======================================================================== The Secunia Weekly Advisory Summary 2008-12-04 - 2008-12-11 This week: 96 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: 1.91% of all PCs are fully patched! Almost one year ago, we posted statistics from the Secunia PSI about the state of programs installed on PCs. We think the timing is just right for a follow up on the previous numbers - as you might have noticed, Tuesday last week (25th Nov) version 1.0 of the Secunia PSI was released. The Secunia PSI 1.0 is out after being in beta for the past 17 months - a huge thanks goes out to all 793,478 users that helped us test and improve the Secunia PSI during this period. Read more: http://secunia.com/blog/37/ -- Monthly Binary Analysis Update (November) Last month, we were extremely busy and cranked out 28 analyses, but this month it was fairly quiet on the Binary Analysis front. We issued only 15 analyses in total, which is probably (without checking) the most quiet month we've had ever since the service launch about two years ago. However, that does not mean that I caught a lucky break and can stop writing after only three paragraphs and go back to finding a new vulnerability; there were still plenty of interesting vulnerabilities to analyse this month and thus blog about. Read more: http://secunia.com/blog/36/ ======================================================================== 2) This Week in Brief: A vulnerability has been discovered in Internet Explorer, which can be exploited by malicious people to compromise a user's system. Successful exploitation allows execution of arbitrary code. NOTE: Reportedly, the vulnerability is currently being actively exploited. No patch is currently available from the vendor. For more information, refer to: http://secunia.com/advisories/33089/ -- Microsoft has released their security bulletins for December. For more information, refer to: http://secunia.com/advisories/31498/ http://secunia.com/advisories/33035/ http://secunia.com/advisories/33020/ http://secunia.com/advisories/31593/ http://secunia.com/advisories/33063/ http://secunia.com/advisories/33053/ http://secunia.com/advisories/30285/ http://secunia.com/advisories/26534/ http://secunia.com/advisories/33058/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA32991] Sun Java JDK / JRE Multiple Vulnerabilities 2. [SA32270] Adobe Flash Player Multiple Security Issues and Vulnerabilities 3. [SA33089] Internet Explorer Data Binding Memory Corruption Vulnerability 4. [SA32942] VLC Media Player Real Demuxer Integer Overflow Vulnerability 5. [SA29773] Adobe Acrobat/Reader Multiple Vulnerabilities 6. [SA31821] Apple QuickTime Multiple Vulnerabilities 7. [SA33035] Microsoft Internet Explorer Multiple Vulnerabilities 8. [SA32997] Microsoft Windows WordPad Text Converter Vulnerability 9. [SA30285] Microsoft Office Word Multiple Vulnerabilities 10. [SA33001] Trillian Multiple Vulnerabilities ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA33089] Internet Explorer Data Binding Memory Corruption Vulnerability [SA33035] Microsoft Internet Explorer Multiple Vulnerabilities [SA33020] Microsoft Windows GDI Image Parsing Vulnerabilities [SA33080] CF Shopkart SQL Injection and Database Disclosure [SA33074] CF_Calendar "calid" SQL Injection Vulnerability [SA33070] CFMBlog "categorynbr" SQL Injection Vulnerability [SA33067] PostEcards "cid" SQL Injection and Database Disclosure [SA33064] CF_Forum "categorynbr" SQL Injection Vulnerability [SA33063] Microsoft Office SharePoint Server Security Bypass Vulnerability [SA33053] Microsoft Windows Explorer Search Handling Vulnerabilities [SA33044] Poll Pro "Password" SQL Injection Vulnerability [SA33030] Professional Download Assistant SQL Injections and Database Disclosure [SA33029] Ikon AdManager "ikonBAnner_AdManager.mdb" Database Disclosure [SA33018] Educate Server "db.mdb" Database Disclosure Security Issue [SA33012] RankEm "txtusername" and "txtpassword" SQL Injection Vulnerabilities [SA33011] NightFall Personal Diary Database Disclosure and Cross-Site Scripting [SA33009] Teamworx Server SQL Injection and Database Disclosure [SA33008] QMail Mailing List Manager Database Disclosure [SA33004] ASP Auto Dealer "ID" SQL Injection Vulnerability [SA33060] 3CX Phone System "fName" and "fPassword" Cross-Site Scripting [SA33034] Microsoft SQL Server 2000 "sp_replwritetovarbin()" Buffer Overflow [SA33017] Orb Networks Orb HTTP Processing Denial of Service UNIX/Linux: [SA33058] Microsoft Windows Media Products Two Vulnerabilities [SA33056] Fedora update for java-1.6.0-openjdk [SA33054] Fedora update for squirrelmail [SA33040] TWiki Cross-Site Scripting and Command Injection Vulnerabilities [SA33015] Red Hat update for java-1.5.0-sun / java-1.6.0-sun [SA33120] Sun Java System Portal Server File Disclosure Vulnerability [SA33108] Sun Ray Server Software Two Vulnerabilities [SA33104] HP-UX DCE Unspecified Denial of Service Vulnerability [SA33094] SUSE update for pdns [SA33093] SUSE update for squirrelmail [SA33091] SUSE update for gnutls [SA33087] SUSE Update for Multiple Packages [SA33082] Ubuntu update for vinagre [SA33071] Debian update for squirrelmail [SA33066] Debian update for lcms [SA33061] Debian update for streamripper [SA33052] Red Hat update for tomcat [SA33050] Sun Solaris OpenSSL PKCS#11 Denial of Service Vulnerability [SA33046] Fedora update for vinagre [SA33041] Vinagre "vinagre_utils_show_error()" Format String Vulnerability [SA33016] Debian update for clamav [SA33013] Red Hat update for ruby [SA33010] SUSE update for kernel [SA33111] Gentoo update for cups [SA33085] Avaya Messaging Storage Server CUPS Multiple Vulnerabilities [SA33116] Gentoo update for Archive-Tar [SA33115] Gentoo update for opensc [SA33121] Sun Solaris SSH CBC Mode Plaintext Recovery Vulnerability [SA33095] Avaya Products Net-snmp GETBULK Denial of Service [SA33092] SUSE update for samba [SA33006] Ubuntu update for nfs-utils [SA33119] Sun Ray Windows Connector Information Disclosure Vulnerability [SA33055] Fedora update for dbus [SA33051] Gentoo update for mgetty [SA33047] D-Bus Default Configuration Security Bypass [SA33005] Avaya Products ed "strip_escapes()" Buffer Overflow Security Issue [SA33083] rPath update for kernel [SA33081] Ubuntu update for compiz-fusion-plugins-main [SA33078] Linux Kernel MIPS Syscall Denial of Service [SA33077] Compiz Fusion Expo Plugin Security Bypass Other: [SA33032] Linksys WVC54GC Information Disclosure and ActiveX Control Buffer Overflow [SA33057] Aruba Mobility Controller EAP Frame Denial of Service [SA33028] HP DECnet-Plus for OpenVMS Security Bypass Cross Platform: [SA33043] DesignWorks Professional ".cct" Buffer Overflow Vulnerability [SA33007] Tizag Countdown Creator File Upload Vulnerability [SA33112] Drupal Cross-Site Request Forgery and Script Insertion [SA33106] Max's Guestbook "name" and "email" Script Insertion [SA33097] eZ Publish Insufficient User ID Validation Vulnerability [SA33096] Webmaster Marketplace "u" SQL Injection Vulnerability [SA33088] Pro Chat Rooms Cross-Site Scripting and Script Insertion [SA33086] Butterfly Organizer "id" and "mytable" SQL Injection Vulnerabilities [SA33084] Atlassian JIRA Dynamic URL Transformation Vulnerability [SA33073] Peel "rubid" SQL Injection vulnerability [SA33065] PHP Multiple Newsletters File Inclusion and Cross-Site Scripting [SA33048] XOOPS Script Insertion and Local File Inclusion [SA33039] IPN Pro 3 "settings.php" Security Bypass Vulnerability [SA33038] DL PayCart "settings.php" Security Bypass Vulnerability [SA33037] Bonza Cart "ad_settings.php" Security Bypass Vulnerability [SA33033] w3blabor CMS Multiple Vulnerabilities [SA33031] phpBB Tag Board Module "id" SQL Injection Vulnerability [SA33027] phpAddEdit "editform" Local File Inclusion Vulnerability [SA33024] BPowerHouse Multiple Products "page" and "admin" Local File Inclusion [SA33021] Tribiq CMS "cID" SQL Injection Vulnerability [SA33019] Multiple Membership Script "id" SQL Injection Vulnerability [SA33014] phpPgAdmin "_language" Local File Inclusion Vulnerability [SA33049] BMC PATROL Version Logging Format String Vulnerability [SA33079] Moodle Unspecified Cross-Site Scripting Vulnerability [SA33076] phpMyAdmin Cross-Site Request Forgery Vulnerability [SA33069] PhPepperShop Webshop Multiple Cross-Site Scripting Vulnerabilities [SA33023] ImpressCMS "rank_title" Script Insertion Vulnerability [SA33022] IBM WebSphere Application Server Multiple Vulnerabilities [SA33062] Google Gears Cross-Site Scripting Weakness [SA33059] PunBB Cross-Site Scripting and SQL Injection Vulnerabilities [SA33025] Tor Two Weaknesses ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA33089] Internet Explorer Data Binding Memory Corruption Vulnerability Critical: Extremely critical Where: From remote Impact: System access Released: 2008-12-10 A vulnerability has been discovered in Internet Explorer, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/33089/ -- [SA33035] Microsoft Internet Explorer Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2008-12-09 Some vulnerabilities have been reported in Microsoft Internet Explorer, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/33035/ -- [SA33020] Microsoft Windows GDI Image Parsing Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2008-12-09 Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/33020/ -- [SA33080] CF Shopkart SQL Injection and Database Disclosure Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2008-12-11 AlpHaNiX has reported a vulnerability and a security issue in CF Shopkart, which can be exploited by malicious people to conduct SQL injection attacks and disclose sensitive information. Full Advisory: http://secunia.com/advisories/33080/ -- [SA33074] CF_Calendar "calid" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-12-11 AlpHaNiX has reported a vulnerability in CF_Calendar, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/33074/ -- [SA33070] CFMBlog "categorynbr" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-12-11 AlpHaNiX has reported a vulnerability in CFMBlog, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/33070/ -- [SA33067] PostEcards "cid" SQL Injection and Database Disclosure Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data, Exposure of sensitive information Released: 2008-12-10 AlpHaNiX has reported a vulnerability and a security issue in PostEcards, which can be exploited by malicious people to conduct SQL injection attacks and disclose sensitive information. Full Advisory: http://secunia.com/advisories/33067/ -- [SA33064] CF_Forum "categorynbr" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-12-11 AlpHaNiX has reported a vulnerability in CF_Forum, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/33064/ -- [SA33063] Microsoft Office SharePoint Server Security Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2008-12-09 A vulnerability has been reported in Microsoft Office SharePoint Server, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/33063/ -- [SA33053] Microsoft Windows Explorer Search Handling Vulnerabilities Critical: Moderately critical Where: From remote Impact: System access Released: 2008-12-09 Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/33053/ -- [SA33044] Poll Pro "Password" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-12-09 A vulnerability has been reported in Poll Pro, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/33044/ -- [SA33030] Professional Download Assistant SQL Injections and Database Disclosure Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2008-12-09 A security issue and some vulnerabilities have been discovered in Professional Download Assistant, which can be exploited by malicious people to disclose sensitive information and conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/33030/ -- [SA33029] Ikon AdManager "ikonBAnner_AdManager.mdb" Database Disclosure Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2008-12-08 Ghost Hacker has discovered a security issue in Ikon AdManager, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/33029/ -- [SA33018] Educate Server "db.mdb" Database Disclosure Security Issue Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2008-12-08 ZoRLu has reported a security issue in Educate Server, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/33018/ -- [SA33012] RankEm "txtusername" and "txtpassword" SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data Released: 2008-12-08 OffensiveTrack has discovered some vulnerabilities in RankEm, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/33012/ -- [SA33011] NightFall Personal Diary Database Disclosure and Cross-Site Scripting Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Exposure of sensitive information Released: 2008-12-08 OffensiveTrack has discovered a vulnerability and a security issue in Nightfall Personal Diary, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information. Full Advisory: http://secunia.com/advisories/33011/ -- [SA33009] Teamworx Server SQL Injection and Database Disclosure Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2008-12-08 ZoRLu has reported a vulnerability and a security issue in Teamworx Server, which can be exploited by malicious people to conduct SQL injection attacks and disclose sensitive information. Full Advisory: http://secunia.com/advisories/33009/ -- [SA33008] QMail Mailing List Manager Database Disclosure Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2008-12-09 A security issue has been discovered in QMail Mailing List Manager, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/33008/ -- [SA33004] ASP Auto Dealer "ID" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-12-08 OffensiveTrack has reported a vulnerability in ASP Auto Dealer, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/33004/ -- [SA33060] 3CX Phone System "fName" and "fPassword" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-12-09 Chris Castaldo has discovered some vulnerabilities in 3CX Phone System, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/33060/ -- [SA33034] Microsoft SQL Server 2000 "sp_replwritetovarbin()" Buffer Overflow Critical: Less critical Where: From local network Impact: Privilege escalation Released: 2008-12-09 Bernhard Mueller has discovered a vulnerability in Microsoft SQL Server 2000, which can be exploited by malicious users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/33034/ -- [SA33017] Orb Networks Orb HTTP Processing Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2008-12-08 A vulnerability has been reported in Orb Networks Orb, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/33017/ UNIX/Linux:-- [SA33058] Microsoft Windows Media Products Two Vulnerabilities Critical: Highly critical Where: From remote Impact: Security Bypass, Exposure of sensitive information, System access Released: 2008-12-09 Two vulnerabilities have been reported in several Microsoft Windows Media products, which can be exploited by malicious people to bypass certain security restrictions or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/33058/ -- [SA33056] Fedora update for java-1.6.0-openjdk Critical: Highly critical Where: From remote Impact: Security Bypass, Exposure of system information, Exposure of sensitive information, DoS, System access Released: 2008-12-08 Fedora has issued an update for java-1.6.0-openjdk. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, cause a DoS (Denial of service), or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/33056/ -- [SA33054] Fedora update for squirrelmail Critical: Highly critical Where: From remote Impact: Cross Site Scripting, System access Released: 2008-12-08 Fedora has issued an update for squirrelmail. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system and conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/33054/ -- [SA33040] TWiki Cross-Site Scripting and Command Injection Vulnerabilities Critical: Highly critical Where: From remote Impact: Cross Site Scripting, System access Released: 2008-12-08 Some vulnerabilities have been reported in TWiki, which can be exploited by malicious people to conduct cross-site scripting attacks or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/33040/ -- [SA33015] Red Hat update for java-1.5.0-sun / java-1.6.0-sun Critical: Highly critical Where: From remote Impact: Security Bypass, Exposure of system information, Exposure of sensitive information, DoS, System access Released: 2008-12-05 Red Hat has issued an update for java-1.5.0-sun and java-1.6.0-sun. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, cause a DoS (Denial of service), or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/33015/ -- [SA33120] Sun Java System Portal Server File Disclosure Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2008-12-11 Sun has acknowledged a vulnerability in Sun Java System Portal Server, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/33120/ -- [SA33108] Sun Ray Server Software Two Vulnerabilities Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2008-12-11 Sun has acknowledged two vulnerabilities in Sun Ray Server Software, which can be exploited by malicious, local users or by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/33108/ -- [SA33104] HP-UX DCE Unspecified Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2008-12-11 A vulnerability has been reported in HP-UX, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/33104/ -- [SA33094] SUSE update for pdns Critical: Moderately critical Where: From remote Impact: DoS Released: 2008-12-10 SUSE has issued an update for pdns. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/33094/ -- [SA33093] SUSE update for squirrelmail Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2008-12-10 SUSE has issued an update for squirrelmail. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/33093/ -- [SA33091] SUSE update for gnutls Critical: Moderately critical Where: From remote Impact: Security Bypass, Spoofing Released: 2008-12-10 SUSE has issued an update for gnutls. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/33091/ -- [SA33087] SUSE Update for Multiple Packages Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data, DoS Released: 2008-12-10 SUSE has issued an update for multiple packages. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and bypass certain security restrictions, and malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/33087/ -- [SA33082] Ubuntu update for vinagre Critical: Moderately critical Where: From remote Impact: System access Released: 2008-12-10 Ubuntu has issued an update for vinagre. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/33082/ -- [SA33071] Debian update for squirrelmail Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2008-12-09 Debian has issued an update for squirrelmail. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/33071/ -- [SA33066] Debian update for lcms Critical: Moderately critical Where: From remote Impact: System access Released: 2008-12-10 Debian has issued an update for lcms. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/33066/ -- [SA33061] Debian update for streamripper Critical: Moderately critical Where: From remote Impact: System access Released: 2008-12-09 Debian has issued an update for streamripper. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/33061/ -- [SA33052] Red Hat update for tomcat Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Exposure of system information, Exposure of sensitive information Released: 2008-12-08 Red Hat has issued an update for tomcat. This fixes a security issue and some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, or disclose sensitive information. Full Advisory: http://secunia.com/advisories/33052/ -- [SA33050] Sun Solaris OpenSSL PKCS#11 Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2008-12-08 A vulnerability has been reported in Sun Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/33050/ -- [SA33046] Fedora update for vinagre Critical: Moderately critical Where: From remote Impact: System access Released: 2008-12-08 Fedora has issued an update for vinagre. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/33046/ -- [SA33041] Vinagre "vinagre_utils_show_error()" Format String Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2008-12-08 A vulnerability has been discovered in Vinagre, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/33041/ -- [SA33016] Debian update for clamav Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2008-12-05 Debian has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/33016/ -- [SA33013] Red Hat update for ruby Critical: Moderately critical Where: From remote Impact: DoS Released: 2008-12-05 Red Hat has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/33013/ -- [SA33010] SUSE update for kernel Critical: Moderately critical Where: From remote Impact: Privilege escalation, DoS, System access Released: 2008-12-05 SUSE has issued an update for the kernel. This fixes a security issue and some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and cause a DoS (Denial of Service) and malicious people to cause a DoS or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/33010/ -- [SA33111] Gentoo update for cups Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2008-12-11 Gentoo has issued an update for cups. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/33111/ -- [SA33085] Avaya Messaging Storage Server CUPS Multiple Vulnerabilities Critical: Moderately critical Where: From local network Impact: System access Released: 2008-12-10 Avaya has acknowledged some vulnerabilities in Messaging Storage Server, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/33085/ -- [SA33116] Gentoo update for Archive-Tar Critical: Less critical Where: From remote Impact: System access Released: 2008-12-11 Gentoo has issued an update for Archive-Tar. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/33116/ -- [SA33115] Gentoo update for opensc Critical: Less critical Where: From remote Impact: Security Bypass Released: 2008-12-11 Gentoo has issued an update for opensc. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/33115/ -- [SA33121] Sun Solaris SSH CBC Mode Plaintext Recovery Vulnerability Critical: Less critical Where: From local network Impact: Exposure of sensitive information Released: 2008-12-11 Sun has acknowledged a vulnerability in Solaris, which potentially can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/33121/ -- [SA33095] Avaya Products Net-snmp GETBULK Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2008-12-10 Avaya has acknowledged a vulnerability in various Avaya products, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/33095/ -- [SA33092] SUSE update for samba Critical: Less critical Where: From local network Impact: Exposure of sensitive information Released: 2008-12-10 SUSE has issued an update for samba. This fixes a vulnerability, which potentially can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/33092/ -- [SA33006] Ubuntu update for nfs-utils Critical: Less critical Where: From local network Impact: Security Bypass Released: 2008-12-05 Ubuntu has issued an update for nfs-utils. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/33006/ -- [SA33119] Sun Ray Windows Connector Information Disclosure Vulnerability Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2008-12-11 Sun has acknowledged a vulnerability in Sun Ray Windows Connector, which can be exploited by malicious, local users to disclose sensitive information. Full Advisory: http://secunia.com/advisories/33119/ -- [SA33055] Fedora update for dbus Critical: Less critical Where: Local system Impact: Security Bypass Released: 2008-12-08 Fedora has issued an update for dbus. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/33055/ -- [SA33051] Gentoo update for mgetty Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2008-12-08 Gentoo has issued an update for mgetty. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/33051/ -- [SA33047] D-Bus Default Configuration Security Bypass Critical: Less critical Where: Local system Impact: Security Bypass Released: 2008-12-08 A security issue has been reported in D-Bus, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/33047/ -- [SA33005] Avaya Products ed "strip_escapes()" Buffer Overflow Security Issue Critical: Not critical Where: From remote Impact: System access Released: 2008-12-05 Avaya has acknowledged a security issue in various Avaya products, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/33005/ -- [SA33083] rPath update for kernel Critical: Not critical Where: Local system Impact: DoS Released: 2008-12-10 rPath has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/33083/ -- [SA33081] Ubuntu update for compiz-fusion-plugins-main Critical: Not critical Where: Local system Impact: Security Bypass Released: 2008-12-09 Ubuntu has issued an update for compiz-fusion-plugins-main. This fixes a security issue, which can be exploited by malicious people with physical access to a system to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/33081/ -- [SA33078] Linux Kernel MIPS Syscall Denial of Service Critical: Not critical Where: Local system Impact: DoS Released: 2008-12-09 A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/33078/ -- [SA33077] Compiz Fusion Expo Plugin Security Bypass Critical: Not critical Where: Local system Impact: Security Bypass Released: 2008-12-09 A security issue has been reported in Compiz Fusion, which can be exploited by malicious people with physical access to a system to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/33077/ Other:-- [SA33032] Linksys WVC54GC Information Disclosure and ActiveX Control Buffer Overflow Critical: Highly critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information, System access Released: 2008-12-08 A security issue and a vulnerability have been reported in Linksys WVC54GC, which can be exploited by malicious people to disclose system and sensitive information and to compromise a user's system. Full Advisory: http://secunia.com/advisories/33032/ -- [SA33057] Aruba Mobility Controller EAP Frame Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2008-12-09 A vulnerability has been reported in Aruba Mobility Controller, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/33057/ -- [SA33028] HP DECnet-Plus for OpenVMS Security Bypass Critical: Not critical Where: Local system Impact: Security Bypass Released: 2008-12-09 A weakness has been reported in HP DECnet-Plus for OpenVMS, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/33028/ Cross Platform:-- [SA33043] DesignWorks Professional ".cct" Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2008-12-08 Cn4phux has discovered a vulnerability in DesignWorks Professional, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/33043/ -- [SA33007] Tizag Countdown Creator File Upload Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2008-12-08 ahmadbady has discovered a vulnerability in Tizag Countdown Creator, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/33007/ -- [SA33112] Drupal Cross-Site Request Forgery and Script Insertion Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2008-12-11 Some vulnerabilities have been reported in Drupal, which can be exploited by malicious people to conduct cross-site request forgery and cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/33112/ -- [SA33106] Max's Guestbook "name" and "email" Script Insertion Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2008-12-11 GTADarkDude has discovered some vulnerabilities in Max's Guestbook, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/33106/ -- [SA33097] eZ Publish Insufficient User ID Validation Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2008-12-11 A vulnerability has been reported in eZ Publish, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/33097/ -- [SA33096] Webmaster Marketplace "u" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-12-11 Hussin X has reported a vulnerability in Webmaster Marketplace, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/33096/ -- [SA33088] Pro Chat Rooms Cross-Site Scripting and Script Insertion Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2008-12-11 ZynbER has reported some vulnerabilities in Pro Chat Rooms, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks. Full Advisory: http://secunia.com/advisories/33088/ -- [SA33086] Butterfly Organizer "id" and "mytable" SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-12-11 Osirys has discovered some vulnerabilities in Butterfly Organizer, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/33086/ -- [SA33084] Atlassian JIRA Dynamic URL Transformation Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2008-12-10 A vulnerability has been reported in Atlassian JIRA, which can be exploited by malicious users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/33084/ -- [SA33073] Peel "rubid" SQL Injection vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-12-10 SuB-ZeRo has reported a vulnerability in Peel, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/33073/ -- [SA33065] PHP Multiple Newsletters File Inclusion and Cross-Site Scripting Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Exposure of system information, Exposure of sensitive information Released: 2008-12-10 Ahmadbady has discovered some vulnerabilities in PHP Multiple Newsletters, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information. Full Advisory: http://secunia.com/advisories/33065/ -- [SA33048] XOOPS Script Insertion and Local File Inclusion Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Exposure of sensitive information Released: 2008-12-08 Some vulnerabilities have been reported in XOOPS, which can be exploited by malicious users to conduct script insertion attacks and malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/33048/ -- [SA33039] IPN Pro 3 "settings.php" Security Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2008-12-10 G4N0K has reported a vulnerability in IPN Pro 3, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/33039/ -- [SA33038] DL PayCart "settings.php" Security Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2008-12-10 G4N0K has reported a vulnerability in DL PayCart, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/33038/ -- [SA33037] Bonza Cart "ad_settings.php" Security Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2008-12-10 G4N0K has reported a vulnerability in Bonza Cart, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/33037/ -- [SA33033] w3blabor CMS Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of system information, Exposure of sensitive information Released: 2008-12-09 DNX has discovered a vulnerability and a security issue in w3blabor CMS, which can be exploited by malicious people to compromise a vulnerable system and disclose sensitive information. Full Advisory: http://secunia.com/advisories/33033/ -- [SA33031] phpBB Tag Board Module "id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-12-09 Athos has discovered a vulnerability in the Tag Board module for phpBB, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/33031/ -- [SA33027] phpAddEdit "editform" Local File Inclusion Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2008-12-11 Nuclear has discovered a vulnerability in phpAddEdit, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/33027/ -- [SA33024] BPowerHouse Multiple Products "page" and "admin" Local File Inclusion Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2008-12-08 cOndemned has discovered some vulnerabilities in multiple BPowerHouse products, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/33024/ -- [SA33021] Tribiq CMS "cID" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-12-05 M4ck-h_at_cK has discovered a vulnerability in Tribiq CMS, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/33021/ -- [SA33019] Multiple Membership Script "id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-12-08 ViRuS_HaCkErS has reported a vulnerability in Multiple Membership Script, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/33019/ -- [SA33014] phpPgAdmin "_language" Local File Inclusion Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2008-12-08 Dun has discovered a vulnerability in phpPgAdmin, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/33014/ -- [SA33049] BMC PATROL Version Logging Format String Vulnerability Critical: Moderately critical Where: From local network Impact: System access Released: 2008-12-09 A vulnerability has been reported in BMC PATROL, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/33049/ -- [SA33079] Moodle Unspecified Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-12-11 A vulnerability has been reported in Moodle, which can be exploited by malicious users to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/33079/ -- [SA33076] phpMyAdmin Cross-Site Request Forgery Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-12-10 A vulnerability has been reported in phpMyAdmin, which can be exploited by malicious people to conduct cross-site request forgery attacks. Full Advisory: http://secunia.com/advisories/33076/ -- [SA33069] PhPepperShop Webshop Multiple Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-12-09 Some vulnerabilities have been reported in PhPepperShop Webshop, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/33069/ -- [SA33023] ImpressCMS "rank_title" Script Insertion Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-12-05 Muhaimin Dzulfakar has discovered a vulnerability in ImpressCMS, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/33023/ -- [SA33022] IBM WebSphere Application Server Multiple Vulnerabilities Critical: Less critical Where: From remote Impact: Unknown, Exposure of sensitive information Released: 2008-12-08 Some vulnerabilities have been reported in IBM WebSphere Application Server, where some have an unknown impact and others can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/33022/ -- [SA33062] Google Gears Cross-Site Scripting Weakness Critical: Not critical Where: From remote Impact: Cross Site Scripting Released: 2008-12-09 Yair Amit has reported a weakness in Google Gears, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/33062/ -- [SA33059] PunBB Cross-Site Scripting and SQL Injection Vulnerabilities Critical: Not critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2008-12-09 Some vulnerabilities have been reported in PunBB, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/33059/ -- [SA33025] Tor Two Weaknesses Critical: Not critical Where: From remote Impact: Security Bypass, Privilege escalation Released: 2008-12-05 Two weaknesses have been reported in Tor, which can be exploited by malicious, local users to potentially perform certain actions with escalated privileges or by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/33025/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Subscribe: http://secunia.com/advisories/weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support_at_private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _______________________________________________ Help InfoSecNews.org with a donation! http://www.infosecnews.org/donate.htmlReceived on Fri Dec 12 2008 - 01:05:44 PST
This archive was generated by hypermail 2.2.0 : Fri Dec 12 2008 - 01:16:24 PST