AOH :: ISN-1468.HTM

Secunia Weekly Summary - Issue: 2005-39




Secunia Weekly Summary - Issue: 2005-39
Secunia Weekly Summary - Issue: 2005-39



=======================================================================
                  The Secunia Weekly Advisory Summary                  
                        2005-09-22 - 2005-09-29                        

                       This week : 67 advisories                       

=======================================================================Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

=======================================================================1) Word From Secunia:

The Secunia staff is spending hours every day to assure you the best
and most reliable source for vulnerability information. Every single 
vulnerability report is being validated and verified before a Secunia
advisory is written.

Secunia validates and verifies vulnerability reports in many different
ways e.g. by downloading the software and performing comprehensive
tests, by reviewing source code, or by validating the credibility of
the source from which the vulnerability report was issued.

As a result, Secunia's database is the most correct and complete source
for recent vulnerability information available on the Internet.

Secunia Online Vulnerability Database:
http://secunia.com/ 

=======================================================================2) This Week in Brief:

A vulnerability has been discovered in RealPlayer / Helix Player, which
potentially can be exploited by malicious people to compromise a user's
system.

Currently, no solution is available from the vendor. Please see the
referenced Secunia advisories for additional details.

References:
http://secunia.com/SA16961 
http://secunia.com/SA16954 

--

Apple has release a security update for Mac OS X, which fixes 10
vulnerabilities.

A complete list and details about the vulnerabilities fixed can be
found in the Secunia advisory below.

Reference:
http://secunia.com/SA16920 


VIRUS ALERTS:

Secunia has not issued any virus alerts during the week.

=======================================================================3) This Weeks Top Ten Most Read Advisories:

1.  [SA16869] Firefox Command Line URL Shell Command Injection
2.  [SA16901] Thunderbird Command Line URL Shell Command Injection
3.  [SA16911] Firefox Multiple Vulnerabilities
4.  [SA16942] Microsoft Internet Explorer "XMLHTTP" HTTP Request
              Injection
5.  [SA16922] Sony PSP Photo Viewer TIFF File Handling Buffer Overflow
6.  [SA16917] Mozilla Multiple Vulnerabilities
7.  [SA16920] Mac OS X Security Update Fixes Multiple Vulnerabilities
8.  [SA11762] Opera Browser Favicon Displaying Address Bar Spoofing
              Vulnerability
9.  [SA16944] Netscape Multiple Vulnerabilities
10. [SA16764] Firefox IDN URL Domain Name Buffer Overflow

=======================================================================4) Vulnerabilities Summary Listing

Windows:
[SA16958] FL Studio FLP File Handling Buffer Overflow
[SA16942] Microsoft Internet Explorer "XMLHTTP" HTTP Request Injection
[SA16909] SecureW2 Insecure Pre-Master Secret Generation

UNIX/Linux:
[SA16965] Fedora update for firefox
[SA16960] Slackware update for mozilla
[SA16928] Ubuntu update for mozilla/mozilla-firefox
[SA16919] Red Hat update for firefox
[SA16986] Fedora update for HelixPlayer
[SA16980] TWiki "%INCLUDE" Shell Command Injection Vulnerability
[SA16976] Gentoo update for php
[SA16974]  SGI Advanced Linux Environment Multiple Updates
[SA16964] Fedora update for mozilla
[SA16962] Red Hat update for HelixPlayer
[SA16961] RealPlayer Error Message Format String Vulnerability
[SA16954] Helix Player Error Message Format String Vulnerability
[SA16953] Mandriva update for mozilla
[SA16948] Trustix update for clamav
[SA16930] SUSE update for clamav
[SA16920] Mac OS X Security Update Fixes Multiple Vulnerabilities
[SA16918] Red Hat update for mozilla
[SA16972] Debian update for python2.3
[SA16968] SUSE update for opera
[SA16967] Astaro Security Linux PPTP Denial of Service Vulnerability
[SA16957] Gentoo update for qt
[SA16945] jPortal Download Search SQL Injection Vulnerability
[SA16940] Gentoo update for webmin/usermin
[SA16939] Debian update for courier
[SA16938] Gentoo update for mantis
[SA16936] wzdftpd SITE Command Arbitrary Shell Command Injection
[SA16923] Interchange Catalog Skeleton SQL Injection and ITL Injection
Vulnerabilities
[SA16914] Debian update for python2.1
[SA16943] IBM HMC apache/mod_ssl Vulnerabilities
[SA16978] Polipo Disclosure of Sensitive Information
[SA16950] Red Hat update for cups
[SA16912] Fedora update for cups
[SA16969] Linux Kernel URB Handling Denial of Service Vulnerability
[SA16959] Slackware update for x11
[SA16955] Sun Solaris Xsun and Xprt Privilege Escalation Vulnerability
[SA16935] Qpopper poppassd Insecure Trace File Creation Vulnerability
[SA16927] Ubuntu update for kernel
[SA16925] SUSE update for XFree86-server/xorg-x11-server
[SA16924] SUN Solaris UFS File System Denial of Service
[SA16916] Debian update for kdeedu
[SA16910] Fedora update for kernel
[SA16984] Red Hat update for wget

Other:
[SA16956] Avaya Products httpd/mod_ssl Vulnerabilities
[SA16922] Sony PSP Photo Viewer TIFF File Handling Buffer Overflow
[SA16952] Anycom Blue Stereo Headset BSH-100 Pairing Mode
Vulnerability
[SA16931] Plantronics M2500 Bluetooth Headset Pairing Mode
Vulnerability

Cross Platform:
[SA16944] Netscape Multiple Vulnerabilities
[SA16941] AlstraSoft E-Friends "mode" File Inclusion Vulnerability
[SA16933] phpMyFAQ Multiple Vulnerabilities
[SA16917] Mozilla Multiple Vulnerabilities
[SA16911] Firefox Multiple Vulnerabilities
[SA16979] PostNuke Local File Inclusion and Comment Bypass
Vulnerabilities
[SA16949] SEO-Board admin.php SQL Injection Vulnerability
[SA16937] Mailgust "email" SQL Injection Vulnerability
[SA16929] ContentServ "ctsWebsite" Local File Inclusion Vulnerability
[SA16926] MultiTheftAuto Server "motd.txt" Modification and Denial of
Service
[SA16913] My Little Forum "search" SQL Injection Vulnerability
[SA16908] PunBB Two Vulnerabilities
[SA16947] RSyslog Syslog Message SQL Injection Vulnerability
[SA16970] CJ LinkOut "123" Cross-Site Scripting Vulnerability
[SA16966] CJ Tag Board Cross-Site Scripting Vulnerabilities
[SA16963] CJ Web2Mail Cross-Site Scripting Vulnerabilities
[SA16934] IPB Riverdark RSS Syndicator Module Cross-Site Scripting
[SA16971] PHP Trailing Slash "open_basedir" Security Bypass

=======================================================================5) Vulnerabilities Content Listing

Windows:--

[SA16958] FL Studio FLP File Handling Buffer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-09-27

varunuppal has discovered a vulnerability in FL Studio, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/16958/ 

 --

[SA16942] Microsoft Internet Explorer "XMLHTTP" HTTP Request Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data, Exposure of
sensitive information
Released:    2005-09-26

Amit Klein has discovered a vulnerability in Microsoft Internet
Explorer, which can be exploited by malicious people to manipulate
certain data and conduct HTTP request smuggling attacks.

Full Advisory:
http://secunia.com/advisories/16942/ 

 --

[SA16909] SecureW2 Insecure Pre-Master Secret Generation

Critical:    Less critical
Where:       From local network
Impact:      Exposure of sensitive information
Released:    2005-09-26

Simon Josefsson has reported a security issue in SecureW2, which
potentially can be exploited by malicious people to disclose certain
sensitive information.

Full Advisory:
http://secunia.com/advisories/16909/ 


UNIX/Linux:--

[SA16965] Fedora update for firefox

Critical:    Extremely critical
Where:       From remote
Impact:      Security Bypass, Spoofing, Manipulation of data, System
access
Released:    2005-09-27

Fedora has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing attacks, manipulate certain data, bypass certain security
restrictions, and compromise a user's system.

Full Advisory:
http://secunia.com/advisories/16965/ 

 --

[SA16960] Slackware update for mozilla

Critical:    Extremely critical
Where:       From remote
Impact:      Security Bypass, Spoofing, Manipulation of data, System
access
Released:    2005-09-27

Slackware has issued an update for mozilla. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing attacks, manipulate certain data, bypass certain security
restrictions, and compromise a user's system.

Full Advisory:
http://secunia.com/advisories/16960/ 

 --

[SA16928] Ubuntu update for mozilla/mozilla-firefox

Critical:    Extremely critical
Where:       From remote
Impact:      Security Bypass, Spoofing, Manipulation of data, System
access
Released:    2005-09-26

Ubuntu has issued updates for mozilla and mozilla-firefox. These fix
some vulnerabilities, which can be exploited by malicious people to
conduct spoofing attacks, manipulate certain data, bypass certain
security restrictions, and compromise a user's system.

Full Advisory:
http://secunia.com/advisories/16928/ 

 --

[SA16919] Red Hat update for firefox

Critical:    Extremely critical
Where:       From remote
Impact:      Security Bypass, Spoofing, Manipulation of data, System
access
Released:    2005-09-23

Red Hat has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing attacks, manipulate certain data, bypass certain security
restrictions, and compromise a user's system.

Full Advisory:
http://secunia.com/advisories/16919/ 

 --

[SA16986] Fedora update for HelixPlayer

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-09-28

Fedora has issued an update for HelixPlayer. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/16986/ 

 --

[SA16980] TWiki "%INCLUDE" Shell Command Injection Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-09-28

A vulnerability has been reported in TWiki, which can be exploited by
malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/16980/ 

 --

[SA16976] Gentoo update for php

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-09-28

Gentoo has issued an update for php. This fixes two vulnerabilities,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/16976/ 

 --

[SA16974]  SGI Advanced Linux Environment Multiple Updates

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2005-09-28

SGI has issued a patch for SGI Advanced Linux Environment. This fixes
some vulnerabilities, which can be exploited by malicious people to
cause a DoS (Denial of Service) or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/16974/ 

 --

[SA16964] Fedora update for mozilla

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Spoofing, Manipulation of data, System
access
Released:    2005-09-27

Fedora has issued an update for mozilla. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing attacks, manipulate certain data, bypass certain security
restrictions, and compromise a user's system.

Full Advisory:
http://secunia.com/advisories/16964/ 

 --

[SA16962] Red Hat update for HelixPlayer

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-09-27

Red Hat has issued an update for HelixPlayer. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/16962/ 

 --

[SA16961] RealPlayer Error Message Format String Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-09-27

c0ntex has discovered a vulnerability in RealPlayer, which potentially
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/16961/ 

 --

[SA16954] Helix Player Error Message Format String Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-09-27

c0ntex has discovered a vulnerability in Helix Player, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/16954/ 

 --

[SA16953] Mandriva update for mozilla

Critical:    Highly critical
Where:       From remote
Impact:      System access, Manipulation of data, Spoofing, Security
Bypass
Released:    2005-09-27

Mandriva has issued an update for mozilla. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing attacks, manipulate certain data, bypass certain security
restrictions, and compromise a user's system.

Full Advisory:
http://secunia.com/advisories/16953/ 

 --

[SA16948] Trustix update for clamav

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2005-09-26

Trustix has issued an update for clamav. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service), or potentially to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/16948/ 

 --

[SA16930] SUSE update for clamav

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2005-09-26

SUSE has issued an update for clamav. This fixes two vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service), or potentially to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/16930/ 

 --

[SA16920] Mac OS X Security Update Fixes Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Exposure of
sensitive information, Privilege escalation, System access
Released:    2005-09-23

Apple has issued a security update for Mac OS X, which fixes 10
vulnerabilities.

Full Advisory:
http://secunia.com/advisories/16920/ 

 --

[SA16918] Red Hat update for mozilla

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Spoofing, Manipulation of data, System
access
Released:    2005-09-23

Red Hat has issued an update for mozilla. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing attacks, manipulate certain data, bypass certain security
restrictions, and compromise a user's system.

Full Advisory:
http://secunia.com/advisories/16918/ 

 --

[SA16972] Debian update for python2.3

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2005-09-28

Debian has issued an update for python2.3. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/16972/ 

 --

[SA16968] SUSE update for opera

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, Cross Site Scripting, Spoofing
Released:    2005-09-27

SUSE has issued an update for opera. This fixes two vulnerabilities,
which can be exploited by a malicious person to conduct script
insertion attacks and to spoof the name of attached files.

Full Advisory:
http://secunia.com/advisories/16968/ 

 --

[SA16967] Astaro Security Linux PPTP Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2005-09-27

A vulnerability has been reported in Astaro Security Linux, which can
be exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/16967/ 

 --

[SA16957] Gentoo update for qt

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2005-09-27

Gentoo has issued an update for qt. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/16957/ 

 --

[SA16945] jPortal Download Search SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2005-09-27

krasza has discovered a vulnerability in jPortal, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/16945/ 

 --

[SA16940] Gentoo update for webmin/usermin

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2005-09-26

Gentoo has issued an update for webmin/usermin. This fixes a
vulnerability, which can be exploited by malicious people to bypass
certain security restrictions.

Full Advisory:
http://secunia.com/advisories/16940/ 

 --

[SA16939] Debian update for courier

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-09-26

Debian has issued an update for courier. This fixes a vulnerability,
which can be exploited by malicious people to conduct script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/16939/ 

 --

[SA16938] Gentoo update for mantis

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2005-09-26

Gentoo has issued an update for mantis. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting and SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/16938/ 

 --

[SA16936] wzdftpd SITE Command Arbitrary Shell Command Injection

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-09-26

kcope has discovered a vulnerability in wzdftpd, which can be exploited
by malicious users to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/16936/ 

 --

[SA16923] Interchange Catalog Skeleton SQL Injection and ITL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, Manipulation of data
Released:    2005-09-23

Two vulnerabilities have been reported in Interchange, which can be
exploited by malicious people to conduct SQL injection attacks, or to
perform actions with an unknown impact.

Full Advisory:
http://secunia.com/advisories/16923/ 

 --

[SA16914] Debian update for python2.1

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2005-09-23

Debian has issued an update for python2.1. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/16914/ 

 --

[SA16943] IBM HMC apache/mod_ssl Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Manipulation of
data, Privilege escalation
Released:    2005-09-26

IBM has acknowledged some vulnerabilities in IBM HMC, which can be
exploited by malicious, local users to cause a DoS (Denial of Service)
or potentially gain escalated privileges, or by malicious people to
bypass certain security restrictions or conduct HTTP request smuggling
attacks.

Full Advisory:
http://secunia.com/advisories/16943/ 

 --

[SA16978] Polipo Disclosure of Sensitive Information

Critical:    Less critical
Where:       From local network
Impact:      Unknown, Exposure of sensitive information
Released:    2005-09-28

A vulnerability has been reported in Polipo, which can be exploited by
malicious people to disclose potentially sensitive information.

Full Advisory:
http://secunia.com/advisories/16978/ 

 --

[SA16950] Red Hat update for cups

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2005-09-27

Red Hat has issued an update for cups. This fixes a vulnerability,
which can be exploited by malicious users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/16950/ 

 --

[SA16912] Fedora update for cups

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2005-09-23

Fedora has issued an update for cups. This fixes a vulnerability, which
can be exploited by malicious users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/16912/ 

 --

[SA16969] Linux Kernel URB Handling Denial of Service Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      DoS
Released:    2005-09-27

A vulnerability and a security issue have been reported in the Linux
Kernel, which can be exploited by malicious, local users to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/16969/ 

 --

[SA16959] Slackware update for x11

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-09-27

Slackware has issued an update for x11. This fixes a vulnerability,
which potentially can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/16959/ 

 --

[SA16955] Sun Solaris Xsun and Xprt Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-09-27

A vulnerability has been reported in Solaris, which can be exploited by
malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/16955/ 

 --

[SA16935] Qpopper poppassd Insecure Trace File Creation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-09-26

kcope has discovered a vulnerability in Qpopper, which can be exploited
by malicious, local users to perform certain actions on a vulnerable
system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/16935/ 

 --

[SA16927] Ubuntu update for kernel

Critical:    Less critical
Where:       Local system
Impact:      DoS
Released:    2005-09-26

Ubuntu has issued an update for the kernel. This fixes two
vulnerabilities, which potentially can be exploited by malicious, local
users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/16927/ 

 --

[SA16925] SUSE update for XFree86-server/xorg-x11-server

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-09-26

SUSE has issued an update for XFree86-server/xorg-x11-server. This
fixes a vulnerability, which potentially can be exploited by malicious,
local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/16925/ 

 --

[SA16924] SUN Solaris UFS File System Denial of Service

Critical:    Less critical
Where:       Local system
Impact:      DoS
Released:    2005-09-23

A vulnerability has been reported in Solaris, which can be exploited by
malicious, local users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/16924/ 

 --

[SA16916] Debian update for kdeedu

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-09-23

Debian has issued an update for kdeedu. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions with escalated privileges on a vulnerable system.

Full Advisory:
http://secunia.com/advisories/16916/ 

 --

[SA16910] Fedora update for kernel

Critical:    Less critical
Where:       Local system
Impact:      DoS, Privilege escalation, Exposure of sensitive
information
Released:    2005-09-23

Fedora has issued an update for the kernel. This fixes some
vulnerabilities, which potentially can be exploited by malicious, local
users to disclose certain sensitive information, cause a DoS (Denial of
Service), and gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/16910/ 

 --

[SA16984] Red Hat update for wget

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-09-28

Red Hat has issued an update for wget. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/16984/ 


Other:--

[SA16956] Avaya Products httpd/mod_ssl Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS
Released:    2005-09-27

Avaya has acknowledged some vulnerabilities in httpd/mod_ssl included
in some products, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/16956/ 

 --

[SA16922] Sony PSP Photo Viewer TIFF File Handling Buffer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-09-26

A vulnerability has been reported in Sony PSP, which potentially can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/16922/ 

 --

[SA16952] Anycom Blue Stereo Headset BSH-100 Pairing Mode
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information,
DoS
Released:    2005-09-26

KF has reported a vulnerability in Anycom Blue Stereo Headset BSH-100,
which can be exploited by malicious people to cause a DoS (Denial of
Service), disclose sensitive information, and manipulate certain data.

Full Advisory:
http://secunia.com/advisories/16952/ 

 --

[SA16931] Plantronics M2500 Bluetooth Headset Pairing Mode
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2005-09-26

KF has reported a vulnerability in Plantronics M2500 Bluetooth Headset,
which can be exploited by malicious people to disclose sensitive
information and manipulate certain data.

Full Advisory:
http://secunia.com/advisories/16931/ 


Cross Platform:--

[SA16944] Netscape Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Spoofing, Manipulation of data, System
access
Released:    2005-09-26

Some vulnerabilities have been discovered in Netscape, which can be
exploited by malicious people to manipulate certain data, conduct
spoofing attacks, bypass certain security restrictions and potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/16944/ 

 --

[SA16941] AlstraSoft E-Friends "mode" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-09-26

Kurdish Hackers Clan has reported a vulnerability in AlstraSoft
E-Friends, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/16941/ 

 --

[SA16933] phpMyFAQ Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
system information, Exposure of sensitive information, System access
Released:    2005-09-26

rgod has discovered some vulnerabilities in phpMyFAQ, which can be
exploited by malicious people to conduct cross-site scripting and SQL
injection attacks, disclose system and sensitive information, and
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/16933/ 

 --

[SA16917] Mozilla Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Spoofing, Manipulation of data, System
access
Released:    2005-09-23

Multiple vulnerabilities have been reported in Mozilla Suite, which can
be exploited by malicious people to conduct spoofing attacks, manipulate
certain data, bypass certain security restrictions, and compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/16917/ 

 --

[SA16911] Firefox Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Spoofing, Manipulation of data, System
access
Released:    2005-09-23

Multiple vulnerabilities have been reported in Firefox, which can be
exploited by malicious people to conduct spoofing attacks, manipulate
certain data, bypass certain security restrictions, and compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/16911/ 

 --

[SA16979] PostNuke Local File Inclusion and Comment Bypass
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information
Released:    2005-09-28

Two vulnerabilities have been reported in PostNuke, which can be
exploited by malicious people to bypass certain security restrictions
and disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/16979/ 

 --

[SA16949] SEO-Board admin.php SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2005-09-26

foster RST/GHC has reported a vulnerability in SEO-Board, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/16949/ 

 --

[SA16937] Mailgust "email" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2005-09-26

rgod has reported a vulnerability in Mailgust, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/16937/ 

 --

[SA16929] ContentServ "ctsWebsite" Local File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2005-09-26

qobaiashi has reported a vulnerability in ContentServ, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/16929/ 

 --

[SA16926] MultiTheftAuto Server "motd.txt" Modification and Denial of
Service

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, DoS
Released:    2005-09-26

Luigi Auriemma has reported two vulnerabilities in MultiTheftAuto
Server, which can be exploited by malicious people to modify certain
information or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/16926/ 

 --

[SA16913] My Little Forum "search" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2005-09-23

rgod has discovered a vulnerability in My Little Forum, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/16913/ 

 --

[SA16908] PunBB Two Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, Cross Site Scripting
Released:    2005-09-22

Two vulnerabilities have been reported in PunBB, where one has an
unknown impact and the other can be exploited by malicious people to
conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/16908/ 

 --

[SA16947] RSyslog Syslog Message SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      Manipulation of data, System access
Released:    2005-09-26

A vulnerability has been reported in RSyslog, which can be exploited by
malicious people to conduct SQL injection attacks, and potentially to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/16947/ 

 --

[SA16970] CJ LinkOut "123" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-09-27

Psymera has discovered a vulnerability in CJ LinkOut, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/16970/ 

 --

[SA16966] CJ Tag Board Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-09-27

Psymera has discovered some vulnerabilities in CJ Tag Board, which can
be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/16966/ 

 --

[SA16963] CJ Web2Mail Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-09-27

Psymera has discovered some vulnerabilities in CJ Web2Mail, which can
be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/16963/ 

 --

[SA16934] IPB Riverdark RSS Syndicator Module Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-09-26

X1NG has reported two vulnerabilities in the Riverdark RSS Syndicator
module for Invision Power Board, which can be exploited by malicious
people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/16934/ 

 --

[SA16971] PHP Trailing Slash "open_basedir" Security Bypass

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2005-09-27

thorben has discovered a security issue in PHP, which can be exploited
by malicious, local users to access certain files outside the
"open_basedir" root.

Full Advisory:
http://secunia.com/advisories/16971/ 



=======================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/ 

Subscribe:
http://secunia.com/secunia_weekly_summary/ 

Contact details:
Web	: http://secunia.com/ 
E-mail	: support@secunia.com 
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45



_________________________________________
InfoSec News v2.0 - Coming Soon! 
http://www.infosecnews.org 

Site design & layout copyright © 1986-2014 CodeGods