======================================================================== The Secunia Weekly Advisory Summary 2008-05-01 - 2008-05-08 This week: 62 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: Secunia is pleased to announce that we are sponsoring the upcoming Gartner IT Security Summit from June 2 to 4 in Washington, DC. The event brings together Gartner analysts, leading executives, and innovators to present research, case studies, and insight into the business-critical aspect of IT. If you would like to meet with Secunia representatives in the conference, you can get a $400 discount off the regular registration fee. Please contact pr@private to receive the priority code and schedule the meeting. ======================================================================== 2) This Week in Brief: Multiple vulnerabilities in PHP have been reported, some of which have unknown impacts and others, which can be exploited by malicious users to bypass certain security restrictions, and potentially by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. An unspecified error in the FastCGI SAPI can be exploited to cause a stack-based buffer overflow. An error in the processing of multibyte characters within the "escapeshellcmd()" and "escapeshellarg()" functions can be exploited to escape the inserted backslash or quote characters via certain multibyte characters. Successful exploitation of this vulnerability allows to bypass the "safe_mode_exec_dir" and "disable_functions" directives, and potentially to inject arbitrary shell commands via user controlled input, but requires that the shell uses a locale with a variable width character (e.g. GBK, EUC-KR, SJIS). A vulnerability is caused due to an error during path translation in cgi_main.c. This can potentially be exploited to execute arbitrary code, but depends on how a targeted application is using PHP. An error in cURL can be exploited to bypass the "safe_mode" directive. A boundary error in PCRE can potentially be exploited by malicious people to cause a DoS or compromise a vulnerable system. This may be related to a previously reported vulnerability in PCRE. A weakness in the "GENERATE_SEED()" macro has also been reported. Version 5.2.6 has been released by the developers, resolving these issues. For more information, refer to: http://secunia.com/advisories/30048/ -- Some vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious people to cause a DoS (Denial of Service), and by malicious, local users to cause a DoS or to potentially gain escalated privileges. A race condition error exists in the dnotify subsystem between calls to "fcntl()" and "close()". This can be exploited to cause a system crash or potentially gain root privileges. A boundary error in the Tehuti network driver can be exploited to corrupt kernel memory via specially crafted "BDX_OP_WRITE" IOCTL calls. An error exists in the implementation of the IPsec protocol. This can be exploited to crash an affected system via fragmented ESP packets. Successful exploitation of this vulnerability requires the ability to manipulate network packets sent from an authenticated IPsec peer. The vulnerabilities are resolved in Linux Kernel version 2.6.25. For more information, refer to: http://secunia.com/advisories/30044/ Various Linux distributions have also released kernel updates. -- A highly critical vulnerability has been reported in multiple Adobe products, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when handling BMP files. This can be exploited to cause a buffer overflow via a BMP file having a malformed header. Successful exploitation may allow execution of arbitrary code via a specially crafted BMP file. Reportedly, the vulnerability can also be exploited when a malicious storage device (e.g. USB drives, cameras) is being attached to a vulnerable computer. It currently is unpatched. The vulnerability is reported in Adobe Photoshop Album Starter Edition 3.2 and Adobe After Effects CS3. Other versions may also be affected. For more information, refer to: http://secunia.com/advisories/29838/ -- VIRUS ALERTS: During the past week Secunia collected 167 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA30048] PHP Multiple Vulnerabilities 2. [SA30044] Linux Kernel Multiple Vulnerabilities 3. [SA29969] Novell GroupWise WebAccess Script Insertion 4. [SA30037] Akamai Download Manager Code Execution Vulnerability 5. [SA29976] IBM WebSphere Application Server Java Plugin Security Bypass 6. [SA30041] Animal Shelter Manager Multiple Security Bypass Vulnerabilities 7. [SA29985] WebGUI Data Form List View Unspecified Vulnerability 8. [SA29998] angelo-emlak Cross-Site Scripting and SQL Injection Vulnerabilities 9. [SA30039] AstroCam "picfile" Cross-Site Scripting Vulnerability 10. [SA30018] Debian update for kernel ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA30127] PostcardMentor "cat_fldAuto" SQL Injection Vulnerability [SA30103] fipsCMS "lg" SQL Injection Vulnerability [SA30128] SAP Internet Transaction Server wgate.dll Cross-Site Scripting Vulnerability [SA30074] SysAid "searchField" Cross-Site Scripting Vulnerability [SA30063] Invensys Wonderware InTouch SuiteLink Service Denial of Service UNIX/Linux: [SA30124] NetBSD update for OpenSSL [SA30105] Ubuntu update for thunderbird [SA30100] Ubuntu update for openoffice.org [SA30073] Gentoo update for egroupware [SA30129] Sun Solaris Tk GIF Processing Buffer Overflow Vulnerabilities [SA30118] rdesktop Multiple Vulnerabilities [SA30106] Debian update for kazehakase [SA30097] Debian update for blender [SA30095] SIPp Two Buffer Overflow Vulnerabilities [SA30090] Online Rental Property Script "pid" SQL Injection [SA30078] Ubuntu update for cups [SA30131] Sun Solaris TCP Implementation SYN Flood Denial of Service [SA30130] Sun Ray Server Software Kiosk Mode Vulnerability [SA30080] ChiCoMaS "q" Cross-Site Scripting Vulnerability [SA30112] Red Hat update for kernel [SA30099] Ubuntu update for ldm [SA30132] HP-UX LDAP-UX Privilege Escalation Vulnerability [SA30116] Red Hat update for kernel [SA30114] HP-UX update for Netscape Directory Server [SA30113] Ubuntu update for kdelibs [SA30111] QEMU "drive_init()" Disk Format Security Bypass [SA30110] Red Hat update for kernel [SA30109] Ubuntu update for emacs [SA30108] Linux Kernel Multiple Vulnerabilities [SA30086] Sun Solaris SSH X11 Forwarding Vulnerability [SA30093] Debian update for b2evolution [SA30101] Linux Kernel "fcntl_setlk()" SMP Reordered Access Vulnerability [SA30077] rPath update for kernel Other: Cross Platform: [SA30059] ITCms Arbitrary PHP Code Execution Vulnerability [SA30123] Galleristic "cat" SQL Injection Vulnerability [SA30122] Sun Java System Web Server / Application Server JSP Information Disclosure [SA30107] Musicbox "artistId" SQL Injection Vulnerability [SA30091] mvnForum "QuickReply" Script Insertion Vulnerability [SA30089] Auction XL "viewfaqs.php" SQL Injection Vulnerability [SA30085] Miniweb "historymonth" SQL Injection Vulnerability [SA30084] DeluxeBB SQL Injection and PHP Code Execution [SA30076] PHPEasyData "cat_id" SQL Injection Vulnerability [SA30069] Maian Greetings Cross-Site Scripting and SQL Injection Vulnerabilities [SA30061] Nuke ET Security Bypass and Script Insertion Vulnerabilities [SA30058] BlogMe PHP "id" SQL Injection Vulnerability [SA30057] SMartBlog Multiple Vulnerabilities [SA30056] phpDirectorySource SQL Injection Vulnerabilities [SA30133] Sun Java System Web Server Search Module Cross-Site Scripting Vulnerability [SA30121] Tux CMS Multiple Cross-Site Scripting Vulnerabilities [SA30098] CMS Faethon "what" Cross-Site Scripting Vulnerability [SA30092] LifeType "newBlogUserName" Cross-Site Scripting [SA30082] Sphider Suggestion Feature "query" Cross-Site Scripting Vulnerability [SA30079] TYPO3 powermail Extension Cross-Site Scripting Vulnerability [SA30075] LifeType "searchTerms" Cross-Site Scripting Vulnerability [SA30070] Maian Gallery "keywords" Cross-Site Scripting Vulnerability [SA30068] Maian Support Multiple Cross-Site Scripting Vulnerabilities [SA30065] Maian Links Multiple Cross-Site Scripting Vulnerabilities [SA30064] Bugzilla Security Bypass and Cross-Site Scripting Vulnerabilities [SA30062] Zomplog "catname" Cross-Site Scripting Vulnerability [SA30060] Maian Weblog Multiple Cross-Site Scripting Vulnerabilities [SA30081] IBM Rational Build Forge Denial of Service [SA30134] MySQL MyISAM Table Privilege Check Bypass ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA30127] PostcardMentor "cat_fldAuto" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-05-08 InjEctOr5 has reported a vulnerability in PostcardMentor, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/30127/ -- [SA30103] fipsCMS "lg" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-05-08 InjEctOr has reported a vulnerability in fipsCMS, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/30103/ -- [SA30128] SAP Internet Transaction Server wgate.dll Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-05-08 A vulnerability has been reported in SAP Internet Transaction Server, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/30128/ -- [SA30074] SysAid "searchField" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-05-05 Yogesh Kulkarni has discovered a vulnerability in SysAid, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/30074/ -- [SA30063] Invensys Wonderware InTouch SuiteLink Service Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2008-05-06 Core Security Technologies has reported a vulnerability in Invensys Wonderware InTouch, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/30063/ UNIX/Linux:-- [SA30124] NetBSD update for OpenSSL Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2008-05-08 NetBSD has issued an update for OpenSSL. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/30124/ -- [SA30105] Ubuntu update for thunderbird Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, System access Released: 2008-05-07 Ubuntu has issued an update for thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, or potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/30105/ -- [SA30100] Ubuntu update for openoffice.org Critical: Highly critical Where: From remote Impact: System access Released: 2008-05-07 Ubuntu has issued an update for openoffice.org. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/30100/ -- [SA30073] Gentoo update for egroupware Critical: Highly critical Where: From remote Impact: Security Bypass, System access Released: 2008-05-08 Gentoo has issued an update for egroupware. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/30073/ -- [SA30129] Sun Solaris Tk GIF Processing Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2008-05-08 Sun has acknowledged some vulnerabilities in the Tcl GUI Toolkit Library included in Solaris, which can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/30129/ -- [SA30118] rdesktop Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: System access Released: 2008-05-08 Some vulnerabilities have been reported in rdesktop, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/30118/ -- [SA30106] Debian update for kazehakase Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information, DoS, System access Released: 2008-05-07 Debian has issued an update for kazehakase. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose potentially sensitive information, and compromise a user's system. Full Advisory: http://secunia.com/advisories/30106/ -- [SA30097] Debian update for blender Critical: Moderately critical Where: From remote Impact: System access Released: 2008-05-06 Debian has issued an update for blender. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/30097/ -- [SA30095] SIPp Two Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2008-05-06 Two vulnerabilities have been reported in SIPp, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/30095/ -- [SA30090] Online Rental Property Script "pid" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2008-05-06 M.Hasran Addahroni has reported a vulnerability in Online Rental Property Script, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/30090/ -- [SA30078] Ubuntu update for cups Critical: Moderately critical Where: From local network Impact: System access Released: 2008-05-06 Ubuntu has issued an update for cups. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/30078/ -- [SA30131] Sun Solaris TCP Implementation SYN Flood Denial of Service Critical: Less critical Where: From remote Impact: DoS Released: 2008-05-08 A vulnerability has been reported in Sun Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/30131/ -- [SA30130] Sun Ray Server Software Kiosk Mode Vulnerability Critical: Less critical Where: From remote Impact: System access Released: 2008-05-08 A vulnerability has been reported in Sun Ray Server Software, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/30130/ -- [SA30080] ChiCoMaS "q" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-05-05 Hadi Kiamarsi has discovered a vulnerability in ChiCoMaS, which can be exploited by malicious people to conduct cross site scripting attacks. Full Advisory: http://secunia.com/advisories/30080/ -- [SA30112] Red Hat update for kernel Critical: Less critical Where: From local network Impact: Exposure of system information, Exposure of sensitive information, Privilege escalation, DoS Released: 2008-05-07 Red Hat has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), and by malicious, local users to cause a DoS, disclose potentially sensitive information, or gain escalated privileges. Full Advisory: http://secunia.com/advisories/30112/ -- [SA30099] Ubuntu update for ldm Critical: Less critical Where: From local network Impact: Exposure of system information, Exposure of sensitive information Released: 2008-05-07 Ubuntu has issued an update for ldm. This fixes a security issue, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/30099/ -- [SA30132] HP-UX LDAP-UX Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2008-05-08 A vulnerability has been reported in HP-UX, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/30132/ -- [SA30116] Red Hat update for kernel Critical: Less critical Where: Local system Impact: Exposure of system information, Exposure of sensitive information, Privilege escalation, DoS Released: 2008-05-07 Red Hat has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or gain escalated privileges. Full Advisory: http://secunia.com/advisories/30116/ -- [SA30114] HP-UX update for Netscape Directory Server Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2008-05-07 HP-UX has issued an update for Netscape Directory Server (NDS). This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/30114/ -- [SA30113] Ubuntu update for kdelibs Critical: Less critical Where: Local system Impact: Privilege escalation, DoS Released: 2008-05-07 Ubuntu has issued an update for kdelibs. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or to potentially gain escalated privileges. Full Advisory: http://secunia.com/advisories/30113/ -- [SA30111] QEMU "drive_init()" Disk Format Security Bypass Critical: Less critical Where: Local system Impact: Security Bypass Released: 2008-05-08 A vulnerability has been reported in QEMU, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/30111/ -- [SA30110] Red Hat update for kernel Critical: Less critical Where: Local system Impact: Exposure of sensitive information, Privilege escalation, DoS Released: 2008-05-07 Red Hat has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or gain escalated privileges. Full Advisory: http://secunia.com/advisories/30110/ -- [SA30109] Ubuntu update for emacs Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2008-05-07 Ubuntu has issued an update for emacs. This fixes some security issues, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/30109/ -- [SA30108] Linux Kernel Multiple Vulnerabilities Critical: Less critical Where: Local system Impact: Privilege escalation, DoS Released: 2008-05-07 Some vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially gain escalated privileges. Full Advisory: http://secunia.com/advisories/30108/ -- [SA30086] Sun Solaris SSH X11 Forwarding Vulnerability Critical: Less critical Where: Local system Impact: Exposure of sensitive information, Privilege escalation Released: 2008-05-07 Sun has acknowledged a vulnerability in SSH included in Sun Solaris, which can be exploited by malicious, local users to disclose sensitive information or potentially perform actions with escalated privileges. Full Advisory: http://secunia.com/advisories/30086/ -- [SA30093] Debian update for b2evolution Critical: Not critical Where: From remote Impact: Cross Site Scripting Released: 2008-05-06 Debian has issued an update for b2evolution. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/30093/ -- [SA30101] Linux Kernel "fcntl_setlk()" SMP Reordered Access Vulnerability Critical: Not critical Where: Local system Impact: DoS Released: 2008-05-07 A vulnerability has been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/30101/ -- [SA30077] rPath update for kernel Critical: Not critical Where: Local system Impact: DoS Released: 2008-05-08 rPath has issued an update for the kernel. This can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/30077/ Other: Cross Platform:-- [SA30059] ITCms Arbitrary PHP Code Execution Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2008-05-06 Cod3rZ has reported a vulnerability in ITCms, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/30059/ -- [SA30123] Galleristic "cat" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-05-08 cOndemned has discovered a vulnerability in Galleristic, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/30123/ -- [SA30122] Sun Java System Web Server / Application Server JSP Information Disclosure Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2008-05-08 Sun has acknowledged a vulnerability in Sun Java System Web Server and Sun Java System Application Server, which can be exploited by malicious people to disclose certain sensitive information. Full Advisory: http://secunia.com/advisories/30122/ -- [SA30107] Musicbox "artistId" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-05-08 HaCkeR-EgY has reported a vulnerability in Musicbox, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/30107/ -- [SA30091] mvnForum "QuickReply" Script Insertion Vulnerability Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2008-05-08 Christian Holler has reported a vulnerability in mvnForum, which can be exploited by malicious users to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/30091/ -- [SA30089] Auction XL "viewfaqs.php" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-05-06 M.Hasran Addahroni has reported a vulnerability in Auction XL, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/30089/ -- [SA30085] Miniweb "historymonth" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-05-06 HaCkeR-EgY has reported a vulnerability in Miniweb, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/30085/ -- [SA30084] DeluxeBB SQL Injection and PHP Code Execution Critical: Moderately critical Where: From remote Impact: Manipulation of data, System access Released: 2008-05-06 EgiX has discovered two vulnerabilities in DeluxeBB, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/30084/ -- [SA30076] PHPEasyData "cat_id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2008-05-07 InjEctOr and ToTaL have discovered a vulnerability in PHPEasyData, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/30076/ -- [SA30069] Maian Greetings Cross-Site Scripting and SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2008-05-08 Khashayar Fereidani has reported some vulnerabilities in Maian Greetings, which can be exploited by malicious people to conduct cross-site scripting or SQL injection attacks. Full Advisory: http://secunia.com/advisories/30069/ -- [SA30061] Nuke ET Security Bypass and Script Insertion Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting Released: 2008-05-07 mrzayas has reported some vulnerabilities in Nuke ET, which can be exploited by malicious people to bypass certain security restrictions or conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/30061/ -- [SA30058] BlogMe PHP "id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-05-05 His0k4 has discovered a vulnerability in BlogMe PHP, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/30058/ -- [SA30057] SMartBlog Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2008-05-05 Some vulnerabilities have been discovered in SMartBlog, which can be exploited by malicious people to disclose potentially sensitive information and conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/30057/ -- [SA30056] phpDirectorySource SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data, Exposure of sensitive information Released: 2008-05-05 InjEctOr and FishEr762 have discovered two vulnerabilities in phpDirectorySource, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/30056/ -- [SA30133] Sun Java System Web Server Search Module Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-05-08 Sun has acknowledged a vulnerability in Sun Java System Web Server, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/30133/ -- [SA30121] Tux CMS Multiple Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-05-08 Hadi Kiamarsi has discovered some vulnerabilities in Tux CMS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/30121/ -- [SA30098] CMS Faethon "what" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-05-08 RoMaNcYxHaCkEr has discovered a vulnerability in CMS Faethon, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/30098/ -- [SA30092] LifeType "newBlogUserName" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-05-06 Khashayar Fereidani has discovered a vulnerability in LifeType, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/30092/ -- [SA30082] Sphider Suggestion Feature "query" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-05-08 Christian Holler has reported a vulnerability in Sphider, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/30082/ -- [SA30079] TYPO3 powermail Extension Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-05-05 A vulnerability has been reported in the powermail extension for TYPO3, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/30079/ -- [SA30075] LifeType "searchTerms" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-05-05 IRCRASH has reported a vulnerability in LifeType, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/30075/ -- [SA30070] Maian Gallery "keywords" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-05-08 Khashayar Fereidani has reported a vulnerability in Maian Gallery, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/30070/ -- [SA30068] Maian Support Multiple Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-05-08 Khashayar Fereidani has discovered some vulnerabilities in Maian Support, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/30068/ -- [SA30065] Maian Links Multiple Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-05-08 Khashayar Fereidani has discovered some vulnerabilities in Maian Links, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/30065/ -- [SA30064] Bugzilla Security Bypass and Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Security Bypass, Cross Site Scripting Released: 2008-05-05 Some vulnerabilities have been reported in Bugzilla, which can be exploited by malicious users to bypass certain security restrictions or by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/30064/ -- [SA30062] Zomplog "catname" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-05-05 Khashayar Fereidani has discovered a vulnerability in Zomplog, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/30062/ -- [SA30060] Maian Weblog Multiple Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-05-07 Khashayar Fereidani has discovered some vulnerabilities in Maian Weblog, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/30060/ -- [SA30081] IBM Rational Build Forge Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2008-05-05 A vulnerability has been reported in IBM Rational Build Forge, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/30081/ -- [SA30134] MySQL MyISAM Table Privilege Check Bypass Critical: Less critical Where: Local system Impact: Security Bypass Released: 2008-05-08 A security issue has been reported in MySQL, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/30134/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _______________________________________________ Attend Black Hat USA, August 2-7 in Las Vegas, the world's premier technical event for ICT security experts. Featuring 40 hands-on training courses and 80 Briefings presentations with lots of new content and new tools. Network with 4,000 delegates from 50 nations. Visit product displays by 30 top sponsors in a relaxed setting. http://www.blackhat.com
This archive was generated by hypermail 2.1.3 : Fri May 09 2008 - 06:03:50 PDT