[ISN] Secunia Weekly Summary - Issue: 2008-11

From: InfoSec News (alerts@private)
Date: Fri Mar 14 2008 - 00:47:05 PST


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2008-03-06 - 2008-03-13                        

                       This week: 73 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Secunia invites you to join us in the biggest IT Expo event of the year
- the RSA Conference in the Moscone Center, San Francisco, California
from 7 to 11 April 2008. If you are interested in going to the expo
exhibit and meeting us, please contact your Secunia Account Executive
for a FREE EXPO PASS!

========================================================================
2) This Week in Brief:

A highly critical vulnerability has been discovered in RealPlayer,
which can be exploited by malicious people to compromise a user's
system.

The vulnerability is caused due to an error within the RealPlayer
ActiveX Control (rmoc3260.dll) when handling the "Console" property.
This can be exploited to cause a memory corruption and execute
arbitrary code when, for example, a user is tricked into visiting a
malicious website.

The vulnerability is confirmed in RealPlayer version 11.0.1 (build
6.0.14.794) including rmoc3260.dll version 6.0.10.45. Other versions
may also be affected. The vulnerability is currently unpatched, so
users are advised to set the kill-bit for the affected ActiveX control.

For more information, refer to: http://secunia.com/advisories/29315/

 --

Microsoft has released several Security Bulletins covering various
vulnerabilities. The fixed issues include a highly critical
vulnerability in Microsoft Outlook, two highly critical issues in
Microsoft Office, two highly critical issues in Microsoft Office Web
Components, and seven vulnerabilities in Microsoft Excel, including an
extremely critical in-the-wild exploit circulating since January 2008.

For more information, refer to the following:

http://secunia.com/advisories/29320/
http://secunia.com/advisories/29321/
http://secunia.com/advisories/29328/
http://secunia.com/advisories/28506/

To find out if your home computer is vulnerable to any of these
security problems, scan using the free Personal Software Inspector.
Check if a vulnerable version is installed on computers in your
corporate network, using the Network Software Inspector.

Download the Secunia PSI:
https://psi.secunia.com/

 --

Some vulnerabilities have been reported in MailEnable, which can be
exploited by malicious people and malicious users to cause a DoS
(Denial of Service) or by malicious users to compromise a vulnerable
system.

Some of the vulnerabilities are caused due to boundary errors within
the SMTP service (MESMTPC.exe) when handling EXPN or VRFY commands.
These can be exploited to cause the service to crash via a specially
crafted EXPN or VRFY command.

The vendor has issued a hotfix for the issues. For more information,
including the solution, refer to:
http://secunia.com/advisories/29300/

Some boundary errors in the IMAP service (MEIMAPS.EXE) when handling
arguments passed to the FETCH, EXAMINE, and UNSUBSCRIBE commands can be
exploited to cause buffer overflows via overly long arguments.
Successful exploitation allows execution of arbitrary code.

In addition, errors in the IMAP service when handling the SEARCH and
APPEND commands can be exploited to cause the service to crash.

These vulnerabilities are confirmed in MailEnable Professional version
3.13. Other versions may also be affected. No solution is currently
available.

For more information, refer to:
http://secunia.com/advisories/29277/

 --

VIRUS ALERTS:

During the past week Secunia collected 95 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA29239] Sun Java JDK / JRE Multiple Vulnerabilities
2.  [SA29315] RealPlayer ActiveX Control "Console" Property Memory
              Corruption
3.  [SA29228] SynCE vdccm Denial of Service and Command Injection
4.  [SA29227] WebCT Mail/Discussion Board Message Script Insertion
5.  [SA29285] Fedora update for vdccm
6.  [SA29238] FreeBSD ppp Buffer Overflow Vulnerability
7.  [SA29269] Fedora update for kronolith
8.  [SA29240] user-ppp "command_Expand_Interpret()" Buffer Overflow
              Vulnerability
9.  [SA29255] BosDates Cross-Site Scripting Vulnerabilities
10. [SA29273] Red Hat update for java-1.5.0-sun

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA29351] Cisco User-Changeable Password Multiple Vulnerabilities
[SA29330] Adobe Form Designer/Form Client Buffer Overflow
Vulnerabilities
[SA29328] Microsoft Office Web Components Two Vulnerabilities
[SA29321] Microsoft Office Two Code Execution Vulnerabilities
[SA29320] Microsoft Outlook "mailto:" URI Handling Vulnerability
[SA29315] RealPlayer ActiveX Control "Console" Property Memory
Corruption
[SA29326] StoreFront "CategoryId" SQL Injection Vulnerability
[SA29300] MailEnable SMTP Service EXPN/VRFY Denial of Service
Vulnerabilities
[SA29337] McAfee ePolicy Orchestrator Framework Service Format String
Vulnerability
[SA29346] Internet Explorer FTP Command Injection Vulnerability
[SA29331] Adobe LiveCycle Workflow Web Management Login Cross-Site
Scripting Vulnerability
[SA29308] PacketTrap pt360 TFTP Filename Handling Denial of Service
[SA29306] Acronis True Image Echo Group Server and Windows Agent Denial
of Service
[SA29305] Acronis Snap Deploy PXE Server TFTP Vulnerabilities
[SA29302] Argon Client Management Services TFTP Server Directory
Traversal
[SA29296] RemotelyAnywhere Web Interface Multiple Vulnerabilities
[SA29319] Symantec Altiris Deployment Solution Server Agent Privilege
Escalation
[SA29311] Panda Products cpoint.sys Privilege Escalation
Vulnerabilities

UNIX/Linux:
[SA29340] Red Hat update for java-1.4.2-bea
[SA29329] Mapbender SQL and PHP Code Injection
[SA29314] Gentoo update for ghostscript
[SA29309] Gentoo update for sarg
[SA29307] Gentoo update for mplayer
[SA29375] Fedora update for roundup
[SA29374] Fedora update for horde
[SA29371] UnixWare update for openssh
[SA29364] rPath update for dovecot
[SA29358] XOOPS Tutorials Module "tid" SQL Injection
[SA29357] Fedora update for ruby
[SA29336] Roundup Multiple Vulnerabilities
[SA29333] Gentoo update for icu
[SA29299] QuickTicket "id" SQL Injection Vulnerability
[SA29295] Dovecot Authentication Bypass Vulnerability
[SA29291] Sun Solaris ICU Regular Expressions Vulnerabilities
[SA29288] QuickTalk forum "id" SQL Injection Vulnerability
[SA29341] HP-UX HP CIFS Server Multiple Vulnerabilities
[SA29285] Fedora update for vdccm
[SA29354] Debian update for libnet-dns-perl
[SA29348] Gentoo update for apache
[SA29327] Sun Java Server Faces Input Handling Cross-Site Scripting
[SA29318] rPath update for lighttpd
[SA29313] Red Hat update for tomcat
[SA29304] Gentoo update for pdflib
[SA29303] Ubuntu update for python
[SA29290] Sun Java Web Console Information Disclosure Security Issue
[SA29287] Gentoo update for phpmyadmin
[SA29370] UnixWare "pkgadd" Directory Traversal Vulnerability
[SA29360] IBM WebSphere MQ for HP NonStop Missing Authentication
[SA29350] Red Hat Directory Server Insecure Directory Permissions
[SA29349] IBM AIX Multiple Vulnerabilities
[SA29347] IBM AIX "reboot" Buffer Overflow Vulnerability
[SA29301] AIX "man" Insecure Program Execution Vulnerability
[SA29368] Sun Solaris JDS XscreenSaver Authentication Bypass
[SA29352] Sun Solaris 10 Inter-Process Communication Denial of Service

Other:


Cross Platform:
[SA29316] Motorola Timbuktu Pro Denial of Service and Directory
Traversal Vulnerabilities
[SA29312] MaxDB Multiple Vulnerabilities
[SA29373] EasyCalendar SQL Injection and Cross-Site Scripting
[SA29372] EasyGallery SQL Injection and Cross-Site Scripting
[SA29362] eXV2 bamaGalerie "cid" SQL Injection Vulnerability
[SA29359] eXV2 Bama Galerie Module "cid" SQL Injection
[SA29339] Fully Modded phpBB "k" SQL Injection Vulnerability
[SA29338] Bloo Multiple SQL Injection Vulnerabilities
[SA29335] IBM WebSphere Application Server Multiple Vulnerabilities
[SA29322] PHP-Nuke Hadith Module "cat" SQL Injection
[SA29297] BM Classifieds Two SQL Injection Vulnerabilities
[SA29292] Joomla! eWriting Component "cat" SQL Injection
[SA29286] Horde "theme" Local File Inclusion Vulnerability
[SA29289] ASG-Sentry Network Manager Multiple Vulnerabilities
[SA29355] Polymita BPM-Suite / CollagePortal Cross-Site Scripting
Vulnerabilities
[SA29343] Perl Net::DNS Module DNS Response Denial of Service
[SA29332] Adobe ColdFusion Multiple Vulnerabilities
[SA29310] ManageEngine ServiceDesk Plus Cross-Site Scripting
Vulnerability
[SA29298] Savvy Content Manager "searchterms" Cross-Site Scripting

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA29351] Cisco User-Changeable Password Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, DoS, System access
Released:    2008-03-13

Some vulnerabilities have been reported in Cisco User-Changeable
Password (UCP), which can be exploited by malicious people to conduct
cross-site scripting attacks or potentially to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/29351/

 --

[SA29330] Adobe Form Designer/Form Client Buffer Overflow
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-03-12

Some vulnerabilities have been reported in Adobe Form Designer and Form
Client, which can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/29330/

 --

[SA29328] Microsoft Office Web Components Two Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-03-11

Two vulnerabilities have been reported in Microsoft Office Web
Components, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/29328/

 --

[SA29321] Microsoft Office Two Code Execution Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-03-11

Two vulnerabilities have been reported in Microsoft Office, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/29321/

 --

[SA29320] Microsoft Outlook "mailto:" URI Handling Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-03-11

A vulnerability has been reported in Microsoft Outlook, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/29320/

 --

[SA29315] RealPlayer ActiveX Control "Console" Property Memory
Corruption

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-03-11

Elazar Broad has discovered a vulnerability in RealPlayer, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/29315/

 --

[SA29326] StoreFront "CategoryId" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-03-13

Nick Merritt has reported a vulnerability in StoreFront, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/29326/

 --

[SA29300] MailEnable SMTP Service EXPN/VRFY Denial of Service
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2008-03-10

Some vulnerabilities have been reported in MailEnable, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/29300/

 --

[SA29337] McAfee ePolicy Orchestrator Framework Service Format String
Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2008-03-13

Luigi Auriemma has discovered a vulnerability in McAfee ePolicy
Orchestrator, which can be exploited by malicious people to cause a DoS
(Denial of Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/29337/

 --

[SA29346] Internet Explorer FTP Command Injection Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-03-12

Derek Abdine has discovered a vulnerability in Internet Explorer, which
can be exploited by malicious people to conduct FTP command injection
attacks.

Full Advisory:
http://secunia.com/advisories/29346/

 --

[SA29331] Adobe LiveCycle Workflow Web Management Login Cross-Site
Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-03-12

Dave Lewis has reported a vulnerability in Adobe LiveCycle Workflow,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/29331/

 --

[SA29308] PacketTrap pt360 TFTP Filename Handling Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2008-03-10

Luigi Auriemma has reported a vulnerability in PacketTrap pt360 TFTP
server, which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/29308/

 --

[SA29306] Acronis True Image Echo Group Server and Windows Agent Denial
of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2008-03-10

Luigi Auriemma has reported some vulnerabilities in Acronis True Image
Echo, which can be exploited by malicious people to cause a DoS (Denial
of Service).

Full Advisory:
http://secunia.com/advisories/29306/

 --

[SA29305] Acronis Snap Deploy PXE Server TFTP Vulnerabilities

Critical:    Less critical
Where:       From local network
Impact:      Exposure of sensitive information, DoS
Released:    2008-03-10

Luigi Auriemma has reported some vulnerabilities in Acronis Snap
Deploy, which can be exploited by malicious people to disclose
sensitive information or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/29305/

 --

[SA29302] Argon Client Management Services TFTP Server Directory
Traversal

Critical:    Less critical
Where:       From local network
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2008-03-10

Luigi Auriemma has discovered a vulnerability in Argon Client
Management Services, which can be exploited by malicious people to
disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/29302/

 --

[SA29296] RemotelyAnywhere Web Interface Multiple Vulnerabilities

Critical:    Less critical
Where:       From local network
Impact:      Cross Site Scripting, DoS
Released:    2008-03-10

Luigi Auriemma and Patrick have reported some vulnerabilities in
RemotelyAnywhere, which can be exploited by malicious people to conduct
cross-site scripting attacks or to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/29296/

 --

[SA29319] Symantec Altiris Deployment Solution Server Agent Privilege
Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2008-03-11

A vulnerability has been reported in Symantec Altiris Deployment
Solution, which can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/29319/

 --

[SA29311] Panda Products cpoint.sys Privilege Escalation
Vulnerabilities

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation, DoS
Released:    2008-03-10

Tobias Klein has reported some vulnerabilities in Panda products, which
can be exploited by malicious, local users to cause a DoS (Denial of
Service) or gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/29311/


UNIX/Linux:--

[SA29340] Red Hat update for java-1.4.2-bea

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data, Exposure of system
information, Exposure of sensitive information, DoS, System access
Released:    2008-03-12

Red Hat has issued an update for java-1.4.2-bea. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, disclose potentially sensitive/system
information, cause a DoS (Denial of Service), manipulate data, or
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/29340/

 --

[SA29329] Mapbender SQL and PHP Code Injection

Critical:    Highly critical
Where:       From remote
Impact:      Manipulation of data, System access
Released:    2008-03-13

RedTeam Pentesting has reported some vulnerabilities in Mapbender,
which can be exploited by malicious people to  conduct SQL injection
attacks or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/29329/

 --

[SA29314] Gentoo update for ghostscript

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-03-10

Gentoo has issued an update for ghostscript-esp, ghostscript-gpl, and
ghostscript-gnu. This fixes a vulnerability, which can be exploited by
malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/29314/

 --

[SA29309] Gentoo update for sarg

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, System access
Released:    2008-03-13

Gentoo has issued an update for sarg. This fixes some vulnerabilities,
which can be exploited by malicious people to conduct script insertion
attacks or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/29309/

 --

[SA29307] Gentoo update for mplayer

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-03-11

Gentoo has issued an update for mplayer. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/29307/

 --

[SA29375] Fedora update for roundup

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, Security Bypass
Released:    2008-03-13

Fedora has issued an update for roundup. This fixes some
vulnerabilities with unknown impacts, and a security issue, which can
be exploited by malicious users to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/29375/

 --

[SA29374] Fedora update for horde

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2008-03-13

Fedora has issued an update for horde. This fixes a vulnerability,
which can be exploited by malicious users to to disclose sensitive
information and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/29374/

 --

[SA29371] UnixWare update for openssh

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2008-03-13

SCO has issued an update for openssh. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/29371/

 --

[SA29364] rPath update for dovecot

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-03-13

rPath has issued an update for dovecot. This fixes a vulnerability,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/29364/

 --

[SA29358] XOOPS Tutorials Module "tid" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-03-13

S@BUN has discovered a vulnerability in the Tutorials module for XOOPS,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/29358/

 --

[SA29357] Fedora update for ruby

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2008-03-13

Fedora has issued an update for ruby. This fixes some vulnerabilities,
which can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/29357/

 --

[SA29336] Roundup Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, Security Bypass
Released:    2008-03-13

Multiple vulnerabilities and a security issue have been reported in
Roundup, some of which have unknown impacts, while others can be
exploited by malicious users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/29336/

 --

[SA29333] Gentoo update for icu

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-03-12

Gentoo has issued an update for icu. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/29333/

 --

[SA29299] QuickTicket "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-03-10

croconile has discovered a vulnerability in QuickTicket, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/29299/

 --

[SA29295] Dovecot Authentication Bypass Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-03-10

A vulnerability has been reported in Dovecot, which can be exploited by
malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/29295/

 --

[SA29291] Sun Solaris ICU Regular Expressions Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-03-10

Sun has acknowledged some vulnerabilities in Solaris, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
potentially compromise an application using the ICU library.

Full Advisory:
http://secunia.com/advisories/29291/

 --

[SA29288] QuickTalk forum "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-03-12

t0pP8uZz & xprog have discovered a vulnerability in QuickTalk forum,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/29288/

 --

[SA29341] HP-UX HP CIFS Server Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2008-03-12

HP has acknowledged some vulnerabilities in HP-UX, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/29341/

 --

[SA29285] Fedora update for vdccm

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2008-03-07

Fedora has issued an update for vdccm. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/29285/

 --

[SA29354] Debian update for libnet-dns-perl

Critical:    Less critical
Where:       From remote
Impact:      Spoofing, DoS
Released:    2008-03-12

Debian has issued an update for libnet-dns-perl. This fixes some
vulnerabilities, which can be exploited by malicious people to poison
the DNS cache or to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/29354/

 --

[SA29348] Gentoo update for apache

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, DoS
Released:    2008-03-12

Gentoo has issued an update for apache. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting attacks and by malicious users to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/29348/

 --

[SA29327] Sun Java Server Faces Input Handling Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-03-11

Sun has acknowledged a vulnerability in Java Server Faces, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/29327/

 --

[SA29318] rPath update for lighttpd

Critical:    Less critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2008-03-13

rPath has issued an update for lighttpd. This fixes some security
issues, which can be exploited by malicious people to disclose
potentially sensitive information.

Full Advisory:
http://secunia.com/advisories/29318/

 --

[SA29313] Red Hat update for tomcat

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information
Released:    2008-03-11

Red Hat has issued an update for tomcat. This fixes a security issue
and a vulnerability, which can be exploited by malicious, local users
to bypass certain security restrictions and by malicious users to
disclose potentially sensitive information.

Full Advisory:
http://secunia.com/advisories/29313/

 --

[SA29304] Gentoo update for pdflib

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-03-11

Gentoo has issued an update for pdflib. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/29304/

 --

[SA29303] Ubuntu update for python

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information, DoS, System access
Released:    2008-03-11

Ubuntu has issued an update for python. This fixes two security issues,
which can be exploited by malicious people to disclose potentially
sensitive information, to cause a DoS (Denial of Service), or to
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/29303/

 --

[SA29290] Sun Java Web Console Information Disclosure Security Issue

Critical:    Less critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2008-03-10

A security issue has been reported in Sun Java Web Console, which can
be exploited by malicious people to disclose certain information.

Full Advisory:
http://secunia.com/advisories/29290/

 --

[SA29287] Gentoo update for phpmyadmin

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-03-10

Gentoo has issued an update for phpmyadmin. This fixes a vulnerability,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/29287/

 --

[SA29370] UnixWare "pkgadd" Directory Traversal Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2008-03-13

A vulnerability has been reported in UnixWare, which can be exploited
by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/29370/

 --

[SA29360] IBM WebSphere MQ for HP NonStop Missing Authentication

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass, Manipulation of data
Released:    2008-03-13

A security issue has been reported in IBM WebSphere MQ for HP NonStop,
which can be exploited by malicious, local users to bypass certain
security restrictions or manipulate certain data.

Full Advisory:
http://secunia.com/advisories/29360/

 --

[SA29350] Red Hat Directory Server Insecure Directory Permissions

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2008-03-12

A vulnerability has been reported in Red Hat Directory Server, which
can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/29350/

 --

[SA29349] IBM AIX Multiple Vulnerabilities

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass, Exposure of system information, Exposure
of sensitive information, Privilege escalation, DoS
Released:    2008-03-12

Some vulnerabilities are reported in IBM AIX, which can be exploited by
malicious, local users to cause a DoS (Denial of Service), bypass
certain security restrictions, disclose sensitive information, or to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/29349/

 --

[SA29347] IBM AIX "reboot" Buffer Overflow Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2008-03-12

A vulnerability has been reported in IBM AIX, which can be exploited by
malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/29347/

 --

[SA29301] AIX "man" Insecure Program Execution Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2008-03-10

A vulnerability has been reported in AIX, which can be exploited by
malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/29301/

 --

[SA29368] Sun Solaris JDS XscreenSaver Authentication Bypass

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2008-03-13

A vulnerability has been reported in Sun Solaris, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/29368/

 --

[SA29352] Sun Solaris 10 Inter-Process Communication Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2008-03-12

A vulnerability has been reported in Sun Solaris, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/29352/


Other:


Cross Platform:--

[SA29316] Motorola Timbuktu Pro Denial of Service and Directory
Traversal Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-03-11

Some vulnerabilities have been discovered in Motorola Timbuktu Pro,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or compromise a user's system.

Full Advisory:
http://secunia.com/advisories/29316/

 --

[SA29312] MaxDB Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Privilege escalation, System access
Released:    2008-03-11

Some vulnerabilities have been reported in MaxDB, which can be
exploited by malicious, local users to gain escalated privileges, and
by malicious people to potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/29312/

 --

[SA29373] EasyCalendar SQL Injection and Cross-Site Scripting

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2008-03-13

JosS has discovered some vulnerabilities in EasyCalendar, which can be
exploited by malicious people to conduct cross-site scripting and SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/29373/

 --

[SA29372] EasyGallery SQL Injection and Cross-Site Scripting

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2008-03-13

JosS has discovered some vulnerabilities in EasyGallery, which can be
exploited by malicious people to conduct cross-site scripting and SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/29372/

 --

[SA29362] eXV2 bamaGalerie "cid" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-03-13

A vulnerability has been discovered in eXV2, which can be exploited by
malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/29362/

 --

[SA29359] eXV2 Bama Galerie Module "cid" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-03-13

S@BUN has discovered a vulnerability in the Bama Galerie module for
eXV2, which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/29359/

 --

[SA29339] Fully Modded phpBB "k" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-03-13

TurkishWarriorr has discovered a vulnerability in Fully Modded phpBB,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/29339/

 --

[SA29338] Bloo Multiple SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-03-12

MhZ91 has reported some vulnerabilities in Bloo, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/29338/

 --

[SA29335] IBM WebSphere Application Server Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, Exposure of sensitive information
Released:    2008-03-12

Some vulnerabilities and security issues have been reported in IBM
WebSphere Application Server, some of which have unknown impacts while
others can potentially be exploited by malicious, local users to gain
knowledge of sensitive information.

Full Advisory:
http://secunia.com/advisories/29335/

 --

[SA29322] PHP-Nuke Hadith Module "cat" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-03-11

Lovebug has reported a vulnerability in the Hadith module for PHP-Nuke,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/29322/

 --

[SA29297] BM Classifieds Two SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-03-10

xcorpitx has reported two vulnerabilities in BM Classifieds, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/29297/

 --

[SA29292] Joomla! eWriting Component "cat" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-03-11

breaker_unit & Don have discovered a vulnerability in the eWriting
component for Joomla!, which can be exploited by malicious people to
conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/29292/

 --

[SA29286] Horde "theme" Local File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2008-03-10

A vulnerability has been reported in various Horde products, which can
be exploited by malicious users to disclose sensitive information and
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/29286/

 --

[SA29289] ASG-Sentry Network Manager Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      Security Bypass, Manipulation of data, DoS, System access
Released:    2008-03-11

Luigi Auriemma has reported some vulnerabilities and a security issue
in ASG-Sentry Network Manager, which can be exploited by malicious
people to manipulate certain data, bypass certain security
restrictions, cause a DoS (Denial of Service), or compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/29289/

 --

[SA29355] Polymita BPM-Suite / CollagePortal Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-03-13

Russ McRee has reported some vulnerabilities in Polymita BPM-Suite and
CollagePortal, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/29355/

 --

[SA29343] Perl Net::DNS Module DNS Response Denial of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2008-03-12

Beyond Security has reported a vulnerability in the Net::DNS Perl
module, which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/29343/

 --

[SA29332] Adobe ColdFusion Multiple Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting
Released:    2008-03-12

Some vulnerabilities and a weakness have been reported in Adobe
ColdFusion, which can be exploited by malicious people to bypass
certain security restrictions and to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/29332/

 --

[SA29310] ManageEngine ServiceDesk Plus Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-03-11

Yogesh Kulkarni has discovered a vulnerability in ManageEngine
ServiceDesk Plus, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/29310/

 --

[SA29298] Savvy Content Manager "searchterms" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-03-11

Russ McRee has reported a vulnerability in Savvy Content Manager, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/29298/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


___________________________________________________      
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn 



This archive was generated by hypermail 2.1.3 : Fri Mar 14 2008 - 00:56:37 PST