[ISN] Secunia Weekly Summary - Issue: 2008-19

From: InfoSec News (alerts@private)
Date: Fri May 09 2008 - 05:47:40 PDT


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2008-05-01 - 2008-05-08                        

                       This week: 62 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Secunia is pleased to announce that we are sponsoring the upcoming
Gartner IT Security Summit from June 2 to 4 in Washington, DC. The
event brings together Gartner analysts, leading executives, and
innovators to present research, case studies, and insight into the
business-critical aspect of IT.

If you would like to meet with Secunia representatives in the
conference, you can get a $400 discount off the regular registration
fee. Please contact pr@private to receive the priority code and
schedule the meeting.

========================================================================
2) This Week in Brief:

Multiple vulnerabilities in PHP have been reported, some of which have
unknown impacts and others, which can be exploited by malicious users
to bypass certain security restrictions, and potentially by malicious
people to cause a DoS (Denial of Service) or to compromise a vulnerable
system.

An unspecified error in the FastCGI SAPI can be exploited to cause a
stack-based buffer overflow.

An error in the processing of multibyte characters within the
"escapeshellcmd()" and "escapeshellarg()" functions can be exploited to
escape the inserted backslash or quote characters via certain multibyte
characters. Successful exploitation of this vulnerability allows to
bypass the "safe_mode_exec_dir" and "disable_functions" directives, and
potentially to inject arbitrary shell commands via user controlled
input, but requires that the shell uses a locale with a variable width
character (e.g. GBK, EUC-KR, SJIS).

A vulnerability is caused due to an error during path translation in
cgi_main.c. This can potentially be exploited to execute arbitrary
code, but depends on how a targeted application is using PHP.

An error in cURL can be exploited to bypass the "safe_mode" directive.

A boundary error in PCRE can potentially be exploited by malicious
people to cause a DoS or compromise a vulnerable system. This may be
related to a previously reported vulnerability in PCRE.

A weakness in the "GENERATE_SEED()" macro has also been reported.

Version 5.2.6 has been released by the developers, resolving these
issues. For more information, refer to:
http://secunia.com/advisories/30048/

 --

Some vulnerabilities have been reported in the Linux kernel, which can
be exploited by malicious people to cause a DoS (Denial of Service),
and by malicious, local users to cause a DoS or to potentially gain
escalated privileges.

A race condition error exists in the dnotify subsystem between calls to
"fcntl()" and "close()". This can be exploited to cause a system crash
or potentially gain root privileges.

A boundary error in the Tehuti network driver can be exploited to
corrupt kernel memory via specially crafted "BDX_OP_WRITE" IOCTL calls.

An error exists in the implementation of the IPsec protocol. This can
be exploited to crash an affected system via fragmented ESP packets.
Successful exploitation of this vulnerability requires the ability to
manipulate network packets sent from an authenticated IPsec peer.

The vulnerabilities are resolved in Linux Kernel version 2.6.25. For
more information, refer to:
http://secunia.com/advisories/30044/

Various Linux distributions have also released kernel updates.

 --

A highly critical vulnerability has been reported in multiple Adobe
products, which potentially can be exploited by malicious people to
compromise a user's system.

The vulnerability is caused due to a boundary error when handling BMP
files. This can be exploited to cause a buffer overflow via a BMP file
having a malformed header.

Successful exploitation may allow execution of arbitrary code via a
specially crafted BMP file.

Reportedly, the vulnerability can also be exploited when a malicious
storage device (e.g. USB drives, cameras) is being attached to a
vulnerable computer. It currently is unpatched.

The vulnerability is reported in Adobe Photoshop Album Starter Edition
3.2 and Adobe After Effects CS3. Other versions may also be affected.

For more information, refer to:
http://secunia.com/advisories/29838/

 --

VIRUS ALERTS:

During the past week Secunia collected 167 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA30048] PHP Multiple Vulnerabilities
2.  [SA30044] Linux Kernel Multiple Vulnerabilities
3.  [SA29969] Novell GroupWise WebAccess Script Insertion
4.  [SA30037] Akamai Download Manager Code Execution Vulnerability
5.  [SA29976] IBM WebSphere Application Server Java Plugin Security
              Bypass
6.  [SA30041] Animal Shelter Manager Multiple Security Bypass
              Vulnerabilities
7.  [SA29985] WebGUI Data Form List View Unspecified Vulnerability
8.  [SA29998] angelo-emlak Cross-Site Scripting and SQL Injection
              Vulnerabilities
9.  [SA30039] AstroCam "picfile" Cross-Site Scripting Vulnerability
10. [SA30018] Debian update for kernel

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA30127] PostcardMentor "cat_fldAuto" SQL Injection Vulnerability
[SA30103] fipsCMS "lg" SQL Injection Vulnerability
[SA30128] SAP Internet Transaction Server wgate.dll Cross-Site
Scripting Vulnerability
[SA30074] SysAid "searchField" Cross-Site Scripting Vulnerability
[SA30063] Invensys Wonderware InTouch SuiteLink Service Denial of
Service

UNIX/Linux:
[SA30124] NetBSD update for OpenSSL
[SA30105] Ubuntu update for thunderbird
[SA30100] Ubuntu update for openoffice.org
[SA30073] Gentoo update for egroupware
[SA30129] Sun Solaris Tk GIF Processing Buffer Overflow
Vulnerabilities
[SA30118] rdesktop Multiple Vulnerabilities
[SA30106] Debian update for kazehakase
[SA30097] Debian update for blender
[SA30095] SIPp Two Buffer Overflow Vulnerabilities
[SA30090] Online Rental Property Script "pid" SQL Injection
[SA30078] Ubuntu update for cups
[SA30131] Sun Solaris TCP Implementation SYN Flood Denial of Service
[SA30130] Sun Ray Server Software Kiosk Mode Vulnerability
[SA30080] ChiCoMaS "q" Cross-Site Scripting Vulnerability
[SA30112] Red Hat update for kernel
[SA30099] Ubuntu update for ldm
[SA30132] HP-UX LDAP-UX Privilege Escalation Vulnerability
[SA30116] Red Hat update for kernel
[SA30114] HP-UX update for Netscape Directory Server
[SA30113] Ubuntu update for kdelibs
[SA30111] QEMU "drive_init()" Disk Format Security Bypass
[SA30110] Red Hat update for kernel
[SA30109] Ubuntu update for emacs
[SA30108] Linux Kernel Multiple Vulnerabilities
[SA30086] Sun Solaris SSH X11 Forwarding Vulnerability
[SA30093] Debian update for b2evolution
[SA30101] Linux Kernel "fcntl_setlk()" SMP Reordered Access
Vulnerability
[SA30077] rPath update for kernel

Other:


Cross Platform:
[SA30059] ITCms Arbitrary PHP Code Execution Vulnerability
[SA30123] Galleristic "cat" SQL Injection Vulnerability
[SA30122] Sun Java System Web Server / Application Server JSP
Information Disclosure
[SA30107] Musicbox "artistId" SQL Injection Vulnerability
[SA30091] mvnForum "QuickReply" Script Insertion Vulnerability
[SA30089] Auction XL "viewfaqs.php" SQL Injection Vulnerability
[SA30085] Miniweb "historymonth" SQL Injection Vulnerability
[SA30084] DeluxeBB SQL Injection and PHP Code Execution
[SA30076] PHPEasyData "cat_id" SQL Injection Vulnerability
[SA30069] Maian Greetings Cross-Site Scripting and SQL Injection
Vulnerabilities
[SA30061] Nuke ET Security Bypass and Script Insertion Vulnerabilities
[SA30058] BlogMe PHP "id" SQL Injection Vulnerability
[SA30057] SMartBlog Multiple Vulnerabilities
[SA30056] phpDirectorySource SQL Injection Vulnerabilities
[SA30133] Sun Java System Web Server Search Module Cross-Site Scripting
Vulnerability
[SA30121] Tux CMS Multiple Cross-Site Scripting Vulnerabilities
[SA30098] CMS Faethon "what" Cross-Site Scripting Vulnerability
[SA30092] LifeType "newBlogUserName" Cross-Site Scripting
[SA30082] Sphider Suggestion Feature "query" Cross-Site Scripting
Vulnerability
[SA30079] TYPO3 powermail Extension Cross-Site Scripting Vulnerability
[SA30075] LifeType "searchTerms" Cross-Site Scripting Vulnerability
[SA30070] Maian Gallery "keywords" Cross-Site Scripting Vulnerability
[SA30068] Maian Support Multiple Cross-Site Scripting Vulnerabilities
[SA30065] Maian Links Multiple Cross-Site Scripting Vulnerabilities
[SA30064] Bugzilla Security Bypass and Cross-Site Scripting
Vulnerabilities
[SA30062] Zomplog "catname" Cross-Site Scripting Vulnerability
[SA30060] Maian Weblog Multiple Cross-Site Scripting Vulnerabilities
[SA30081] IBM Rational Build Forge Denial of Service
[SA30134] MySQL MyISAM Table Privilege Check Bypass

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA30127] PostcardMentor "cat_fldAuto" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-05-08

InjEctOr5 has reported a vulnerability in PostcardMentor, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/30127/

 --

[SA30103] fipsCMS "lg" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-05-08

InjEctOr has reported a vulnerability in fipsCMS, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/30103/

 --

[SA30128] SAP Internet Transaction Server wgate.dll Cross-Site
Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-05-08

A vulnerability has been reported in SAP Internet Transaction Server,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/30128/

 --

[SA30074] SysAid "searchField" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-05-05

Yogesh Kulkarni has discovered a vulnerability in SysAid, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/30074/

 --

[SA30063] Invensys Wonderware InTouch SuiteLink Service Denial of
Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2008-05-06

Core Security Technologies has reported a vulnerability in Invensys
Wonderware InTouch, which can be exploited by malicious people to cause
a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/30063/


UNIX/Linux:--

[SA30124] NetBSD update for OpenSSL

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-05-08

NetBSD has issued an update for OpenSSL. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/30124/

 --

[SA30105] Ubuntu update for thunderbird

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, System access
Released:    2008-05-07

Ubuntu has issued an update for thunderbird. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, conduct cross-site scripting attacks, or
potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/30105/

 --

[SA30100] Ubuntu update for openoffice.org

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-05-07

Ubuntu has issued an update for openoffice.org. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/30100/

 --

[SA30073] Gentoo update for egroupware

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, System access
Released:    2008-05-08

Gentoo has issued an update for egroupware. This fixes a vulnerability,
which can be exploited by malicious people to bypass certain security
restrictions and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/30073/

 --

[SA30129] Sun Solaris Tk GIF Processing Buffer Overflow
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-05-08

Sun has acknowledged some vulnerabilities in the Tcl GUI Toolkit
Library included in Solaris, which can be exploited by malicious people
to compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/30129/

 --

[SA30118] rdesktop Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2008-05-08

Some vulnerabilities have been reported in rdesktop, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/30118/

 --

[SA30106] Debian update for kazehakase

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, DoS, System access
Released:    2008-05-07

Debian has issued an update for kazehakase. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service), disclose potentially sensitive information,
and compromise a user's system.

Full Advisory:
http://secunia.com/advisories/30106/

 --

[SA30097] Debian update for blender

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2008-05-06

Debian has issued an update for blender. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/30097/

 --

[SA30095] SIPp Two Buffer Overflow Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-05-06

Two vulnerabilities have been reported in SIPp, which can be exploited
by malicious people to cause a DoS (Denial of Service) or to
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/30095/

 --

[SA30090] Online Rental Property Script "pid" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-05-06

M.Hasran Addahroni has reported a vulnerability in Online Rental
Property Script, which can be exploited by malicious people to conduct
SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/30090/

 --

[SA30078] Ubuntu update for cups

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2008-05-06

Ubuntu has issued an update for cups. This fixes a vulnerability, which
potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/30078/

 --

[SA30131] Sun Solaris TCP Implementation SYN Flood Denial of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2008-05-08

A vulnerability has been reported in Sun Solaris, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/30131/

 --

[SA30130] Sun Ray Server Software Kiosk Mode Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2008-05-08

A vulnerability has been reported in Sun Ray Server Software, which can
be exploited by malicious users to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/30130/

 --

[SA30080] ChiCoMaS "q" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-05-05

Hadi Kiamarsi has discovered a vulnerability in ChiCoMaS, which can be
exploited by malicious people to conduct cross site scripting attacks.

Full Advisory:
http://secunia.com/advisories/30080/

 --

[SA30112] Red Hat update for kernel

Critical:    Less critical
Where:       From local network
Impact:      Exposure of system information, Exposure of sensitive
information, Privilege escalation, DoS
Released:    2008-05-07

Red Hat has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service), and by malicious, local users to cause a DoS,
disclose potentially sensitive information, or gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/30112/

 --

[SA30099] Ubuntu update for ldm

Critical:    Less critical
Where:       From local network
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2008-05-07

Ubuntu has issued an update for ldm. This fixes a security issue, which
can be exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/30099/

 --

[SA30132] HP-UX LDAP-UX Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2008-05-08

A vulnerability has been reported in HP-UX, which can be exploited by
malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/30132/

 --

[SA30116] Red Hat update for kernel

Critical:    Less critical
Where:       Local system
Impact:      Exposure of system information, Exposure of sensitive
information, Privilege escalation, DoS
Released:    2008-05-07

Red Hat has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service), disclose potentially sensitive
information, or gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/30116/

 --

[SA30114] HP-UX update for Netscape Directory Server

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2008-05-07

HP-UX has issued an update for Netscape Directory Server (NDS). This
fixes a vulnerability, which can be exploited by malicious, local users
to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/30114/

 --

[SA30113] Ubuntu update for kdelibs

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation, DoS
Released:    2008-05-07

Ubuntu has issued an update for kdelibs. This fixes a vulnerability,
which can be exploited by malicious, local users to cause a DoS (Denial
of Service) or to potentially gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/30113/

 --

[SA30111] QEMU "drive_init()" Disk Format Security Bypass

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2008-05-08

A vulnerability has been reported in QEMU, which can be exploited by
malicious, local users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/30111/

 --

[SA30110] Red Hat update for kernel

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information, Privilege escalation,
DoS
Released:    2008-05-07

Red Hat has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service), disclose potentially sensitive
information, or gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/30110/

 --

[SA30109] Ubuntu update for emacs

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2008-05-07

Ubuntu has issued an update for emacs. This fixes some security issues,
which can be exploited by malicious, local users to perform certain
actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/30109/

 --

[SA30108] Linux Kernel Multiple Vulnerabilities

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation, DoS
Released:    2008-05-07

Some vulnerabilities have been reported in the Linux kernel, which can
be exploited by malicious people to cause a DoS (Denial of Service) or
to potentially gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/30108/

 --

[SA30086] Sun Solaris SSH X11 Forwarding Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information, Privilege escalation
Released:    2008-05-07

Sun has acknowledged a vulnerability in SSH included in Sun Solaris,
which can be exploited by malicious, local users to disclose sensitive
information or potentially perform actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/30086/

 --

[SA30093] Debian update for b2evolution

Critical:    Not critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-05-06

Debian has issued an update for b2evolution. This fixes a
vulnerability, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/30093/

 --

[SA30101] Linux Kernel "fcntl_setlk()" SMP Reordered Access
Vulnerability

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2008-05-07

A vulnerability has been reported in the Linux kernel, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/30101/

 --

[SA30077] rPath update for kernel

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2008-05-08

rPath has issued an update for the kernel. This can be exploited by
malicious, local users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/30077/


Other:


Cross Platform:--

[SA30059] ITCms Arbitrary PHP Code Execution Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-05-06

Cod3rZ has reported a vulnerability in ITCms, which can be exploited by
malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/30059/

 --

[SA30123] Galleristic "cat" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-05-08

cOndemned has discovered a vulnerability in Galleristic, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/30123/

 --

[SA30122] Sun Java System Web Server / Application Server JSP
Information Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2008-05-08

Sun has acknowledged a vulnerability in Sun Java System Web Server and
Sun Java System Application Server, which can be exploited by malicious
people to disclose certain sensitive information.

Full Advisory:
http://secunia.com/advisories/30122/

 --

[SA30107] Musicbox "artistId" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-05-08

HaCkeR-EgY has reported a vulnerability in Musicbox, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/30107/

 --

[SA30091] mvnForum "QuickReply" Script Insertion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-05-08

Christian Holler has reported a vulnerability in mvnForum, which can be
exploited by malicious users to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/30091/

 --

[SA30089] Auction XL "viewfaqs.php" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-05-06

M.Hasran Addahroni has reported a vulnerability in Auction XL, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/30089/

 --

[SA30085] Miniweb "historymonth" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-05-06

HaCkeR-EgY has reported a vulnerability in Miniweb, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/30085/

 --

[SA30084] DeluxeBB SQL Injection and PHP Code Execution

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, System access
Released:    2008-05-06

EgiX has discovered two vulnerabilities in DeluxeBB, which can be
exploited by malicious users to compromise a vulnerable system and by
malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/30084/

 --

[SA30076] PHPEasyData "cat_id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-05-07

InjEctOr and ToTaL have discovered a vulnerability in PHPEasyData,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/30076/

 --

[SA30069] Maian Greetings Cross-Site Scripting and SQL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2008-05-08

Khashayar Fereidani has reported some vulnerabilities in Maian
Greetings, which can be exploited by malicious people to conduct
cross-site scripting or SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/30069/

 --

[SA30061] Nuke ET Security Bypass and Script Insertion Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting
Released:    2008-05-07

mrzayas has reported some vulnerabilities in Nuke ET, which can be
exploited by malicious people to bypass certain security restrictions
or conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/30061/

 --

[SA30058] BlogMe PHP "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-05-05

His0k4 has discovered a vulnerability in BlogMe PHP, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/30058/

 --

[SA30057] SMartBlog Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-05-05

Some vulnerabilities have been discovered in SMartBlog, which can be
exploited by malicious people to disclose potentially sensitive
information and conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/30057/

 --

[SA30056] phpDirectorySource SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data, Exposure of
sensitive information
Released:    2008-05-05

InjEctOr and FishEr762 have discovered two vulnerabilities in
phpDirectorySource, which can be exploited by malicious people to
conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/30056/

 --

[SA30133] Sun Java System Web Server Search Module Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-05-08

Sun has acknowledged a vulnerability in Sun Java System Web Server,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/30133/

 --

[SA30121] Tux CMS Multiple Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-05-08

Hadi Kiamarsi has discovered some vulnerabilities in Tux CMS, which can
be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/30121/

 --

[SA30098] CMS Faethon "what" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-05-08

RoMaNcYxHaCkEr has discovered a vulnerability in CMS Faethon, which can
be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/30098/

 --

[SA30092] LifeType "newBlogUserName" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-05-06

Khashayar Fereidani has discovered a vulnerability in LifeType, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/30092/

 --

[SA30082] Sphider Suggestion Feature "query" Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-05-08

Christian Holler has reported a vulnerability in Sphider, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/30082/

 --

[SA30079] TYPO3 powermail Extension Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-05-05

A vulnerability has been reported in the powermail extension for TYPO3,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/30079/

 --

[SA30075] LifeType "searchTerms" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-05-05

IRCRASH has reported a vulnerability in LifeType, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/30075/

 --

[SA30070] Maian Gallery "keywords" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-05-08

Khashayar Fereidani has reported a vulnerability in Maian Gallery,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/30070/

 --

[SA30068] Maian Support Multiple Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-05-08

Khashayar Fereidani has discovered some vulnerabilities in Maian
Support, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/30068/

 --

[SA30065] Maian Links Multiple Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-05-08

Khashayar Fereidani has discovered some vulnerabilities in Maian Links,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/30065/

 --

[SA30064] Bugzilla Security Bypass and Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting
Released:    2008-05-05

Some vulnerabilities have been reported in Bugzilla, which can be
exploited by malicious users to bypass certain security restrictions or
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/30064/

 --

[SA30062] Zomplog "catname" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-05-05

Khashayar Fereidani has discovered a vulnerability in Zomplog, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/30062/

 --

[SA30060] Maian Weblog Multiple Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-05-07

Khashayar Fereidani has discovered some vulnerabilities in Maian
Weblog, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/30060/

 --

[SA30081] IBM Rational Build Forge Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2008-05-05

A vulnerability has been reported in IBM Rational Build Forge, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/30081/

 --

[SA30134] MySQL MyISAM Table Privilege Check Bypass

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2008-05-08

A security issue has been reported in MySQL, which can be exploited by
malicious, local users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/30134/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_______________________________________________      
Attend Black Hat USA, August 2-7 in Las Vegas, 
the world's premier technical event for ICT security experts.
Featuring 40 hands-on training courses and 80 Briefings 
presentations with lots of new content and new tools.
Network with 4,000 delegates from 50 nations.  
Visit product displays by 30 top sponsors in 
a relaxed setting. http://www.blackhat.com



This archive was generated by hypermail 2.1.3 : Fri May 09 2008 - 06:03:50 PDT