098] CourseMill Learning Management System "user" SQL Injection [SA28164] GF-3XPLORER Cross-Site Scripting and Information Disclosure [SA28149] Asterisk Registration Database Security Bypass [SA28133] Mambo Two Cross-Site Scripting Vulnerabilities [SA28130] WordPress Draft Information Disclosure [SA28122] Google Web Toolkit Benchmark Reporting System Cross-Site Scripting [SA28116] Ganglia Web Interface Multiple Cross-Site Scripting Vulnerabilities [SA28106] Flyspray Two Cross-Site Scripting Vulnerabilities [SA28118] syslog-ng Timestamps Denial of Service Vulnerability ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA28144] Rosoft Media Player File Processing Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-19 Juan Pablo Lopez Yacubian has discovered a vulnerability in Rosoft Media Player, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/28144/ -- [SA28134] iMesh IMWebControl Class ActiveX Control Code Execution Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-18 rgod has discovered a vulnerability in iMesh, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/28134/ -- [SA28120] PeerCast "handshakeHTTP()" Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-12-18 Luigi Auriemma has reported a vulnerability in PeerCast, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28120/ -- [SA28160] WFTPD Explorer LIST Reply Buffer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2007-12-19 r4x has reported a vulnerability in WFTPD Explorer, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/28160/ -- [SA28143] RaidenHTTPD "ulang" Local File Inclusion Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-12-18 rgod has discovered a vulnerability in RaidenHTTPD, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/28143/ -- [SA28111] phPay Local File Inclusion Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-12-17 Michael Brooks has discovered a vulnerability in phPay, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/28111/ -- [SA28131] St. Bernard Open File Manager Buffer Overflow Vulnerability Critical: Moderately critical Where: From local network Impact: System access Released: 2007-12-18 A vulnerability has been reported in St. Bernard Open File Manager, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28131/ -- [SA28177] HP Software Update ContentCollection Class ActiveX Control Insecure Method Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2007-12-20 porkythepig has reported a vulnerability in HP Software Update, which can be exploited by malicious people to overwrite arbitrary files on a user's system. Full Advisory: http://secunia.com/advisories/28177/ -- [SA28150] Citrix Web Interface Unspecified Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-19 A vulnerability has been reported in Citrix Web Interface, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/28150/ -- [SA28142] SurgeMail Webmail "Host" Header Processing Denial of Service Critical: Less critical Where: From remote Impact: DoS Released: 2007-12-18 rgod has discovered a vulnerability in SurgeMail, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28142/ UNIX/Linux:-- [SA28157] Red Hat update for flash-plugin Critical: Highly critical Where: From remote Impact: Cross Site Scripting, Manipulation of data, Exposure of sensitive information, Privilege escalation, DoS, System access Released: 2007-12-19 Red Hat has issued an update for flash-plugin. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct cross-site scripting and HTTP request splitting attacks, disclose sensitive information, cause a Denial of Service (DoS), or to potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/28157/ -- [SA28136] Apple Mac OS X Security Update Fixes Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Hijacking, Security Bypass, Cross Site Scripting, Exposure of system information, Exposure of sensitive information, Privilege escalation, DoS, System access Released: 2007-12-18 Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities. Full Advisory: http://secunia.com/advisories/28136/ -- [SA28135] Sun Solaris Firefox / Thunderbird Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Cross Site Scripting, Spoofing, Exposure of sensitive information, DoS, System access Released: 2007-12-19 Sun has acknowledged some vulnerabilities in Sun Solaris, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks, to disclose sensitive information, and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/28135/ -- [SA28115] Mac OS X Java Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Security Bypass, Privilege escalation, DoS, System access Released: 2007-12-17 Some vulnerabilities have been reported and acknowledged in Mac OS X, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, to cause a DoS (Denial of Service), or to compromise a user's system. Full Advisory: http://secunia.com/advisories/28115/ -- [SA28112] Centreon "fileOreonConf" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-18 Michael Brooks has reported some vulnerabilities in Centreon, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28112/ -- [SA28084] HP-UX update for OpenSSL Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-12-14 HP has issued an update for OpenSSL. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28084/ -- [SA28170] Ubuntu update for kernel Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-12-20 Ubuntu has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users and by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28170/ -- [SA28167] IBM AIX Perl Regular Expressions Unicode Data Buffer Overflow Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-12-19 IBM has acknowledged a vulnerability in AIX, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28167/ -- [SA28147] Ubuntu update for libgd2 Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-12-19 Ubuntu has issued an update for libgd2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/28147/ -- [SA28132] Exiv2 EXIF Parsing Integer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-12-18 A vulnerability has been reported in Exiv2, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/28132/ -- [SA28114] Sun Solaris Gimp Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: System access Released: 2007-12-18 Sun has acknowledged some vulnerabilities in Gimp, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/28114/ -- [SA28113] Gentoo update for cups Critical: Moderately critical Where: From remote Impact: Privilege escalation, DoS, System access Released: 2007-12-19 Gentoo has issued an update for cups. This fixes a security issue and some vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28113/ -- [SA28109] Red Hat update for squid Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-12-19 Red Hat has issued an update for squid. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28109/ -- [SA28103] Debian update for centericq Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-12-17 Debian has issued an update for centericq. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/28103/ -- [SA28101] Debian update for link-grammar Critical: Moderately critical Where: From remote Impact: System access Released: 2007-12-18 Debian has issued an update for link-grammar. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/28101/ -- [SA28091] Fedora update for squid Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-12-17 Fedora has issued an update for squid. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28091/ -- [SA28090] Gentoo update for ircservices Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-12-14 Gentoo has issued an update for ircservices. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28090/ -- [SA28086] Debian update for mydns Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-12-17 Debian has issued an update for mydns. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28086/ -- [SA28151] Sun Management Center Default Account Security Issue Critical: Moderately critical Where: From local network Impact: Security Bypass Released: 2007-12-19 A security issue has been reported in Sun Management Center, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/28151/ -- [SA28129] CUPS SNMP Backend "asn1_get_string()" Signedness Vulnerability Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2007-12-18 A vulnerability has been reported in CUPS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28129/ -- [SA28089] Avaya Products Samba "send_mailslot()" Buffer Overflow Critical: Moderately critical Where: From local network Impact: System access Released: 2007-12-14 Avaya has acknowledged a vulnerability in various Avaya products, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28089/ -- [SA28087] HP-UX DCE swagentd Buffer Overflow Vulnerability Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2007-12-14 A vulnerability has been reported in HP-UX, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28087/ -- [SA28162] Red Hat update for kernel Critical: Less critical Where: From remote Impact: DoS Released: 2007-12-20 Red Hat has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28162/ -- [SA28107] rPath update for tetex Critical: Less critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information, DoS, System access Released: 2007-12-18 rPath has issued an update for tetex. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose and manipulate sensitive information and by malicious people to potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28107/ -- [SA28148] Sun Ray Device Manager Daemon Data Manipulation and DoS Critical: Less critical Where: From local network Impact: Manipulation of data, DoS Released: 2007-12-19 Some vulnerabilities have been reported in Sun Ray Server Software, which can be exploited by malicious, local users or malicious people to manipulate certain data or cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28148/ -- [SA28108] Slackware update for mysql Critical: Less critical Where: From local network Impact: Security Bypass, Manipulation of data, DoS Released: 2007-12-17 Slackware has issued an update for mysql. This fixes a security issue and some vulnerabilities, which can be exploited by malicious, local users to manipulate certain data and by malicious users to bypass certain security restrictions and cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28108/ -- [SA28099] Red Hat update for mysql Critical: Less critical Where: From local network Impact: Manipulation of data, DoS Released: 2007-12-19 Red Hat has issued an update for mysql. This fixes some vulnerabilities, which can be exploited by malicious, local users to manipulate certain data and by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28099/ -- [SA28139] Alternate pdftops Filter for CUPS Insecure Temporary Files Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-12-18 A security issue has been reported in the Alternate pdftops Filter for CUPS, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/28139/ -- [SA28123] scponly Command Passthrough Security Bypass Critical: Less critical Where: Local system Impact: Security Bypass Released: 2007-12-17 A security issue has been reported in scponly, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/28123/ -- [SA28105] Linux Kernel "hrtimer_start()" Integer Overflow Vulnerability Critical: Less critical Where: Local system Impact: Unknown Released: 2007-12-17 A vulnerability with an unknown impact has been reported in the Linux Kernel. Full Advisory: http://secunia.com/advisories/28105/ -- [SA28097] Fedora update for autofs Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-12-17 Fedora has issued an update for autofs. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/28097/ -- [SA28094] Gentoo Portage "etc-update" Information Disclosure Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2007-12-14 Gentoo has acknowledged a security issue in Portage, which can be exploited by malicious, local users to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/28094/ -- [SA28088] rPath update for kernel Critical: Less critical Where: Local system Impact: Unknown Released: 2007-12-19 rPath has issued an update for the kernel. This fixes a vulnerability with an unknown impact. Full Advisory: http://secunia.com/advisories/28088/ -- [SA28181] rPath update for kdebase Critical: Not critical Where: Local system Impact: DoS Released: 2007-12-20 rPath has issued an update for kdebase. This fixes a weakness, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28181/ -- [SA28104] KDE KDM Local Denial of Service Weakness Critical: Not critical Where: Local system Impact: DoS Released: 2007-12-20 A weakness has been reported in KDE, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28104/ Other:-- [SA28175] Cisco Firewall Services Module Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-12-20 A vulnerability has been reported in the Cisco Firewall Services Module (FWSM), which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28175/ -- [SA28100] Juniper JUNOS BGP UPDATE Message Processing Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-12-17 A vulnerability has been reported in Juniper JUNOS, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28100/ -- [SA28096] Sun Solaris 10 NFS "netgroups" Security Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2007-12-14 Sun has acknowledged a vulnerability in Solaris, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/28096/ -- [SA28093] NeoOffice Unspecified OpenOffice.org Vulnerability Critical: Moderately critical Where: From remote Impact: Unknown Released: 2007-12-14 A vulnerability with an unknown impact has been reported in NeoOffice. Full Advisory: http://secunia.com/advisories/28093/ Cross Platform:-- [SA28169] Opera Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Security Bypass, Exposure of sensitive information, System access Released: 2007-12-19 Some vulnerabilities have been reported in Opera, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, and compromise a user's system. Full Advisory: http://secunia.com/advisories/28169/ -- [SA28161] Adobe Flash Player Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Unknown, Security Bypass, Cross Site Scripting, Manipulation of data, Exposure of sensitive information, Privilege escalation, DoS, System access Released: 2007-12-19 Some vulnerabilities have been reported in Adobe Flash Player, where one vulnerability has an unknown impact and others can be exploited by malicious, local users to gain escalated privileges and by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP request splitting attacks, disclose sensitive information, cause a Denial of Service (DoS), or to potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/28161/ -- [SA28117] ClamAV "cli_scanpe()" MEW Handling Integer Overflow Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-12-19 A vulnerability has been reported in ClamAV, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28117/ -- [SA28095] SquirrelMail Package Compromise Critical: Highly critical Where: From remote Impact: System access Released: 2007-12-14 A package compromise has been reported in SquirrelMail, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28095/ -- [SA28092] Apple QuickTime Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-12-14 Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/28092/ -- [SA28155] phpMyRealty Two SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-12-19 Koller has reported two vulnerabilities in phpMyRealty (PMR), which can be exploited by malicious people and malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/28155/ -- [SA28154] Dokeos "My productions" Multiple Extensions File Upload Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2007-12-19 A vulnerability has been discovered in Dokeos, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28154/ -- [SA28138] PunBB Automatic Image Upload with Thumbnails Module File Upload Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, System access Released: 2007-12-18 Peter sterberg has discovered a vulnerability in the Automatic Image Upload with Thumbnails module for PunBB, which can be exploited by malicious users to conduct cross-site scripting attacks and to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28138/ -- [SA28137] LineShout Two Script Insertion Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-18 David Sopas has reported two vulnerabilities in LineShout, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/28137/ -- [SA28126] FreeWebshop.org Admin Credentials Information Disclosure Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of sensitive information Released: 2007-12-17 k1tk4t has discovered a vulnerability in FreeWebshop.org, which can be exploited by malicious people to bypass certain security restrictions and to disclose sensitive information. Full Advisory: http://secunia.com/advisories/28126/ -- [SA28124] Hammer of Thyrion "HuffDecode()" Buffer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-12-17 A vulnerability has been reported in Hammer of Thyrion, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28124/ -- [SA28119] PHP Real Estate Classifieds "id" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2007-12-18 t0pP8uZz & xprog have reported a vulnerability in PHP Real Estate Classifieds, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/28119/ -- [SA28110] exiftags Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2007-12-17 Some vulnerabilities have been reported in exiftags, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28110/ -- [SA28098] CourseMill Learning Management System "user" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2007-12-14 sasquatch has reported a vulnerability in CourseMill Learning Management System, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/28098/ -- [SA28164] GF-3XPLORER Cross-Site Scripting and Information Disclosure Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-19 MhZ91 has discovered a vulnerability and a security issue in GF-3XPLORER, which can be exploited by malicious people to conduct cross-site scripting attacks or to disclose system information. Full Advisory: http://secunia.com/advisories/28164/ -- [SA28149] Asterisk Registration Database Security Bypass Critical: Less critical Where: From remote Impact: Security Bypass Released: 2007-12-19 A security issue has been reported in Asterisk, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/28149/ -- [SA28133] Mambo Two Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-19 Beenu Arora has discovered two vulnerabilities in Mambo, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/28133/ -- [SA28130] WordPress Draft Information Disclosure Critical: Less critical Where: From remote Impact: Security Bypass, Exposure of sensitive information Released: 2007-12-19 Michael Brooks has discovered a vulnerability in WordPress, which can be exploited by malicious people to bypass certain security restrictions and to disclose sensitive information. Full Advisory: http://secunia.com/advisories/28130/ -- [SA28122] Google Web Toolkit Benchmark Reporting System Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-18 A vulnerability has been reported in Google Web Toolkit, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/28122/ -- [SA28116] Ganglia Web Interface Multiple Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-17 Some vulnerabilities have been reported in Ganglia, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/28116/ -- [SA28106] Flyspray Two Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-12-17 Two vulnerabilities have been reported in Flyspray, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/28106/ -- [SA28118] syslog-ng Timestamps Denial of Service Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2007-12-18 A vulnerability has been reported in syslog-ng, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28118/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 __________________________________________________________________ Visit InfoSec News http://www.infosecnews.org/
This archive was generated by hypermail 2.1.3 : Thu Dec 20 2007 - 23:25:46 PST