======================================================================== The Secunia Weekly Advisory Summary 2008-01-03 - 2008-01-10 This week: 79 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: 95 out of every 100 computers that are connected to the Internet have insecure software installed Read the full blog: http://secunia.com/blog/18/ Join the many Secunia PSI users: https://psi.secunia.com/ ======================================================================== 2) This Week in Brief: Microsoft has released their monthly security bulletins for January 2008. 1) A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. 2) Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. References: http://secunia.com/SA28341 http://secunia.com/SA28297 -- Will Dormann has reported a vulnerability in AOL Radio, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in AOLMediaPlaybackControl.exe and can be exploited to cause a stack-based buffer overflow by e.g. using the "AppendFileToPlayList()" method of the AmpX ActiveX control. Successful exploitation allows execution of arbitrary code. Reference: http://secunia.com/SA28399 -- VIRUS ALERTS: During the past week Secunia collected 247 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA28276] RealPlayer Unspecified Buffer Overflow Vulnerability 2. [SA28297] Microsoft Windows TCP/IP Implementation Vulnerabilities 3. [SA28295] Joomla PU Arcade Component "fid" SQL Injection Vulnerability 4. [SA28306] milliscripts Redirection "cat" Cross-Site Scripting Vulnerability 5. [SA28161] Adobe Flash Player Multiple Vulnerabilities 6. [SA28264] XOOPS "b_system_comments_show()" Security Bypass 7. [SA28285] CMS Made Simple "templateid" SQL Injection Vulnerability 8. [SA28317] Debian update for tomcat5.5 9. [SA28261] Hot or Not Clone Multiple Vulnerabilities 10. [SA28299] Fedora update for asterisk ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA28399] AOL Radio AOLMediaPlaybackControl.exe Buffer Overflow Vulnerability [SA28379] Gateway CWebLaunchCtl ActiveX Control "DoWebLaunch()" Vulnerabilities [SA28411] IBM Lotus Domino Unspecified Denial of Service [SA28337] PortalApp Multiple Vulnerabilities [SA28408] McAfee E-Business Server Authentication Packet Handling Vulnerability [SA28396] Novell Client nicm.sys Privilege Escalation Vulnerability [SA28366] Motorola netOctopus Agent nantsys.sys Privilege Escalation [SA28351] Novell ZENworks Endpoint Security Management Privilege Escalation [SA28341] Microsoft Windows LSASS Privilege Escalation Vulnerability UNIX/Linux: [SA28412] SUSE Update for Multiple Packages [SA28398] HP-UX update for Firefox [SA28406] Gentoo update for R [SA28403] Gentoo update for squid [SA28400] Mandriva update for libexif [SA28387] Avaya Products Perl Regular Expressions Unicode Data Buffer Overflow [SA28384] xine-lib SDP Attributes Buffer Overflow Vulnerability [SA28381] Ubuntu update for squid [SA28380] Ubuntu update for opal [SA28377] Debian update for libarchive [SA28374] Debian update for fail2ban [SA28373] FlexBB "flexbb_temp_id" SQL Injection Vulnerability [SA28353] Fedora update for python-cherrypy [SA28350] Mandriva update for squid [SA28347] Debian update for eggdrop [SA28346] rPath update for libexif [SA28345] rPath update for tetex [SA28342] Debian update for wzdftpd [SA28334] Debian update for maradns [SA28333] Debian update for freetype [SA28329] MaraDNS CNAME Record Resource Rotation Denial of Service [SA28386] Ubuntu update for cups [SA28338] Red Hat update for tog-pegasus [SA28404] Debian update for dovecot [SA28388] Gentoo update for unp [SA28385] Ubuntu update for pwlib [SA28375] IBM WebSphere Application Server for z/OS HTTP Server Vulnerability [SA28361] Debian update for tomcat5 [SA28360] Red Hat update for e2fsprogs [SA28352] Fedora update for mantis [SA28413] Ubuntu update for Net-SNMP [SA28401] Gentoo update for openafs [SA28376] Mandriva update for postgresql [SA28344] rPath update for cups [SA28343] Debian update for mysql-dfsg-5.0 [SA28327] OpenAFS File Server Denial of Service Vulnerability [SA28402] Gentoo update for claws-mail [SA28405] Xen DR7 and CR4 Register Handling Denial of Service Vulnerabilities [SA28349] Debian update for loop-aes-utils [SA28348] Debian update for util-linux [SA28339] Ubuntu update for tomboy Other: [SA28394] Ingate Firewall and SIParator Port Exhaustion Denial of Service [SA28357] Aruba Mobility Controller LDAP User Authentication Security Bypass [SA28364] Linksys WRT54GL Cross-Site Request Forgery Cross Platform: [SA28421] Kolab Server ClamAV Multiple Vulnerabilities [SA28420] osDate "php121dir" File Inclusion Vulnerability [SA28383] VLC Media Player SDP Processing Buffer Overflow Vulnerability [SA28368] VMware ESX Server Multiple Security Updates [SA28365] VMware ESX Server and VirtualCenter Multiple Security Updates [SA28363] HP-UX update for Thunderbird [SA28355] SAM Broadcaster samPHPweb "commonpath" File Inclusion Vulnerability [SA28336] Loudblog "template" Code Execution Vulnerability [SA28330] Strawberry "text" PHP Code Execution [SA28328] NetRisk Multiple Vulnerabilities [SA28414] R PCRE Multiple Vulnerabilities [SA28393] DomPHP "mail" SQL Injection Vulnerability [SA28382] Multiple Horde Products Security Bypass [SA28378] Docebo "Accept-Language" SQL Injection Vulnerability [SA28371] Eggblog "eggblogpassword" SQL Injection Vulnerability [SA28370] vtiger CRM File Disclosure Vulnerability [SA28362] Tribisur "id" and "cat" SQL Injection Vulnerabilities [SA28354] CherryPy Session Id Directory Traversal Vulnerability [SA28340] RunCms newbb_plus "Client-IP" SQL Injection [SA28331] eTicket Multiple Vulnerabilities [SA28409] MaxDB DBM Command Processing Command Execution Vulnerability [SA28358] OpenPegasus PAM Module Buffer Overflow Vulnerabilities [SA28369] NetRisk "page" Cross-Site Scripting Vulnerability [SA28356] Sun Java System Identity Manager Unspecified Cross-Site Scripting [SA28335] PRO-Search Multiple Cross-Site Scripting Vulnerabilities [SA28359] PostgreSQL Multiple Vulnerabilities ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA28399] AOL Radio AOLMediaPlaybackControl.exe Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2008-01-10 Will Dormann has reported a vulnerability in AOL Radio, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/28399/ -- [SA28379] Gateway CWebLaunchCtl ActiveX Control "DoWebLaunch()" Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2008-01-09 Some vulnerabilities have been discovered in Gateway CWebLaunchCtl ActiveX control, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28379/ -- [SA28411] IBM Lotus Domino Unspecified Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2008-01-10 A vulnerability has been reported in IBM Lotus Domino, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28411/ -- [SA28337] PortalApp Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Manipulation of data Released: 2008-01-09 r3dm0v3 has reported some vulnerabilities in PortalApp, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks or bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/28337/ -- [SA28408] McAfee E-Business Server Authentication Packet Handling Vulnerability Critical: Moderately critical Where: From local network Impact: System access, DoS Released: 2008-01-10 Leon Juranic has reported a vulnerability in McAfee E-Business Server, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28408/ -- [SA28396] Novell Client nicm.sys Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2008-01-10 A vulnerability has been reported in Novell Client, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/28396/ -- [SA28366] Motorola netOctopus Agent nantsys.sys Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2008-01-08 A vulnerability has been reported in Motorola netOctopus, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/28366/ -- [SA28351] Novell ZENworks Endpoint Security Management Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2008-01-07 A vulnerability has been reported in Novell ZENworks Endpoint Security Management, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/28351/ -- [SA28341] Microsoft Windows LSASS Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2008-01-08 A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/28341/ UNIX/Linux:-- [SA28412] SUSE Update for Multiple Packages Critical: Highly critical Where: From remote Impact: Unknown, Security Bypass, Manipulation of data, Exposure of sensitive information, DoS, System access Released: 2008-01-10 SUSE has issued an update for multiple packages. This fixes some vulnerabilities, where one vulnerability has unknown impacts and others can be exploited by malicious, local users to disclose and manipulate sensitive information and cause a DoS (Denial of Service), by malicious users to bypass certain security restrictions, and by malicious people to cause a DoS and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28412/ -- [SA28398] HP-UX update for Firefox Critical: Highly critical Where: From remote Impact: Spoofing, Manipulation of data, Exposure of sensitive information, System access Released: 2008-01-09 HP has issued an update for Firefox. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, conduct phishing and cross-site scripting attacks, manipulate certain data, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/28398/ -- [SA28406] Gentoo update for R Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information, DoS, System access Released: 2008-01-10 Gentoo has issued an update for R. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose sensitive information, or potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/28406/ -- [SA28403] Gentoo update for squid Critical: Moderately critical Where: From remote Impact: DoS Released: 2008-01-10 Gentoo has issued an update for squid. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28403/ -- [SA28400] Mandriva update for libexif Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2008-01-10 Mandriva has issued an update for libexif. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise an application using the library. Full Advisory: http://secunia.com/advisories/28400/ -- [SA28387] Avaya Products Perl Regular Expressions Unicode Data Buffer Overflow Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2008-01-09 Avaya has acknowledged a vulnerability in various Avaya products, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28387/ -- [SA28384] xine-lib SDP Attributes Buffer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2008-01-09 Luigi Auriemma has discovered a vulnerability in xine-lib, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/28384/ -- [SA28381] Ubuntu update for squid Critical: Moderately critical Where: From remote Impact: DoS Released: 2008-01-10 Ubuntu has issued an update for squid. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28381/ -- [SA28380] Ubuntu update for opal Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2008-01-09 Ubuntu has issued an update for opal. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/28380/ -- [SA28377] Debian update for libarchive Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2008-01-09 Debian has issued an update for libarchive. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/28377/ -- [SA28374] Debian update for fail2ban Critical: Moderately critical Where: From remote Impact: DoS Released: 2008-01-10 Debian has issued an update for fail2ban. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28374/ -- [SA28373] FlexBB "flexbb_temp_id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2008-01-08 Eugene Minaev has discovered a vulnerability in FlexBB, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/28373/ -- [SA28353] Fedora update for python-cherrypy Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2008-01-07 Fedora has issued an update for python-cherrypy. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/28353/ -- [SA28350] Mandriva update for squid Critical: Moderately critical Where: From remote Impact: DoS Released: 2008-01-07 Mandriva has issued an update for squid. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28350/ -- [SA28347] Debian update for eggdrop Critical: Moderately critical Where: From remote Impact: System access Released: 2008-01-07 Debian has issued an update for eggdrop. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28347/ -- [SA28346] rPath update for libexif Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2008-01-07 rPath has issued an update for libexif. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise an application using the library. Full Advisory: http://secunia.com/advisories/28346/ -- [SA28345] rPath update for tetex Critical: Moderately critical Where: From remote Impact: System access Released: 2008-01-07 rPath has issued an update for tetex, tetex-afm, tetex-dvips, tetex-fonts, tetex-latex, and tetex-xdvi. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/28345/ -- [SA28342] Debian update for wzdftpd Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2008-01-07 Debian has issued an update for wzdftpd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28342/ -- [SA28334] Debian update for maradns Critical: Moderately critical Where: From remote Impact: DoS Released: 2008-01-04 Debian has issued an update for maradns. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28334/ -- [SA28333] Debian update for freetype Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2008-01-08 Debian has issued an update for freetype. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/28333/ -- [SA28329] MaraDNS CNAME Record Resource Rotation Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2008-01-04 A vulnerability has been reported in MaraDNS, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28329/ -- [SA28386] Ubuntu update for cups Critical: Moderately critical Where: From local network Impact: Privilege escalation, DoS Released: 2008-01-09 Ubuntu has issued an update for cups. This fixes a vulnerability which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system, and a security issue which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/28386/ -- [SA28338] Red Hat update for tog-pegasus Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2008-01-08 Red Hat has issued an update for tog-pegasus. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28338/ -- [SA28404] Debian update for dovecot Critical: Less critical Where: From remote Impact: Security Bypass Released: 2008-01-10 Debian has issued an update for dovecot. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/28404/ -- [SA28388] Gentoo update for unp Critical: Less critical Where: From remote Impact: System access Released: 2008-01-09 Gentoo has issued an update for unp. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/28388/ -- [SA28385] Ubuntu update for pwlib Critical: Less critical Where: From remote Impact: DoS Released: 2008-01-09 Ubuntu has issued an update for pwlib. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28385/ -- [SA28375] IBM WebSphere Application Server for z/OS HTTP Server Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-01-09 IBM has acknowledged a vulnerability in IBM Websphere Application Server for z/OS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/28375/ -- [SA28361] Debian update for tomcat5 Critical: Less critical Where: From remote Impact: Exposure of sensitive information Released: 2008-01-08 Debian has issued an update for tomcat5. This fixes some vulnerabilities, which can be exploited by malicious people and malicious users to disclose sensitive information. Full Advisory: http://secunia.com/advisories/28361/ -- [SA28360] Red Hat update for e2fsprogs Critical: Less critical Where: From remote Impact: DoS, System access Released: 2008-01-08 Red Hat has issued an update for e2fsprogs. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/28360/ -- [SA28352] Fedora update for mantis Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-01-07 Fedora has issued an update for mantis. This fixes a vulnerability, which can be exploited by malicious users to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/28352/ -- [SA28413] Ubuntu update for Net-SNMP Critical: Less critical Where: From local network Impact: DoS Released: 2008-01-10 Ubuntu has issued an update for Net-SNMP. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28413/ -- [SA28401] Gentoo update for openafs Critical: Less critical Where: From local network Impact: DoS Released: 2008-01-10 Gentoo has issued an update for openafs. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28401/ -- [SA28376] Mandriva update for postgresql Critical: Less critical Where: From local network Impact: Privilege escalation, DoS Released: 2008-01-10 Mandriva has issued an update for postgresql. This fixes some vulnerabilities, which can be exploited by malicious users to gain escalated privileges or to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28376/ -- [SA28344] rPath update for cups Critical: Less critical Where: From local network Impact: DoS, System access Released: 2008-01-07 rPath has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28344/ -- [SA28343] Debian update for mysql-dfsg-5.0 Critical: Less critical Where: From local network Impact: Security Bypass, Manipulation of data, DoS Released: 2008-01-07 Debian has issued an update for mysql-dfsg-5.0. This fixes some security issues and a vulnerability, which can be exploited by malicious users to bypass certain security restrictions, manipulate data, and cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28343/ -- [SA28327] OpenAFS File Server Denial of Service Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2008-01-04 A vulnerability has been reported in OpenAFS, which can be exploited by malicious users to cause a DoS (Denial od Service). Full Advisory: http://secunia.com/advisories/28327/ -- [SA28402] Gentoo update for claws-mail Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2008-01-10 Gentoo has issued an update for claws-mail. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/28402/ -- [SA28405] Xen DR7 and CR4 Register Handling Denial of Service Vulnerabilities Critical: Not critical Where: Local system Impact: DoS Released: 2008-01-10 Some vulnerabilities have been reported in Xen, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28405/ -- [SA28349] Debian update for loop-aes-utils Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2008-01-07 Debian has issued an update for loop-aes-utils. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/28349/ -- [SA28348] Debian update for util-linux Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2008-01-07 Debian has issued an update for util-linux. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/28348/ -- [SA28339] Ubuntu update for tomboy Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2008-01-08 Ubuntu has issued an update for tomboy. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/28339/ Other:-- [SA28394] Ingate Firewall and SIParator Port Exhaustion Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2008-01-10 Ingate has acknowledged a vulnerability in Ingate Firewall and SIParator, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28394/ -- [SA28357] Aruba Mobility Controller LDAP User Authentication Security Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2008-01-07 A security issue has been reported in Aruba Mobility Controller, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/28357/ -- [SA28364] Linksys WRT54GL Cross-Site Request Forgery Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-01-09 Tomaz Bratusa has reported a vulnerability in Linksys WRT54GL, which can be exploited by malicious people to conduct cross-site request forgery attacks. Full Advisory: http://secunia.com/advisories/28364/ Cross Platform:-- [SA28421] Kolab Server ClamAV Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Unknown, DoS, System access Released: 2008-01-10 Some vulnerabilities have been reported in Kolab Server, where one vulnerability has an unknown impact and others can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28421/ -- [SA28420] osDate "php121dir" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2008-01-10 Cold z3ro has discovered a vulnerability in osDate, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28420/ -- [SA28383] VLC Media Player SDP Processing Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2008-01-10 Luigi Auriemma has reported a vulnerability in VLC Media Player, which can potentially be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/28383/ -- [SA28368] VMware ESX Server Multiple Security Updates Critical: Highly critical Where: From remote Impact: Privilege escalation, DoS, System access Released: 2008-01-08 VMware has issued an update for VMware ESX Server. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform actions with escalated privileges and by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28368/ -- [SA28365] VMware ESX Server and VirtualCenter Multiple Security Updates Critical: Highly critical Where: From remote Impact: Security Bypass, DoS, System access Released: 2008-01-08 VMware has issued updates for VMware ESX Server and VirtualCenter. These fix some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28365/ -- [SA28363] HP-UX update for Thunderbird Critical: Highly critical Where: From remote Impact: System access Released: 2008-01-09 HP has issued an update for Thunderbird. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/28363/ -- [SA28355] SAM Broadcaster samPHPweb "commonpath" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2008-01-07 Crackers_Child has discovered a vulnerability in the samPHPweb template included in SAM Broadcaster, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28355/ -- [SA28336] Loudblog "template" Code Execution Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2008-01-07 Eugene Minaev has discovered a vulnerability in Loudblog, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28336/ -- [SA28330] Strawberry "text" PHP Code Execution Critical: Highly critical Where: From remote Impact: System access Released: 2008-01-07 Eugene Minaev has discovered a vulnerability in Strawberry, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28330/ -- [SA28328] NetRisk Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Manipulation of data, System access Released: 2008-01-07 hadihadi and S.W.A.T. have discovered some vulnerabilities in NetRisk, which can be exploited by malicious people to conduct SQL injection attacks and to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28328/ -- [SA28414] R PCRE Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information, DoS, System access Released: 2008-01-10 Some vulnerabilities have been reported in R, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose sensitive information, or potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/28414/ -- [SA28393] DomPHP "mail" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-01-10 j0j0 has discovered a vulnerability in DomPHP, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/28393/ -- [SA28382] Multiple Horde Products Security Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2008-01-10 Some vulnerabilities have been reported in various Horde products, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/28382/ -- [SA28378] Docebo "Accept-Language" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-01-10 EgiX has discovered a vulnerability in Docebo, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/28378/ -- [SA28371] Eggblog "eggblogpassword" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-01-09 gemaglabin and Elekt have discovered a vulnerability in eggblog, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/28371/ -- [SA28370] vtiger CRM File Disclosure Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2008-01-10 A vulnerability has been reported in vtiger CRM, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/28370/ -- [SA28362] Tribisur "id" and "cat" SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-01-07 x0kster has discovered some vulnerabilities in Tribisur, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/28362/ -- [SA28354] CherryPy Session Id Directory Traversal Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2008-01-07 A vulnerability has been reported in CherryPy, which can be exploited by malicious people to bypass certain security settings. Full Advisory: http://secunia.com/advisories/28354/ -- [SA28340] RunCms newbb_plus "Client-IP" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-01-09 gemaglabin and Elekt have discovered a vulnerability in RunCms, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/28340/ -- [SA28331] eTicket Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2008-01-04 Some vulnerabilities have been discovered in eTicket, which can be exploited by malicious people to conduct script insertion, cross-site scripting, and SQL injection attacks, and by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/28331/ -- [SA28409] MaxDB DBM Command Processing Command Execution Vulnerability Critical: Moderately critical Where: From local network Impact: System access Released: 2008-01-10 Luigi Auriemma has discovered a vulnerability in MaxDB, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28409/ -- [SA28358] OpenPegasus PAM Module Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2008-01-08 Some vulnerabilities have been reported in OpenPegasus, which can potentially be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/28358/ -- [SA28369] NetRisk "page" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-01-07 hadihadi has discovered a vulnerability in NetRisk, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/28369/ -- [SA28356] Sun Java System Identity Manager Unspecified Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-01-10 Some vulnerabilities have been reported in Sun Java System Identity Manager, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/28356/ -- [SA28335] PRO-Search Multiple Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-01-04 MustLive has reported some vulnerabilities in PRO-Search, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/28335/ -- [SA28359] PostgreSQL Multiple Vulnerabilities Critical: Less critical Where: From local network Impact: Privilege escalation, DoS Released: 2008-01-07 Some vulnerabilities have been reported in PostgreSQL, which can be exploited by malicious users to gain escalated privileges or to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/28359/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 __________________________________________________________________ Visit InfoSec News http://www.infosecnews.org/
This archive was generated by hypermail 2.1.3 : Fri Jan 11 2008 - 00:56:27 PST