[ISN] Secunia Weekly Summary - Issue: 2008-47

From: InfoSec News <alerts_at_private>
Date: Fri, 21 Nov 2008 02:21:18 -0600 (CST)
========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2008-11-13 - 2008-11-20                        

                       This week: 70 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Would you like to be notified when a vendor patch is released?

The Secunia Vulnerability Intelligence solutions allow you to be
notified via E-mail/XML/SMS whenever a major update to a vulnerability
advisory occurs.

A change in our assessment rating, exploit code availability, or if an
updated patch is released by the vendor.

Through our commercial solutions you have access to most detailed
intelligence on workarounds, access to deep links, and to the Secunia
research team when additional investigation is required.

This intelligence is not part of the mailing-list or the weekly summary
from Secunia.

Click here to learn more:
http://secunia.com/advisories/business_solutions/

========================================================================
2) This Week in Brief:

Some vulnerabilities have been reported in Apple Safari, which can be
exploited by malicious, local users to disclose potentially sensitive
information and by malicious people to disclose sensitive information
or compromise a user's system.

For more information, refer to:
http://secunia.com/advisories/32706/

 --

Some vulnerabilities have been reported in Symantec Backup Exec for
Windows Servers, which can be exploited by malicious people to bypass
certain security restrictions and by malicious users to cause a DoS
(Denial of Service) or potentially compromise a vulnerable system.

For more information, refer to:
http://secunia.com/advisories/32810/

 --

Some vulnerabilities have been reported in Adobe AIR, which can be
exploited by malicious people to compromise a user's system.

For more information, refer to:
http://secunia.com/advisories/32772/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA32713] Mozilla Firefox 3 Multiple Vulnerabilities
2.  [SA31010] Sun Java JDK / JRE Multiple Vulnerabilities
3.  [SA32270] Adobe Flash Player Multiple Security Issues and
              Vulnerabilities
4.  [SA32706] Apple Safari Multiple Vulnerabilities
5.  [SA32719] Linux Kernel "hfs_cat_find_brec()" Buffer Overflow
              Vulnerability
6.  [SA32693] Mozilla Firefox 2 Multiple Vulnerabilities
7.  [SA32670] Sun Java System Messaging Server Cross-Site Scripting
              Vulnerability
8.  [SA32760] OpenSSH CBC Mode Plaintext Recovery Vulnerability
9.  [SA32697] Ubuntu vm-builder Root Password Vulnerability
10. [SA32676] Sun StarOffice/StarSuite Multiple Vulnerabilities

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA32772] Adobe AIR Multiple Vulnerabilities
[SA32743] GungHo LoadPrgAx ActiveX Control Vulnerability
[SA32729] Exodus Improper "im://" URI Handling Vulnerability
[SA32725] VeryDOC PDF Viewer ActiveX Control "OpenPDF()" Buffer
Overflow
[SA32785] Pre ASP Job Board "Username" and "Password" SQL Injection
[SA32750] Openasp "idpage" SQL Injection Vulnerability
[SA32810] Symantec Backup Exec for Windows Servers Multiple
Vulnerabilities
[SA32771] Flash Media Server Video Stream Capture Security Issue
[SA32738] Chilkat Socket ActiveX Component "SaveLastError()" Insecure
Method

UNIX/Linux:
[SA32798] Red Hat update for thunderbird
[SA32796] imlib2 XPM Processing Buffer Overflow Vulnerability
[SA32778] Ubuntu update for firefox, firefox-3.0, and xulrunner-1.9
[SA32766] Red Hat update for libxml2
[SA32764] Ubuntu update for libxml2
[SA32762] Debian update for libxml2
[SA32749] Slackware update for mozilla-firefox
[SA32748] Slackware update for seamonkey
[SA32721] Fedora update for firefox and xulrunner
[SA32811] Slackware update for libxml2
[SA32807] rPath update for libxml2
[SA32802] Fedora update for libxml2
[SA32793] Debian update for python2.4
[SA32773] Libxml2 Two Integer Overflow Vulnerabilities
[SA32765] Ubuntu update for clamav
[SA32759] SUSE Update for Multiple Packages
[SA32753] rPath update for enscript
[SA32746] Gentoo update for php
[SA32720] Astaro update for libspf2
[SA32805] Fedora update for roundup
[SA32803] Fedora update for grip
[SA32800] HP OpenView Network Node Manager Cross-Site Scripting
Vulnerabilities
[SA32768] Dovecot ManageSieve Directory Traversal Security Issue
[SA32761] No-IP Linux Dynamic Update Client Buffer Overflow
Vulnerability
[SA32719] Linux Kernel "hfs_cat_find_brec()" Buffer Overflow
Vulnerability
[SA32769] Ubuntu update for mysql-dfsg-5.0
[SA32760] OpenSSH CBC Mode Plaintext Recovery Vulnerability
[SA32820] SystemImager "si_mkbootserver" Insecure Temporary Files
[SA32780] pam_mount "passwdehd" Insecure Temporary Files
[SA32774] Citrix XenServer Ext2/Ext3 Processing Security Bypass
Vulnerability
[SA32730] MailScanner "trend-autoupdate" Insecure Temporary Files
[SA32804] Fedora update for cobbler
[SA32737] Cobbler Web Interface Privilege Escalation Vulnerability
[SA32818] P3nfs Insecure Temporary Files
[SA32799] Red Hat update for kernel
[SA32792] Ubuntu update for hplip

Other:
[SA32716] Netgear WGR614 Web Interface Request Denial of Service

Cross Platform:
[SA32745] Free Directory Script "API_HOME_DIR" File Inclusion
Vulnerability
[SA32734] phpFan "includepath" File Inclusion Vulnerability
[SA32783] W3matter Multiple Products "f[password]" SQL Injection
Vulnerability
[SA32751] mxCamArchive Information Disclosure and PHP Code Execution
[SA32747] E-topbiz AdManager "group" SQL Injection Vulnerability
[SA32744] ScriptsEz FREEze Greetings "pwd.txt" Information Disclosure
[SA32741] PHPStore Wholesales "id" SQL Injection Vulnerability
[SA32736] Pluck "g_pcltar_lib_dir" Local File Inclusion Vulnerability
[SA32733] Jadu Galaxies "categoryID" SQL Injection Vulnerability
[SA32732] TurnkeyForms Text Link Sales SQL Injection and Security
Bypass
[SA32727] Simple Customer "email" and "password" SQL Injection
Vulnerabilities
[SA32726] SaturnCMS Multiple SQL Injection Vulnerabilities
[SA32724] Ultrastats "serverid" SQL Injection Vulnerability
[SA32718] VideoScript "admin/cp.php" Security Bypass Vulnerability
[SA32717] PHPStore Yahoo Answers "id" SQL Injection Vulnerability
[SA32815] refbase "headerMsg" Cross-Site Scripting Vulnerability
[SA32788] MyTopix "send" SQL Injection Vulnerability
[SA32779] KimsON Cross-Site Scripting Vulnerability
[SA32757] BoutikOne CMS "search_query" Cross-Site Scripting
[SA32739] Streber Unspecified Cross-Site Request Forgery
Vulnerabilities
[SA32740] SSH Tectia Products CBC Mode Plaintext Recovery
Vulnerability
[SA32775] vBulletin SQL Injection Vulnerabilities
[SA32752] Opera "file://" URI Handling Buffer Overflow Vulnerability
[SA32735] vBulletin Calender SQL Injection Vulnerability

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA32772] Adobe AIR Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-11-18

Some vulnerabilities have been reported in Adobe AIR, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/32772/

 --

[SA32743] GungHo LoadPrgAx ActiveX Control Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-11-17

A vulnerability has been reported in the GungHo LoadPrgAx ActiveX
control, which can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/32743/

 --

[SA32729] Exodus Improper "im://" URI Handling Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-11-18

strawdog has discovered a vulnerability in Exodus, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/32729/

 --

[SA32725] VeryDOC PDF Viewer ActiveX Control "OpenPDF()" Buffer
Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-11-17

r0ut3r has discovered a vulnerability in the VeryDOC PDF Viewer ActiveX
control, which potentially can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/32725/

 --

[SA32785] Pre ASP Job Board "Username" and "Password" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2008-11-20

R3d-D3v!L has reported some vulnerabilities in Pre ASP Job Board, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32785/

 --

[SA32750] Openasp "idpage" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-11-18

athos has discovered a vulnerability in Openasp, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32750/

 --

[SA32810] Symantec Backup Exec for Windows Servers Multiple
Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      Security Bypass, DoS, System access
Released:    2008-11-20

Some vulnerabilities have been reported in Symantec Backup Exec for
Windows Servers, which can be exploited by malicious people to bypass
certain security restrictions and by malicious users to cause a DoS
(Denial of Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32810/

 --

[SA32771] Flash Media Server Video Stream Capture Security Issue

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-11-18

A security issue has been reported in Flash Media Server, which can be
exploited by malicious people to capture content.

Full Advisory:
http://secunia.com/advisories/32771/

 --

[SA32738] Chilkat Socket ActiveX Component "SaveLastError()" Insecure
Method

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-11-18

Zigma has discovered a vulnerability in Chilkat Socket ActiveX
Component, which can be exploited by malicious people to overwrite
arbitrary files.

Full Advisory:
http://secunia.com/advisories/32738/


UNIX/Linux:--

[SA32798] Red Hat update for thunderbird

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Exposure of system information, Exposure
of sensitive information, System access
Released:    2008-11-20

Red Hat has issued an update for thunderbird. This fixes some
vulnerabilities, which can be exploited by malicious people to disclose
sensitive information, bypass certain security restrictions, or
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/32798/

 --

[SA32796] imlib2 XPM Processing Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-11-20

A vulnerability has been discovered in imlib2, which can be exploited
by malicious people to potentially compromise an application using the
library.

Full Advisory:
http://secunia.com/advisories/32796/

 --

[SA32778] Ubuntu update for firefox, firefox-3.0, and xulrunner-1.9

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Exposure of system information, Exposure
of sensitive information, System access
Released:    2008-11-19

Ubuntu has issued an update for firefox, firefox-3.0, and
xulrunner-1.9. This fixes some vulnerabilities, which can be exploited
by malicious people to disclose sensitive information, bypass certain
security restrictions, or compromise a user's system.

Full Advisory:
http://secunia.com/advisories/32778/

 --

[SA32766] Red Hat update for libxml2

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-11-18

Red Hat has issued an update for libxml2. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or to potentially compromise an application
using the library.

Full Advisory:
http://secunia.com/advisories/32766/

 --

[SA32764] Ubuntu update for libxml2

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-11-19

Ubuntu has issued an update for libxml2. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or to potentially compromise an application
using the library.

Full Advisory:
http://secunia.com/advisories/32764/

 --

[SA32762] Debian update for libxml2

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-11-18

Debian has issued an update for libxml2. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or to potentially compromise an application
using the library.

Full Advisory:
http://secunia.com/advisories/32762/

 --

[SA32749] Slackware update for mozilla-firefox

Critical:    Highly critical
Where:       From remote
Impact:      System access, Exposure of sensitive information, Exposure
of system information, Security Bypass
Released:    2008-11-17

Slackware has issued an update for mozilla-firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to disclose
sensitive information, bypass certain security restrictions, or
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/32749/

 --

[SA32748] Slackware update for seamonkey

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Exposure of system information, Exposure
of sensitive information, System access
Released:    2008-11-17

Slackware has issued an update for seamonkey. This fixes some
vulnerabilities, which can be exploited by malicious people to disclose
sensitive information, bypass certain security restrictions, or
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/32748/

 --

[SA32721] Fedora update for firefox and xulrunner

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Exposure of system information, Exposure
of sensitive information, System access
Released:    2008-11-14

Fedora has issued an update for firefox and xulrunner. This fixes some
vulnerabilities, which can be exploited by malicious people to disclose
sensitive information, bypass certain security restrictions, or
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/32721/

 --

[SA32811] Slackware update for libxml2

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-11-20

Slackware has issued an update for libxml2. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or to potentially compromise an application
using the library.

Full Advisory:
http://secunia.com/advisories/32811/

 --

[SA32807] rPath update for libxml2

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-11-20

rPath has issued an update for libxml2. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or to potentially compromise an application
using the library.

Full Advisory:
http://secunia.com/advisories/32807/

 --

[SA32802] Fedora update for libxml2

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-11-20

Fedora has issued an update for libxml2. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or to potentially compromise an application
using the library.

Full Advisory:
http://secunia.com/advisories/32802/

 --

[SA32793] Debian update for python2.4

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, DoS, System access
Released:    2008-11-20

Debian has issued an update for python2.4. This fixes some
vulnerabilities, where some have unknown impact and others can
potentially be exploited by malicious people to cause a DoS (Denial of
Service) or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32793/

 --

[SA32773] Libxml2 Two Integer Overflow Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-11-18

Two vulnerabilities have been reported in Libxml2, which can be
exploited by malicious people to cause a DoS (Denial of Service) or to
potentially compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/32773/

 --

[SA32765] Ubuntu update for clamav

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-11-18

Ubuntu has issued an update for clamav. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32765/

 --

[SA32759] SUSE Update for Multiple Packages

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2008-11-17

SUSE has issued an update for multiple packages. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
bypass certain security restrictions, disclose potentially sensitive
information, or potentially gain escalated privileges, by malicious
users to cause a DoS (Denial of Service), and by malicious people to
bypass certain security restrictions, disclose potentially sensitive
information, cause a DoS, or potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/32759/

 --

[SA32753] rPath update for enscript

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2008-11-18

rPath has issued an update for enscript. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32753/

 --

[SA32746] Gentoo update for php

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, Security Bypass, Exposure of sensitive
information, DoS, System access
Released:    2008-11-17

Gentoo has issued an update for php. This fixes some vulnerabilities,
where some have unknown impacts and others can be exploited by
malicious users to bypass certain security restrictions, and
potentially by malicious people to disclose potentially sensitive
information, cause a DoS (Denial of Service), or to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/32746/

 --

[SA32720] Astaro update for libspf2

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-11-14

Astaro has issued an update for libspf2. This fixes a vulnerability,
which can be exploited by malicious people to potentially compromise an
application using the library.

Full Advisory:
http://secunia.com/advisories/32720/

 --

[SA32805] Fedora update for roundup

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-11-20

Fedora has issued an update for roundup. This fixes a security issue,
which can be exploited by malicious users to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/32805/

 --

[SA32803] Fedora update for grip

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2008-11-20

Fedora has issued an update for grip. This fixes a vulnerability, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/32803/

 --

[SA32800] HP OpenView Network Node Manager Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-11-20

HP has acknowledged some vulnerabilities in OpenView Network Node
Manager, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/32800/

 --

[SA32768] Dovecot ManageSieve Directory Traversal Security Issue

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-11-18

A security issue has been reported in Dovecot ManageSieve, which can be
exploited by malicious users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/32768/

 --

[SA32761] No-IP Linux Dynamic Update Client Buffer Overflow
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2008-11-19

xenomuta has reported a vulnerability in No-IP Linux Dynamic Update
Client (DUC), which potentially can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32761/

 --

[SA32719] Linux Kernel "hfs_cat_find_brec()" Buffer Overflow
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-11-14

A vulnerability has been reported in the Linux Kernel, which can be
exploited by malicious people to cause a DoS (Denial of Service) or to
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32719/

 --

[SA32769] Ubuntu update for mysql-dfsg-5.0

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass, DoS
Released:    2008-11-18

Ubuntu has issued an update for mysql-dfsg-5.0. This fixes a security
issue and a vulnerability, which can be exploited by malicious, local
users to bypass certain security restrictions and malicious users to
cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/32769/

 --

[SA32760] OpenSSH CBC Mode Plaintext Recovery Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      Exposure of sensitive information
Released:    2008-11-17

A vulnerability has been reported in OpenSSH, which potentially can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/32760/

 --

[SA32820] SystemImager "si_mkbootserver" Insecure Temporary Files

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2008-11-20

A security issue has been reported in SystemImager, which can be
exploited by malicious, local users to perform certain actions with
escalated privileges.

Full Advisory:
http://secunia.com/advisories/32820/

 --

[SA32780] pam_mount "passwdehd" Insecure Temporary Files

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2008-11-20

A security issue has been reported in pam_mount, which can be exploited
by malicious, local users to perform certain actions with escalated
privileges.

Full Advisory:
http://secunia.com/advisories/32780/

 --

[SA32774] Citrix XenServer Ext2/Ext3 Processing Security Bypass
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2008-11-19

A vulnerability has been reported in Citrix XenServer, which can be
exploited by malicious, local users to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/32774/

 --

[SA32730] MailScanner "trend-autoupdate" Insecure Temporary Files

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2008-11-20

A security issue has been reported in MailScanner, which can be
exploited by malicious, local users to perform certain actions with
escalated privileges.

Full Advisory:
http://secunia.com/advisories/32730/

 --

[SA32804] Fedora update for cobbler

Critical:    Not critical
Where:       From remote
Impact:      Privilege escalation
Released:    2008-11-20

Fedora has issued an update for cobbler. This fixes a vulnerability,
which can be exploited by malicious users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/32804/

 --

[SA32737] Cobbler Web Interface Privilege Escalation Vulnerability

Critical:    Not critical
Where:       From remote
Impact:      Privilege escalation
Released:    2008-11-17

A vulnerability has been reported in Cobbler, which can be exploited by
malicious users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/32737/

 --

[SA32818] P3nfs Insecure Temporary Files

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2008-11-20

A security issue has been reported in P3nfs, which can be exploited by
malicious, local users to perform certain actions with escalated
privileges.

Full Advisory:
http://secunia.com/advisories/32818/

 --

[SA32799] Red Hat update for kernel

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation, DoS
Released:    2008-11-20

Red Hat has issued an update for the kernel. This fixes a security
issue and some vulnerabilities, which can be exploited by malicious,
local users to cause a DoS (Denial of Service) and gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/32799/

 --

[SA32792] Ubuntu update for hplip

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2008-11-20

Ubuntu has issued an update for hplip. This fixes a security issue,
which can be exploited by malicious, local users to cause a DoS (Denial
of Service).

Full Advisory:
http://secunia.com/advisories/32792/


Other:--

[SA32716] Netgear WGR614 Web Interface Request Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2008-11-18

sr. has reported a vulnerability in Netgear WGR614v9, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/32716/


Cross Platform:--

[SA32745] Free Directory Script "API_HOME_DIR" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-11-19

Ghost Hacker has discovered a vulnerability in Free Directory Script,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/32745/

 --

[SA32734] phpFan "includepath" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-11-18

Ahmadbady has reported a vulnerability in phpFan, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32734/

 --

[SA32783] W3matter Multiple Products "f[password]" SQL Injection
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2008-11-20

Some vulnerabilities have been reported in multiple W3matter products,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/32783/

 --

[SA32751] mxCamArchive Information Disclosure and PHP Code Execution

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2008-11-18

Ahmadbady has discovered some vulnerabilities in mxCamArchive, which
can be exploited by malicious people to disclose sensitive information
and malicious users to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32751/

 --

[SA32747] E-topbiz AdManager "group" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-11-18

Hussin X has reported a vulnerability in E-topbiz AdManager, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32747/

 --

[SA32744] ScriptsEz FREEze Greetings "pwd.txt" Information Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information
Released:    2008-11-18

cOndemned has discovered a security issue in ScriptsEz FREEze
Greetings, which can be exploited by malicious people to disclose
sensitive information.

Full Advisory:
http://secunia.com/advisories/32744/

 --

[SA32741] PHPStore Wholesales "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-11-17

Hussin X has reported a vulnerability in PHPStore Wholesales, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32741/

 --

[SA32736] Pluck "g_pcltar_lib_dir" Local File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2008-11-18

Digital Security Research Group have reported a vulnerability in Pluck,
which can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/32736/

 --

[SA32733] Jadu Galaxies "categoryID" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-11-18

ZoRLu has reported a vulnerability in Jadu Galaxies, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32733/

 --

[SA32732] TurnkeyForms Text Link Sales SQL Injection and Security
Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2008-11-17

Some vulnerabilities have been reported in TurnkeyForms Text Link
Sales, which can be exploited by malicious people to bypass certain
security restrictions and by malicious users to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/32732/

 --

[SA32727] Simple Customer "email" and "password" SQL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-11-18

d3b4g has discovered some vulnerabilities in Simple Customer, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32727/

 --

[SA32726] SaturnCMS Multiple SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2008-11-18

Hussin X has reported some vulnerabilities in SaturnCMS, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32726/

 --

[SA32724] Ultrastats "serverid" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-11-18

eek has discovered a vulnerability in Ultrastats, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32724/

 --

[SA32718] VideoScript "admin/cp.php" Security Bypass Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-11-18

G4N0K has reported a vulnerability in VideoScript, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/32718/

 --

[SA32717] PHPStore Yahoo Answers "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-11-17

Snakespc has reported a vulnerability in PHPStore Yahoo Answers, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32717/

 --

[SA32815] refbase "headerMsg" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-11-20

A vulnerability has been reported in refbase, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/32815/

 --

[SA32788] MyTopix "send" SQL Injection Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-11-20

cOndemned has discovered a vulnerability in MyTopix, which can be
exploited by malicious users to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32788/

 --

[SA32779] KimsON Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-11-19

md.r00t has reported a vulnerability in KimsON, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/32779/

 --

[SA32757] BoutikOne CMS "search_query" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-11-17

d3v1l has reported a vulnerability in BoutikOne CMS, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/32757/

 --

[SA32739] Streber Unspecified Cross-Site Request Forgery
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-11-18

Some vulnerabilities have been reported in Streber, which can be
exploited by malicious people to conduct cross-site request forgery
attacks.

Full Advisory:
http://secunia.com/advisories/32739/

 --

[SA32740] SSH Tectia Products CBC Mode Plaintext Recovery
Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      Exposure of sensitive information
Released:    2008-11-17

A vulnerability has been reported in multiple SSH Tectia products,
which potentially can be exploited by malicious people to disclose
sensitive information.

Full Advisory:
http://secunia.com/advisories/32740/

 --

[SA32775] vBulletin SQL Injection Vulnerabilities

Critical:    Not critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-11-18

Janek Vind has reported some vulnerabilities in vBulletin, which can be
exploited by malicious users to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32775/

 --

[SA32752] Opera "file://" URI Handling Buffer Overflow Vulnerability

Critical:    Not critical
Where:       From remote
Impact:      System access
Released:    2008-11-18

send9 has discovered a vulnerability in Opera, which potentially can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/32752/

 --

[SA32735] vBulletin Calender SQL Injection Vulnerability

Critical:    Not critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-11-18

Janek Vind has reported some vulnerabilities in vBulletin, which can be
exploited by malicious users to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32735/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support_at_private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


______________________________________________      
Visit the InfoSec News Security Bookstore
Best Selling Security Books and More!
http://www.shopinfosecnews.org 
Received on Fri Nov 21 2008 - 00:21:18 PST

This archive was generated by hypermail 2.2.0 : Fri Nov 21 2008 - 00:28:57 PST