[ISN] Secunia Weekly Summary - Issue: 2008-51

From: InfoSec News <alerts_at_private>
Date: Fri, 19 Dec 2008 05:21:19 -0600 (CST)
========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2008-12-11 - 2008-12-18                        

                       This week: 85 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Secunia PSI: Habla espaol!

The Secunia PSI 1.0 - now available in Spanish!

Remember; installing the latest security patches for your programs is
just as important as having an anti-virus program and being behind a
firewall.

Read more:
http://secunia.com/blog/39/

 --

Internet Explorer Data Binding 0-Day Clarifications

As everyone using Internet Explorer hopefully are aware of, then
there's a new 0-day circulating. There has been a lot of confusion as
to both the problem cause and the browser versions affected, but in
this blog, I should be able to sort it all out.

Basically, this vulnerability was initially reported by everyone
(including ourselves) as an XML processing vulnerability in Internet
Explorer 7. PoCs and working exploits were immediately made publicly
available by various sources and security vendors were quick to report
that their products were successfully detecting attacks. But were they
really?

Read more:
http://secunia.com/blog/38/

========================================================================
2) This Week in Brief:

A vulnerability has been discovered in Internet Explorer, which can be
exploited by malicious people to compromise a user's system.

Successful exploitation allows execution of arbitrary code.

NOTE: Reportedly, the vulnerability is currently being actively
exploited.

A patch has been released from the vendor.

For more information, refer to:
http://secunia.com/advisories/33089/

 --

Some vulnerabilities have been reported in Mozilla Firefox, which can
be exploited by malicious people to bypass certain security
restrictions, disclose sensitive information, conduct cross-site
scripting attacks, or potentially compromise a user's system.

For more information, refer to:
http://secunia.com/advisories/33203/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA33089] Internet Explorer Data Binding Memory Corruption
              Vulnerability
2.  [SA33203] Mozilla Firefox 3 Multiple Vulnerabilities
3.  [SA32991] Sun Java JDK / JRE Multiple Vulnerabilities
4.  [SA32270] Adobe Flash Player Multiple Security Issues and
              Vulnerabilities
5.  [SA33035] Microsoft Internet Explorer Multiple Vulnerabilities
6.  [SA33132] IBM WebSphere Portal Unspecified Security Bypass
              Vulnerability
7.  [SA31593] Microsoft Excel Multiple Vulnerabilities
8.  [SA29773] Adobe Acrobat/Reader Multiple Vulnerabilities
9.  [SA33034] Microsoft SQL Server "sp_replwritetovarbin()" Buffer
              Overflow
10. [SA20153] Microsoft Word Malformed Object Pointer Vulnerability

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA33183] Realtek Media Player Playlist Processing Buffer Overflow
[SA33233] betaparticle blog Database Disclosure
[SA33199] EvimGibi Pro Resim Galerisi "kat_id" SQL Injection
[SA33197] PreProjects Products Database Disclosure Security Issue
[SA33193] Hitachi JP1/Integrated Management Script Insertion
Vulnerability
[SA33172] HomeBuilder Multiple SQL Injection Vulnerabilities
[SA33167] RealtyListings Multiple SQL Injection Vulnerabilities
[SA33165] Nukedit "dbsite.mdb" Database Disclose Security Issue
[SA33155] ClickAndEmail SQL Injection and Cross-Site Scripting
[SA33154] Click&Rank Multiple SQL Injection Vulnerabilities
[SA33152] ASP-DEv XM Events Diary "cat" SQL Injection Vulnerabilities
[SA33134] ASPired2Blog SQL Injection and Database Disclosure
[SA33130] The Net Guys Multiple Products Database Disclosure
[SA33128] ASP-CMS "cha" SQL Injection Vulnerability
[SA33123] TmaxSoft JEUS Script Source Disclosure Vulnerability

UNIX/Linux:
[SA33232] Ubuntu update for firefox
[SA33231] Ubuntu update for firefox
[SA33221] Adobe Flash Player for Linux SWF Processing Vulnerability
[SA33216] Ubuntu update for firefox-3.0 and xulrunner-1.9
[SA33189] Red Hat update for seamonkey
[SA33188] Red Hat update for firefox
[SA33179] Apple Mac OS X Security Update Fixes Multiple
Vulnerabilities
[SA33178] Gentoo update for ruby
[SA33170] Fedora update for roundcubemail
[SA33140] Gentoo update for openoffice and openoffice-bin
[SA33136] MPlayer TwinVQ Processing Buffer Overflow Vulnerability
[SA33219] Ubuntu update for lcms
[SA33201] Red Hat update for kernel
[SA33195] SUSE update for clamav
[SA33194] SUSE update for IBM Java
[SA33187] Avaya CMS Sun Java JDK / JRE Multiple Vulnerabilities
[SA33181] Red Hat update for enscript
[SA33173] Gentoo update for jasper
[SA33149] Gentoo update for dovecot
[SA33148] Sun Solaris IPv4 Forwarding Denial of Service
[SA33147] Fedora update for drupal
[SA33142] Debian update for uw-imap
[SA33137] Gentoo update for povray
[SA33132] IBM WebSphere Portal Unspecified Security Bypass
Vulnerability
[SA33122] Joomla Live Chat Component "last" SQL Injection
Vulnerabilities
[SA33185] Ubuntu update for ruby1.9
[SA33180] Debian update for linux-2.6
[SA33156] Sun Solaris Apache "mod_proxy_http" and "mod_proxy_ftp"
Vulnerabilities
[SA33146] Fedora update for phpMyAdmin
[SA33144] Fedora update for gallery2
[SA33138] Debian update for no-ip
[SA33157] Sun Solaris "libICE" Denial of Service Vulnerability
[SA33153] Avahi Multicast DNS Processing Denial of Service
Vulnerability
[SA33217] Ubuntu update for libvirt
[SA33198] libvirt Security Bypass Issue
[SA33182] Red Hat update for kernel
[SA33160] Sun Solaris IP Tunnel SIOCGTUNPARAM IOCTL Vulnerability
[SA33151] SUSE update for freeradius
[SA33141] Gentoo update for honeyd
[SA33139] Gentoo update for aview

Other:
[SA33158] Sun Netra / Fire Servers IP Spoofing Vulnerability

Cross Platform:
[SA33205] Mozilla Thunderbird Multiple Vulnerabilities
[SA33204] Mozilla SeaMonkey Multiple Vulnerabilities
[SA33203] Mozilla Firefox 3 Multiple Vulnerabilities
[SA33184] Mozilla Firefox 2 Multiple Vulnerabilities
[SA33169] RoundCube Webmail "bin/html2text.php" PHP Code Execution
[SA33163] WorkSimple File Inclusion and Information Disclosure
[SA33224] ADbNewsSender Multiple Vulnerabilities
[SA33208] Rematic CMS "id" SQL Injection Vulnerabilities
[SA33192] Irrlicht B3D Loader Buffer Overflow Vulnerability
[SA33186] phplist Unspecified Local File Inclusion Vulnerability
[SA33176] Mediatheka Local File Inclusion and SQL Injection
[SA33162] GeekiGeeki Arbitrary File Disclosure Vulnerabilities
[SA33161] Injader SQL Injection and Script Insertion
[SA33150] RSMScript Security Bypass and Script Insertion
Vulnerabilities
[SA33145] chuggnutt.com "HTML to Plain Text Conversion" PHP Class Code
Execution
[SA33133] MediaWiki Multiple Vulnerabilities
[SA33126] Xpoze "menu" SQL Injection Vulnerability
[SA33125] Social Groupie "id" SQL Injection Vulnerability
[SA33124] phpAddEdit "addedit" Cookie Security Bypass Vulnerability
[SA33225] Drupal Views Module Unspecified SQL Injection
Vulnerabilities
[SA33206] TangoCMS Unspecified Cross-Site Request Forgery
Vulnerabilities
[SA33200] Interstage HTTP Server Cross-Site Scripting Vulnerability
[SA33175] FlatnuX CMS Multiple Cross-Site Scripting Vulnerabilities
[SA33174] BabbleBoard Cross-Site Request Forgery Vulnerability
[SA33166] phpBB Account Re-activation Security Bypass
[SA33164] Barracuda Products Cross-Site Scripting Vulnerabilities
[SA33159] Sun Java Wireless Toolkit for CLDC Buffer Overflow
Vulnerabilities
[SA33143] IBM Tivoli Provisioning Manager SOAP Authentication Security
Issue
[SA33127] Citrix Application Gateway Broadcast Server SQL Injection
Vulnerability

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA33183] Realtek Media Player Playlist Processing Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-12-16

shinnai has discovered a vulnerability in Realtek Media Player
(RtlRack), which can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/33183/

 --

[SA33233] betaparticle blog Database Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2008-12-18

A security issue has been reported in betaparticle blog, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/33233/

 --

[SA33199] EvimGibi Pro Resim Galerisi "kat_id" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-17

ZoRLu has discovered a vulnerability in EvimGibi Pro Resim Galerisi,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/33199/

 --

[SA33197] PreProjects Products Database Disclosure Security Issue

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2008-12-18

Pouya_Server has reported a security issue in multiple PreProjects
products, which can be exploited by malicious people to disclose
sensitive information.

Full Advisory:
http://secunia.com/advisories/33197/

 --

[SA33193] Hitachi JP1/Integrated Management Script Insertion
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-16

A vulnerability has been reported in Hitachi JP1/Integrated Management,
which can be exploited by malicious people to conduct script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/33193/

 --

[SA33172] HomeBuilder Multiple SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-15

AlpHaNiX has reported some vulnerabilities in HomeBuilder, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33172/

 --

[SA33167] RealtyListings Multiple SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-15

AlpHaNiX has reported some vulnerabilities in RealtyListings, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33167/

 --

[SA33165] Nukedit "dbsite.mdb" Database Disclose Security Issue

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2008-12-17

Cyber.Zer0 has discovered a security issue in Nukedit, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/33165/

 --

[SA33155] ClickAndEmail SQL Injection and Cross-Site Scripting

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Manipulation of
data
Released:    2008-12-16

AlpHaNiX has reported some vulnerabilities in ClickAndEmail, which can
be exploited by malicious people to conduct SQL injection and
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/33155/

 --

[SA33154] Click&Rank Multiple SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2008-12-16

AlpHaNiX has reported some vulnerabilities in Click&Rank, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33154/

 --

[SA33152] ASP-DEv XM Events Diary "cat" SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-15

Some vulnerabilities have been discovered in ASP-DEv XM Events Diary,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/33152/

 --

[SA33134] ASPired2Blog SQL Injection and Database Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-12-15

Pouya_Server has reported a vulnerability and a security issue in
ASPired2Blog, which can be exploited by malicious people to conduct SQL
injection attacks and disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/33134/

 --

[SA33130] The Net Guys Multiple Products Database Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2008-12-12

Some security issues have been reported in multiple The Net Guys
products, which can be exploited by malicious people to disclose
sensitive information.

Full Advisory:
http://secunia.com/advisories/33130/

 --

[SA33128] ASP-CMS "cha" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-12

Sina Yazdanmehr has discovered a vulnerability in ASP-CMS, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33128/

 --

[SA33123] TmaxSoft JEUS Script Source Disclosure Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2008-12-17

Simon Ryeo has reported a vulnerability in TmaxSoft JEUS, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/33123/


UNIX/Linux:--

[SA33232] Ubuntu update for firefox

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Exposure of
sensitive information, System access
Released:    2008-12-18

Ubuntu has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, disclose sensitive information, conduct
cross-site scripting attacks, or potentially compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/33232/

 --

[SA33231] Ubuntu update for firefox

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Exposure of
sensitive information, System access
Released:    2008-12-18

Ubuntu has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, disclose sensitive information, conduct
cross-site scripting attacks, or potentially compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/33231/

 --

[SA33221] Adobe Flash Player for Linux SWF Processing Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-12-18

A vulnerability has been reported in Adobe Flash Player, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/33221/

 --

[SA33216] Ubuntu update for firefox-3.0 and xulrunner-1.9

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Exposure of
sensitive information, System access
Released:    2008-12-18

Ubuntu has issued an update for firefox-3.0 and xulrunner-1.9. This
fixes some vulnerabilities, which can be exploited by malicious people
to bypass certain security restrictions, disclose sensitive
information, conduct cross-site scripting attacks, or potentially
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/33216/

 --

[SA33189] Red Hat update for seamonkey

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Exposure of
sensitive information, System access
Released:    2008-12-17

Red Hat has issued an update for seamonkey. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, disclose sensitive information, conduct
cross-site scripting attacks, or potentially compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/33189/

 --

[SA33188] Red Hat update for firefox

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Exposure of
sensitive information, System access
Released:    2008-12-17

Red Hat has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, disclose sensitive information, conduct
cross-site scripting attacks, or potentially compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/33188/

 --

[SA33179] Apple Mac OS X Security Update Fixes Multiple
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Manipulation of
data, Exposure of sensitive information, Privilege escalation, DoS,
System access
Released:    2008-12-16

Apple has issued a security update for Mac OS X, which fixes multiple
vulnerabilities.

Full Advisory:
http://secunia.com/advisories/33179/

 --

[SA33178] Gentoo update for ruby

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Spoofing, DoS, System access
Released:    2008-12-17

Gentoo has issued an update for ruby. This fixes some vulnerabilities,
which can be exploited by malicious people to bypass certain security
restrictions, cause a DoS (Denial of Service), conduct spoofing
attacks, and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/33178/

 --

[SA33170] Fedora update for roundcubemail

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-12-15

Fedora has issued an update for roundcubemail. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a vulnerable system.

Full Advisory:
http://secunia.com/advisories/33170/

 --

[SA33140] Gentoo update for openoffice and openoffice-bin

Critical:    Highly critical
Where:       From remote
Impact:      Privilege escalation, System access
Released:    2008-12-15

Gentoo has issued an update for openoffice and openoffice-bin. This
fixes some vulnerabilities and a security issue, which potentially can
be exploited by malicious people to compromise a user's system, and by
malicious, local users to perform certain actions with escalated
privileges.

Full Advisory:
http://secunia.com/advisories/33140/

 --

[SA33136] MPlayer TwinVQ Processing Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-12-15

Tobias Klein has reported a vulnerability in MPlayer, which potentially
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/33136/

 --

[SA33219] Ubuntu update for lcms

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2008-12-18

Ubuntu has issued an update for lcms. This fixes a vulnerability, which
can be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/33219/

 --

[SA33201] Red Hat update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      Privilege escalation, DoS
Released:    2008-12-17

Red Hat has issued an update for the kernel. This fixes a security
issue and some vulnerabilities, which can be exploited by malicious,
local users to cause a DoS (Denial of Service) and gain escalated
privileges, and by malicious people to cause a DoS.

Full Advisory:
http://secunia.com/advisories/33201/

 --

[SA33195] SUSE update for clamav

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2008-12-16

SUSE has issued an update for clamav. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/33195/

 --

[SA33194] SUSE update for IBM Java

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of system information, Exposure
of sensitive information
Released:    2008-12-16

SUSE has issued an update for IBM Java. This fixes some
vulnerabilities, which can be exploited by malicious people to disclose
system and potentially sensitive information and bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/33194/

 --

[SA33187] Avaya CMS Sun Java JDK / JRE Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, System access
Released:    2008-12-16

Avaya has acknowledged some vulnerabilities in Avaya CMS, which can be
exploited by malicious people to bypass certain security restrictions
or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/33187/

 --

[SA33181] Red Hat update for enscript

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2008-12-16

Red Hat has issued an update for enscript. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/33181/

 --

[SA33173] Gentoo update for jasper

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2008-12-17

Gentoo has issued an update for jasper. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/33173/

 --

[SA33149] Gentoo update for dovecot

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS
Released:    2008-12-15

Gentoo has issued an update for dovecot. This fixes two security issues
and a vulnerability, which can be exploited by malicious users to bypass
certain security restrictions and malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/33149/

 --

[SA33148] Sun Solaris IPv4 Forwarding Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2008-12-16

A vulnerability has been reported in Sun Solaris, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/33148/

 --

[SA33147] Fedora update for drupal

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-15

Fedora has issued an update for drupal. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site request forgery and cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/33147/

 --

[SA33142] Debian update for uw-imap

Critical:    Moderately critical
Where:       From remote
Impact:      Privilege escalation, System access
Released:    2008-12-15

Debian has issued an update for uw-imap. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
potentially gain escalated privileges, and by malicious people to
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/33142/

 --

[SA33137] Gentoo update for povray

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2008-12-15

Gentoo has issued an update for povray. This fixes a some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/33137/

 --

[SA33132] IBM WebSphere Portal Unspecified Security Bypass
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-12-12

IBM has acknowledged a vulnerability in WebSphere Portal, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/33132/

 --

[SA33122] Joomla Live Chat Component "last" SQL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-15

Some vulnerabilities have been discovered in the Live Chat component
for Joomla, which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/33122/

 --

[SA33185] Ubuntu update for ruby1.9

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2008-12-17

Ubuntu has issued an update for ruby1.9. This fixes a vulnerability,
which can potentially be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/33185/

 --

[SA33180] Debian update for linux-2.6

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, DoS
Released:    2008-12-16

Debian has issued an update for linux-2.6. This fixes a weakness and
some vulnerabilities, which can be exploited by malicious, local users
to bypass certain security restrictions and cause a DoS (Denial of
Service), and by malicious people to cause a DoS.

Full Advisory:
http://secunia.com/advisories/33180/

 --

[SA33156] Sun Solaris Apache "mod_proxy_http" and "mod_proxy_ftp"
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, DoS
Released:    2008-12-16

Sun has acknowledged two vulnerabilities in Apache 2.0 included in Sun
Solaris, which potentially can be exploited by malicious people to
cause a DoS (Denial of Service) or to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/33156/

 --

[SA33146] Fedora update for phpMyAdmin

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-15

Fedora has issued an update for phpMyAdmin. This fixes a vulnerability,
which can be exploited by malicious people to conduct cross-site request
forgery attacks.

Full Advisory:
http://secunia.com/advisories/33146/

 --

[SA33144] Fedora update for gallery2

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of system information,
Exposure of sensitive information
Released:    2008-12-15

Fedora has issued an update for gallery2. This fixes some
vulnerabilities, can be exploited by malicious users to disclose
sensitive information and conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/33144/

 --

[SA33138] Debian update for no-ip

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2008-12-15

Debian has issued an update for no-ip. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/33138/

 --

[SA33157] Sun Solaris "libICE" Denial of Service Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2008-12-15

Sun has acknowledged a vulnerability in Solaris, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/33157/

 --

[SA33153] Avahi Multicast DNS Processing Denial of Service
Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2008-12-15

A vulnerability has been reported in Avahi, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/33153/

 --

[SA33217] Ubuntu update for libvirt

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2008-12-18

Ubuntu has issued an update for libvirt. This fixes a security issue,
which can be exploited by malicious, local users to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/33217/

 --

[SA33198] libvirt Security Bypass Issue

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2008-12-18

A security issue has been reported in libvirt, which can be exploited
by malicious, local users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/33198/

 --

[SA33182] Red Hat update for kernel

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass, Privilege escalation
Released:    2008-12-16

Red Hat has issued an update for the kernel. This fixes a weakness and
a vulnerability, which can be exploited by malicious, local users to
bypass certain security restrictions and potentially gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/33182/

 --

[SA33160] Sun Solaris IP Tunnel SIOCGTUNPARAM IOCTL Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation, DoS
Released:    2008-12-18

A vulnerability has been reported in Sun Solaris, which can be
exploited by malicious, local users to cause a DoS (Denial of Service)
or to potentially gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/33160/

 --

[SA33151] SUSE update for freeradius

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2008-12-16

SUSE has issued an update for freeradius. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
perform certain actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/33151/

 --

[SA33141] Gentoo update for honeyd

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2008-12-15

Gentoo has issued an update for honeyd. This fixes a security issue,
which can be exploited by malicious, local users to perform certain
actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/33141/

 --

[SA33139] Gentoo update for aview

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2008-12-15

Gentoo has issued an update for aview. This fixes a security issue,
which can be exploited by malicious, local users to perform certain
actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/33139/


Other:--

[SA33158] Sun Netra / Fire Servers IP Spoofing Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Spoofing
Released:    2008-12-16

Sun has acknowledged a vulnerability in several Netra and Fire
products, which can be exploited by malicious people to conduct
spoofing attacks.

Full Advisory:
http://secunia.com/advisories/33158/


Cross Platform:--

[SA33205] Mozilla Thunderbird Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Exposure of
sensitive information, System access
Released:    2008-12-17

Some vulnerabilities have been reported in Mozilla Thunderbird, which
can be exploited by malicious people to bypass certain security
restrictions, disclose sensitive information, conduct cross-site
scripting attacks, or potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/33205/

 --

[SA33204] Mozilla SeaMonkey Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Exposure of
sensitive information, System access
Released:    2008-12-17

Some vulnerabilities have been reported in Mozilla SeaMonkey, which can
be exploited by malicious people to bypass certain security
restrictions, disclose sensitive information, conduct cross-site
scripting attacks, or potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/33204/

 --

[SA33203] Mozilla Firefox 3 Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Exposure of
sensitive information, System access
Released:    2008-12-17

Some vulnerabilities have been reported in Mozilla Firefox, which can
be exploited by malicious people to bypass certain security
restrictions, disclose sensitive information, conduct cross-site
scripting attacks, or potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/33203/

 --

[SA33184] Mozilla Firefox 2 Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Exposure of
sensitive information, System access
Released:    2008-12-17

Some vulnerabilities have been reported in Mozilla Firefox, which can
be exploited by malicious people to bypass certain security
restrictions, disclose sensitive information, conduct cross-site
scripting attacks, or potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/33184/

 --

[SA33169] RoundCube Webmail "bin/html2text.php" PHP Code Execution

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-12-15

A vulnerability has been discovered in RoundCube Webmail, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/33169/

 --

[SA33163] WorkSimple File Inclusion and Information Disclosure

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2008-12-16

Osirys has discovered some vulnerabilities in WorkSimple, which can be
exploited by malicious people to disclose sensitive information and
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/33163/

 --

[SA33224] ADbNewsSender Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2008-12-18

Some vulnerabilities have been reported in ADbNewsSender, which can be
exploited by malicious people to conduct cross-site scripting and SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/33224/

 --

[SA33208] Rematic CMS "id" SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-18

Lidloses_Auge has reported some vulnerabilities in Rematic CMS, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33208/

 --

[SA33192] Irrlicht B3D Loader Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-12-18

A vulnerability has been reported in Irrlicht, which can be exploited
by malicious people to potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/33192/

 --

[SA33186] phplist Unspecified Local File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2008-12-16

A vulnerability has been reported in phplist, which can be exploited by
malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/33186/

 --

[SA33176] Mediatheka Local File Inclusion and SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-12-15

Some vulnerabilities have been discovered in Mediatheka, which can be
exploited by malicious people to disclose sensitive information and
conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33176/

 --

[SA33162] GeekiGeeki Arbitrary File Disclosure Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2008-12-15

Two vulnerabilities have been reported in GeekiGeeki, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/33162/

 --

[SA33161] Injader SQL Injection and Script Insertion

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2008-12-15

Some vulnerabilities have been reported in Injader, which can be
exploited by malicious users to conduct script insertion attacks and by
malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33161/

 --

[SA33150] RSMScript Security Bypass and Script Insertion
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting
Released:    2008-12-17

Cyber.Zer0 has discovered some vulnerabilities in RSMScript, which can
be exploited by malicious people to bypass certain security
restrictions and by malicious users to perform script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/33150/

 --

[SA33145] chuggnutt.com "HTML to Plain Text Conversion" PHP Class Code
Execution

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2008-12-15

A vulnerability has been discovered in the chuggnutt.com "HTML to Plain
Text Conversion" PHP class, which can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/33145/

 --

[SA33133] MediaWiki Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-15

Some vulnerabilities have been reported in MediaWiki, which can be
exploited by malicious users to conduct script insertion attacks and by
malicious people to conduct cross-site scripting and request forgery
attacks.

Full Advisory:
http://secunia.com/advisories/33133/

 --

[SA33126] Xpoze "menu" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-12

XaDoS has reported a vulnerability in Xpoze, which can be exploited by
malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33126/

 --

[SA33125] Social Groupie "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-12

Cyb3r-1sT has reported a vulnerability in Social Groupie, which can be
exploited by malicious users to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33125/

 --

[SA33124] phpAddEdit "addedit" Cookie Security Bypass Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-12-12

x0r has discovered a vulnerability in phpAddEdit, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/33124/

 --

[SA33225] Drupal Views Module Unspecified SQL Injection
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-18

Some vulnerabilities have been reported in the Views module for Drupal,
which can be exploited by malicious users to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/33225/

 --

[SA33206] TangoCMS Unspecified Cross-Site Request Forgery
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-17

Some vulnerabilities have been reported in TangoCMS, which can be
exploited by malicious people to conduct cross-site request forgery
attacks.

Full Advisory:
http://secunia.com/advisories/33206/

 --

[SA33200] Interstage HTTP Server Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-17

Fujitsu has acknowledged some vulnerabilities in Interstage HTTP
Server, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/33200/

 --

[SA33175] FlatnuX CMS Multiple Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-16

gmda has discovered some vulnerabilities in FlatnuX CMS, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/33175/

 --

[SA33174] BabbleBoard Cross-Site Request Forgery Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-16

SirGod has discovered a vulnerability in BabbleBoard, which can be
exploited by malicious people to conduct cross-site request forgery
attacks.

Full Advisory:
http://secunia.com/advisories/33174/

 --

[SA33166] phpBB Account Re-activation Security Bypass

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-12-15

A security issue has been reported in phpBB, which can be exploited by
malicious users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/33166/

 --

[SA33164] Barracuda Products Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-16

Dr. Marian Ventuneac has reported some vulnerabilities in various
Barracuda products, which can be exploited by malicious people to
conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/33164/

 --

[SA33159] Sun Java Wireless Toolkit for CLDC Buffer Overflow
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-12-16

Some vulnerabilities have been reported in Sun Java Wireless Toolkit
for CLDC, which can be exploited by malicious people to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/33159/

 --

[SA33143] IBM Tivoli Provisioning Manager SOAP Authentication Security
Issue

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass
Released:    2008-12-15

A security issue has been reported in IBM Tivoli Provisioning Manager,
which potentially can be exploited by malicious users to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/33143/

 --

[SA33127] Citrix Application Gateway Broadcast Server SQL Injection
Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      Manipulation of data
Released:    2008-12-15

A vulnerability has been reported in Citrix Application Gateway for
Cisco, which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/33127/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support_at_private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_______________________________________________      
Help InfoSecNews.org with a donation!
http://www.infosecnews.org/donate.html
Received on Fri Dec 19 2008 - 03:21:19 PST

This archive was generated by hypermail 2.2.0 : Fri Dec 19 2008 - 03:27:02 PST