AOH :: ISN-2220.HTM

Secunia Weekly Summary - Issue: 2006-12




Secunia Weekly Summary - Issue: 2006-12
Secunia Weekly Summary - Issue: 2006-12



=======================================================================
                  The Secunia Weekly Advisory Summary                  
                        2006-03-16 - 2006-03-23                        

                       This week : 96 advisories                       

=======================================================================Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

=======================================================================1) Word From Secunia:

The Secunia staff is spending hours every day to assure you the best
and most reliable source for vulnerability information. Every single 
vulnerability report is being validated and verified before a Secunia
advisory is written.

Secunia validates and verifies vulnerability reports in many different
ways e.g. by downloading the software and performing comprehensive
tests, by reviewing source code, or by validating the credibility of
the source from which the vulnerability report was issued.

As a result, Secunia's database is the most correct and complete source
for recent vulnerability information available on the Internet.

Secunia Online Vulnerability Database:
http://secunia.com/ 

=======================================================================2) This Week in Brief:

Secunia Research has discovered a critical vulnerability in Microsoft
Internet Explorer, which can be exploited by malicious people to
compromise a user's system.

While Secunia was coordinating disclosure with Microsoft a third party
also discovered this vulnerability, however, the third party chose to
immediately disclose it to various public mailing lists.

Secunia then quickly issued a Highly Critical Secunia advisory
regarding this to enable our customers and readers to take the
appropriate actions.

Currently, no solution is available from the vendor. Please read the
referenced Secunia advisory for additional details.

Reference:
http://secunia.com/SA18680 

  -- 

ISS X-Force has reported a vulnerability in Sendmail, which can be
exploited by malicious people to compromise a vulnerable system.

All users are advised to update or apply available patches.

Additional details can be found in the referenced Secunia advisory
below.

Reference:
http://secunia.com/SA19342 


VIRUS ALERTS:

Secunia has not issued any virus alerts during the week.

=======================================================================3) This Weeks Top Ten Most Read Advisories:

1.  [SA19218] Flash Player Unspecified Code Execution Vulnerabilities
2.  [SA19118] AVG Anti-Virus Updated Files Insecure File Permissions
3.  [SA18680] Microsoft Internet Explorer "createTextRange()" Code
              Execution
4.  [SA19138] Microsoft Office Multiple Code Execution Vulnerabilities
5.  [SA19269] Internet Explorer Multiple Event Handlers Denial of
              Service Weakness
6.  [SA18963] Mac OS X File Association Meta Data Shell Script
              Execution
7.  [SA19261] OpenOffice cURL/libcURL URL Parsing Off-By-One
              Vulnerability
8.  [SA19277] phpMyAdmin "set_theme" Cross-Site Scripting
9.  [SA19265] Novell NetWare NWFTPD Potential Denial of Service
              Vulnerability
10. [SA19330] Linux Kernel Buffer Overflow Vulnerabilities

=======================================================================4) Vulnerabilities Summary Listing

Windows:
[SA19288] MailEnable Webmail and POP3 Buffer Overflow Vulnerabilities
[SA19267] Mercur Messaging IMAP Service Buffer Overflow Vulnerability
[SA19292] betaparticle blog SQL Injection Vulnerabilities
[SA19286] ASPPortal "downloadid" SQL Injection Vulnerability
[SA19297] VPMi Enterprise "Request_Name_Display" Cross-Site Scripting
[SA19296] WinHKI Multiple Archive Directory Traversal Vulnerability
[SA19313] Nortel Centrex IP Client Manager Windows Privilege
Escalation
[SA19284] avast! Antivirus Insecure Default File Permissions
[SA19282] PC-cillin Internet Security Insecure Default Directory
Permissions
[SA19338] Baby FTP Server File Enumeration Weakness
[SA19269] Internet Explorer Multiple Event Handlers Denial of Service
Weakness

UNIX/Linux:
[SA19368] Slackware update for sendmail
[SA19367] Debian update for sendmail
[SA19363] Gentoo update for sendmail
[SA19362] Red Hat update for realplayer
[SA19361] SUSE update for sendmail
[SA19360] Sun Solaris Sendmail Signal Handling Memory Corruption
[SA19356] Fedora update for sendmail
[SA19349] AIX sendmail Signal Handling Memory Corruption Vulnerability
[SA19346] Red Hat update for sendmail
[SA19345] FreeBSD update for sendmail
[SA19342] Sendmail Signal Handling Memory Corruption Vulnerability
[SA19328] Gentoo update for netscape-flash
[SA19304] Gentoo update for metamail
[SA19291] Gentoo update for peercast
[SA19276] Debian update for crossfire
[SA19366] FreeBSD IPsec Sequence Number Verification Bypass
[SA19354] KisMAC Cisco Vendor Tag SSID Parsing Buffer Overflow
[SA19344] Gentoo update for curl
[SA19335] Fedora update for curl
[SA19334] Gentoo update for pngcrush
[SA19301] Gentoo update for PEAR-Auth
[SA19287] Trustix update for gnupg
[SA19281] jabberd SASL Negotiation Denial of Service Vulnerability
[SA19279] Debian update for xine-lib
[SA19272] Debian update for vlc
[SA19271] cURL/libcURL TFTP Protocol URL Parsing Buffer Overflow
[SA19266] Debian update for ilohamail
[SA19264] Debian update for kdegraphics
[SA19262] QmailAdmin "PATH_INFO" Handling Buffer Overflow
[SA19350] Debian update for firebird2
[SA19355] Gentoo update for php
[SA19347] FreeBSD OPIE opiepasswd User Verification Vulnerability
[SA19317] HP VirtualVault Apache HTTP Request Smuggling Vulnerability
[SA19303] Gentoo update for crypt-cbc
[SA19302] Gentoo update for heimdal
[SA19300] FreeRADIUS EAP-MSCHAPv2 Authentication Bypass Vulnerability
[SA19339] Debian update for kernel-patch-vserver / util-vserver
[SA19336] Fedora update for beagle
[SA19333] util-vserver Unknown Capabilities Handling Security Issue
[SA19330] Linux Kernel Netfilter Weakness and RNDIS Buffer Overflow
[SA19323] RunIt "chpst" Multiple Groups Handling Security Issue
[SA19318] Debian update for snmptrapfmt
[SA19316] Fedora update for xorg-x11-server
[SA19311] Sun Solaris update for Xorg X Server
[SA19307] X.Org X11 User Privilege Checking Security Bypass
[SA19305] HP-UX usermod Recursive Ownership Change Security Issue
[SA19278] Beagle "beagle-status" Command Execution Vulnerability
[SA19357] Linux Kernel IPv4 "sockaddr_in.sin_zero" Information
Disclosure
[SA19280] Gnome Screensaver Password Bypass Vulnerability

Other:
[SA19337] Firepass 4100 SSL VPN "s" Cross-Site Scripting Vulnerability
[SA19324] Novell NetWare NILE.NLM SSL Negotiation Vulnerabilities
[SA19319] Motorola Cellular Phones Security Dialog Spoofing
Vulnerability
[SA19265] Novell NetWare NWFTPD Potential Denial of Service
Vulnerability

Cross Platform:
[SA19358] RealNetworks Products Multiple Buffer Overflow
Vulnerabilities
[SA19353] XHP CMS "FileManager" File Upload Vulnerability
[SA19352] vBulletin ImpEx Module "systempath" File Inclusion
Vulnerability
[SA19343] FreeWPS "ImageManager" File Upload Vulnerability
[SA19320] Free Articles Directory "page" File Inclusion Vulnerability
[SA19298] KnowledgebasePublisher "dir" File Inclusion Vulnerability
[SA19285] PHP iCalendar File Inclusion and Calendar Upload
Vulnerabilities
[SA19359] AnyPortal(php) "F" Directory Traversal Vulnerability
[SA19329] 1WebCalendar Multiple SQL Injection Vulnerabilities
[SA19322] gCards Multiple Vulnerabilities
[SA19315] phpWebsite "sid" Parameter SQL Injection
[SA19314] Skull-Splitter's Download Counter for Wallpapers SQL
Injection
[SA19310] BEA WebLogic Server/Express Two Vulnerabilities
[SA19309] webcheck Website Content Script Insertion Vulnerability
[SA19290] OSWiki Username Script Insertion Vulnerability
[SA19289] CuteNews "archive" Disclosure of Sensitive Information
Vulnerability
[SA19283] SoftBB "mail" SQL Injection Vulnerability
[SA19275] Maian Support SQL Injection Vulnerabilities
[SA19274] Maian Events Multiple SQL Injection Vulnerabilities
[SA19273] Maian Weblog Multiple SQL Injection Vulnerabilities
[SA19270] Simple PHP Blog "blog_language" Local File Inclusion
[SA19263] Streber Unspecified Script Insertion Vulnerability
[SA19351] AdMan "transactions_offset" SQL Injection Vulnerability
[SA19340] PHP Live! "base_url" Cross-Site Scripting Vulnerability
[SA19332] IBM Tivoli Business Systems Manager Cross-Site Scripting
[SA19321] ExtCalendar calendar.php Cross-Site Scripting
Vulnerabilities
[SA19308] BEA WebLogic Portal JSR-168 Portlets Rendering Security
Issue
[SA19299] Invision Power Board PM Unspecified Cross-Site Scripting
[SA19294] Contrexx CMS Cross-Site Scripting Vulnerability
[SA19293] Woltlab Burning Board "class_db_mysql.php" Cross-Site
Scripting
[SA19277] phpMyAdmin "set_theme" Cross-Site Scripting
[SA19268] Skull-Splitter's PHP Guestbook Cross-Site Scripting
Vulnerability

=======================================================================5) Vulnerabilities Content Listing

Windows:--

[SA19288] MailEnable Webmail and POP3 Buffer Overflow Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-03-20

Two vulnerabilities have been reported in MailEnable, which can be
exploited by malicious people to cause a DoS (Denial of Service) and to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/19288/ 

 --

[SA19267] Mercur Messaging IMAP Service Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-03-17

Tim Taylor has discovered a vulnerability in Mercur Messaging 2005,
which can be exploited by malicious people and by malicious users to
cause a DoS (Denial of Service) or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/19267/ 

 --

[SA19292] betaparticle blog SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-03-20

Mustafa Can Bjorn has reported two vulnerabilities in betaparticle
blog, which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/19292/ 

 --

[SA19286] ASPPortal "downloadid" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-03-21

nukedx has discovered a vulnerability in ASPPortal, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/19286/ 

 --

[SA19297] VPMi Enterprise "Request_Name_Display" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-03-21

Steven M. Christey has reported a vulnerability in VPMi Enterprise,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/19297/ 

 --

[SA19296] WinHKI Multiple Archive Directory Traversal Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2006-03-20

Hamid Ebadi has discovered a vulnerability in WinHKI, which potentially
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/19296/ 

 --

[SA19313] Nortel Centrex IP Client Manager Windows Privilege
Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-03-20

Nortel Networks has acknowledged some security issues in Centrex IP
Client Manager, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/19313/ 

 --

[SA19284] avast! Antivirus Insecure Default File Permissions

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass, Manipulation of data, Privilege
escalation
Released:    2006-03-20

A security issue has been reported in avast! Antivirus, which can be
exploited by malicious, local users to bypass certain security
restrictions or gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/19284/ 

 --

[SA19282] PC-cillin Internet Security Insecure Default Directory
Permissions

Critical:    Less critical
Where:       Local system
Impact:      Manipulation of data, Privilege escalation
Released:    2006-03-22

Dominique GREGOIRE has discovered a security issue in PC-cillin
Internet Security, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/19282/ 

 --

[SA19338] Baby FTP Server File Enumeration Weakness

Critical:    Not critical
Where:       From remote
Impact:      Exposure of system information
Released:    2006-03-23

Ziv Kamir has discovered a weakness in Baby FTP Server, which can be
exploited by malicious people to enumerate files on an affected
system.

Full Advisory:
http://secunia.com/advisories/19338/ 

 --

[SA19269] Internet Explorer Multiple Event Handlers Denial of Service
Weakness

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2006-03-20

Michal Zalewski has discovered a weakness in Internet Explorer, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/19269/ 


UNIX/Linux:--

[SA19368] Slackware update for sendmail

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-23

Slackware has issued an update for sendmail. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a vulnerable system.

Full Advisory:
http://secunia.com/advisories/19368/ 

 --

[SA19367] Debian update for sendmail

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-23

Debian has issued an update for sendmail. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/19367/ 

 --

[SA19363] Gentoo update for sendmail

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-23

Gentoo has issued an update for sendmail. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/19363/ 

 --

[SA19362] Red Hat update for realplayer

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-23

Red Hat has issued an update for RealPlayer. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/19362/ 

 --

[SA19361] SUSE update for sendmail

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-23

SUSE has issued an update for sendmail. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/19361/ 

 --

[SA19360] Sun Solaris Sendmail Signal Handling Memory Corruption

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-23

Sun has acknowledged a vulnerability in Solaris, which can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/19360/ 

 --

[SA19356] Fedora update for sendmail

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-23

Fedora has issued an update for sendmail. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/19356/ 

 --

[SA19349] AIX sendmail Signal Handling Memory Corruption Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-23

IBM has acknowledged a vulnerability in sendmail in AIX, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/19349/ 

 --

[SA19346] Red Hat update for sendmail

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-23

Red Hat has issued an update for sendmail. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/19346/ 

 --

[SA19345] FreeBSD update for sendmail

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-23

FreeBSD has issued an update for sendmail. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/19345/ 

 --

[SA19342] Sendmail Signal Handling Memory Corruption Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-23

ISS X-Force has reported a vulnerability in Sendmail, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/19342/ 

 --

[SA19328] Gentoo update for netscape-flash

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-22

Gentoo has issued an update for netscape-flash. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/19328/ 

 --

[SA19304] Gentoo update for metamail

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-03-20

Gentoo has issued an update for metamail. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/19304/ 

 --

[SA19291] Gentoo update for peercast

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-21

Gentoo has issued an update for peercast. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/19291/ 

 --

[SA19276] Debian update for crossfire

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-03-20

Debian has issued an update for crossfire. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/19276/ 

 --

[SA19366] FreeBSD IPsec Sequence Number Verification Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-03-23

A security issue has been reported in FreeBSD, which potentially can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/19366/ 

 --

[SA19354] KisMAC Cisco Vendor Tag SSID Parsing Buffer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-03-23

Stefan Esser has reported a vulnerability in KisMAC, which potentially
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/19354/ 

 --

[SA19344] Gentoo update for curl

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-03-22

Gentoo has issued an update for curl. This fixes a vulnerability, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/19344/ 

 --

[SA19335] Fedora update for curl

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-03-22

Fedora has issued an update for curl. This fixes a vulnerability, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/19335/ 

 --

[SA19334] Gentoo update for pngcrush

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-03-22

Gentoo has issued an update for pngcrush. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/19334/ 

 --

[SA19301] Gentoo update for PEAR-Auth

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2006-03-20

Gentoo has issued an update for PEAR-Auth. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions.

Full Advisory:
http://secunia.com/advisories/19301/ 

 --

[SA19287] Trustix update for gnupg

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-03-20

Trustix has issued an update for gnupg. This fixes a vulnerability,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/19287/ 

 --

[SA19281] jabberd SASL Negotiation Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-03-20

A vulnerability has been reported in jabberd, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/19281/ 

 --

[SA19279] Debian update for xine-lib

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-03-17

Debian has issued an update for xine-lib. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/19279/ 

 --

[SA19272] Debian update for vlc

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-03-17

Debian has issued an update for vlc. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of Service)
and potentially to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/19272/ 

 --

[SA19271] cURL/libcURL TFTP Protocol URL Parsing Buffer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-03-20

Ulf Harnhammar has reported a vulnerability in cURL/libcURL, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/19271/ 

 --

[SA19266] Debian update for ilohamail

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-03-20

Debian has issued an update for ilohamail. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
script insertion attacks.

Full Advisory:
http://secunia.com/advisories/19266/ 

 --

[SA19264] Debian update for kdegraphics

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-03-20

Debian has issued an update for kdegraphics. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/19264/ 

 --

[SA19262] QmailAdmin "PATH_INFO" Handling Buffer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-03-17

A vulnerability has been reported in QmailAdmin, which potentially can
be exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/19262/ 

 --

[SA19350] Debian update for firebird2

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2006-03-23

Debian has issued an update for firebird2. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/19350/ 

 --

[SA19355] Gentoo update for php

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, System access
Released:    2006-03-23

Gentoo has issued an update for php. This fixes a vulnerability, which
can be exploited by malicious people to conduct HTTP response splitting
attacks, potentially conduct cross-site scripting attacks, and
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/19355/ 

 --

[SA19347] FreeBSD OPIE opiepasswd User Verification Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Privilege escalation
Released:    2006-03-23

A vulnerability has been reported in FreeBSD, which can be exploited by
malicious, local users to gain escalated privileges or by malicious
users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/19347/ 

 --

[SA19317] HP VirtualVault Apache HTTP Request Smuggling Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Manipulation of
data
Released:    2006-03-21

HP has acknowledged a vulnerability in Virtualvault, which can be
exploited by malicious people to conduct HTTP request smuggling
attacks.

Full Advisory:
http://secunia.com/advisories/19317/ 

 --

[SA19303] Gentoo update for crypt-cbc

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-03-20

Gentoo has issued an update for crypt-cbc. This fixes a security issue,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/19303/ 

 --

[SA19302] Gentoo update for heimdal

Critical:    Less critical
Where:       From local network
Impact:      Privilege escalation
Released:    2006-03-20

Gentoo has issued an update for heimdal. This fixes a vulnerability,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/19302/ 

 --

[SA19300] FreeRADIUS EAP-MSCHAPv2 Authentication Bypass Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS, Security Bypass
Released:    2006-03-21

A vulnerability has been reported in FreeRADIUS, which can be exploited
by malicious people to cause a DoS (Denial of Service) and to bypass
certain security restrictions.

Full Advisory:
http://secunia.com/advisories/19300/ 

 --

[SA19339] Debian update for kernel-patch-vserver / util-vserver

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2006-03-22

Debian has issued updates for kernel-patch-vserver and util-vserver.
This fixes two security issues, which can be exploited by malicious
programs to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/19339/ 

 --

[SA19336] Fedora update for beagle

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-03-22

Fedora has issued an update for beagle. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/19336/ 

 --

[SA19333] util-vserver Unknown Capabilities Handling Security Issue

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2006-03-22

A security issue has been reported in util-vserver, which potentially
can be exploited by malicious programs to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/19333/ 

 --

[SA19330] Linux Kernel Netfilter Weakness and RNDIS Buffer Overflow

Critical:    Less critical
Where:       Local system
Impact:      Unknown
Released:    2006-03-22

A weakness and a vulnerability have been reported in the Linux Kernel,
which have unknown impacts.

Full Advisory:
http://secunia.com/advisories/19330/ 

 --

[SA19323] RunIt "chpst" Multiple Groups Handling Security Issue

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-03-22

Tino Keitel has reported a security issue in RunIt, which potentially
can cause a process to run with escalated group privileges.

Full Advisory:
http://secunia.com/advisories/19323/ 

 --

[SA19318] Debian update for snmptrapfmt

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-03-22

Debian has issued an update for snmptrapfmt. This fixes a
vulnerability, which potentially can be exploited by malicious, local
users to perform certain actions on a vulnerable system with escalated
privileges.

Full Advisory:
http://secunia.com/advisories/19318/ 

 --

[SA19316] Fedora update for xorg-x11-server

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2006-03-21

Fedora has issued an update for xorg-x11-server. This fixes a
vulnerability, which can be exploited by malicious, local users to
bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/19316/ 

 --

[SA19311] Sun Solaris update for Xorg X Server

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2006-03-21

Sun has issued an update for Xorg X Server. This fixes a vulnerability,
which can be exploited by malicious, local users to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/19311/ 

 --

[SA19307] X.Org X11 User Privilege Checking Security Bypass

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2006-03-21

A vulnerability has been reported in X11, which can be exploited by
malicious, local users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/19307/ 

 --

[SA19305] HP-UX usermod Recursive Ownership Change Security Issue

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2006-03-20

A security issue has been reported in HP-UX, which potentially can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/19305/ 

 --

[SA19278] Beagle "beagle-status" Command Execution Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-03-17

James McCaw has discovered a vulnerability in Beagle, which can be
exploited by malicious, local users to perform certain actions on a
vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/19278/ 

 --

[SA19357] Linux Kernel IPv4 "sockaddr_in.sin_zero" Information
Disclosure

Critical:    Not critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2006-03-23

Pavel Kankovsky has reported a weakness in the Linux kernel, which can
be exploited by malicious, local users to disclose potentially
sensitive information.

Full Advisory:
http://secunia.com/advisories/19357/ 

 --

[SA19280] Gnome Screensaver Password Bypass Vulnerability

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2006-03-20

Sam Morris has reported a vulnerability in gnome-screensaver, which can
be exploited by a malicious person with physical access to a system to
bypass the password protected screensaver.

Full Advisory:
http://secunia.com/advisories/19280/ 


Other:--

[SA19337] Firepass 4100 SSL VPN "s" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-03-22

ILION Research Labs has reported a vulnerability in Firepass 4100 SSL
VPN, which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/19337/ 

 --

[SA19324] Novell NetWare NILE.NLM SSL Negotiation Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-03-22

Some vulnerabilities have been reported in Novell NetWare / Open
Enterprise Server, which potentially can be exploited by malicious
people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/19324/ 

 --

[SA19319] Motorola Cellular Phones Security Dialog Spoofing
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Spoofing, Exposure of sensitive
information
Released:    2006-03-22

Kevin Finisterre has reported a vulnerability in Motorola PEBL U6 and
Motorola V600, which can be exploited by malicious people to trick
users into accepting certain security dialogs.

Full Advisory:
http://secunia.com/advisories/19319/ 

 --

[SA19265] Novell NetWare NWFTPD Potential Denial of Service
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2006-03-17

A vulnerability has been reported in NetWare, which potentially can be
exploited by malicious users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/19265/ 


Cross Platform:--

[SA19358] RealNetworks Products Multiple Buffer Overflow
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-23

Some vulnerabilities have been reported in various RealNetworks
products, which can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/19358/ 

 --

[SA19353] XHP CMS "FileManager" File Upload Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-23

rgod has discovered a vulnerability in XHP CMS, which can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/19353/ 

 --

[SA19352] vBulletin ImpEx Module "systempath" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-23

ReZEN has reported a vulnerability in the ImpEx module for vBulletin,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/19352/ 

 --

[SA19343] FreeWPS "ImageManager" File Upload Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-22

alexander wilhelm has discovered a vulnerability in FreeWPS, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/19343/ 

 --

[SA19320] Free Articles Directory "page" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-22

Botan has discovered a vulnerability in Free Articles Directory, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/19320/ 

 --

[SA19298] KnowledgebasePublisher "dir" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-03-21

uid0 has reported a vulnerability in KnowledgebasePublisher, which
potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/19298/ 

 --

[SA19285] PHP iCalendar File Inclusion and Calendar Upload
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2006-03-21

rgod has discovered two vulnerabilities in PHP iCalendar, which can be
exploited by malicious people to disclose potentially sensitive
information and to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/19285/ 

 --

[SA19359] AnyPortal(php) "F" Directory Traversal Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access, Exposure of sensitive information,
Manipulation of data
Released:    2006-03-23

Nuno Justo has discovered a vulnerability in AnyPortal(php), which can
be exploited by malicious users to disclose and manipulate sensitive
information, and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/19359/ 

 --

[SA19329] 1WebCalendar Multiple SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-03-22

r0t has discovered some vulnerabilities in 1WebCalendar, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/19329/ 

 --

[SA19322] gCards Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
sensitive information
Released:    2006-03-21

rgod has discovered multiple vulnerabilities in gcards, which can be
exploited by malicious people to conduct cross-site scripting attacks,
disclose sensitive information, and conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/19322/ 

 --

[SA19315] phpWebsite "sid" Parameter SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-03-22

DaBDouB-MoSiKaR has discovered a vulnerability in phpWebsite, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/19315/ 

 --

[SA19314] Skull-Splitter's Download Counter for Wallpapers SQL
Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-03-20

Aliaksandr Hartsuyeu has reported some vulnerabilities in Download
Counter for Wallpapers, which can be exploited by malicious people to
conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/19314/ 

 --

[SA19310] BEA WebLogic Server/Express Two Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, DoS
Released:    2006-03-21

Two vulnerabilities have been reported in WebLogic Server / Express,
which can be exploited by malicious people to disclose potentially
sensitive information and to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/19310/ 

 --

[SA19309] webcheck Website Content Script Insertion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-03-23

A vulnerability has been reported in webcheck, which can be exploited
by malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/19309/ 

 --

[SA19290] OSWiki Username Script Insertion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-03-22

A vulnerability has been reported in OSWiki, which can be exploited by
malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/19290/ 

 --

[SA19289] CuteNews "archive" Disclosure of Sensitive Information
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-03-20

Hamid Ebadi has discovered a vulnerability in CuteNews, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/19289/ 

 --

[SA19283] SoftBB "mail" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-03-20

A vulnerability has been discovered in SoftBB, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/19283/ 

 --

[SA19275] Maian Support SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2006-03-17

Aliaksandr Hartsuyeu has reported two vulnerabilities in Maian Support,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/19275/ 

 --

[SA19274] Maian Events Multiple SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-03-17

Aliaksandr Hartsuyeu has discovered multiple vulnerabilities in Maian
Events, which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/19274/ 

 --

[SA19273] Maian Weblog Multiple SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-03-17

Aliaksandr Hartsuyeu has discovered multiple vulnerabilities in Maian
Weblog, which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/19273/ 

 --

[SA19270] Simple PHP Blog "blog_language" Local File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-03-20

rgod has discovered a security issue in Simple PHP Blog, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/19270/ 

 --

[SA19263] Streber Unspecified Script Insertion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-03-20

A vulnerability has been reported in Streber, which potentially can be
exploited by malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/19263/ 

 --

[SA19351] AdMan "transactions_offset" SQL Injection Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data, Exposure of system information
Released:    2006-03-23

r0t has reported a vulnerability in AdMan, which can be exploited by
malicious users to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/19351/ 

 --

[SA19340] PHP Live! "base_url" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-03-23

K-sPecial has reported a vulnerability in PHP Live!, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/19340/ 

 --

[SA19332] IBM Tivoli Business Systems Manager Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-03-23

A vulnerability has been reported in IBM Tivoli Business Systems
Manager, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/19332/ 

 --

[SA19321] ExtCalendar calendar.php Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-03-21

Soot has discovered some vulnerabilities in ExtCalendar, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/19321/ 

 --

[SA19308] BEA WebLogic Portal JSR-168 Portlets Rendering Security
Issue

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-03-21

A security issue has been reported in WebLogic Portal, which can be
exploited by malicious users to disclose potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/19308/ 

 --

[SA19299] Invision Power Board PM Unspecified Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-03-22

A vulnerability has been reported in Invision Power Board, which
potentially can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/19299/ 

 --

[SA19294] Contrexx CMS Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-03-21

Soot has discovered a vulnerability in Contrexx CMS, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/19294/ 

 --

[SA19293] Woltlab Burning Board "class_db_mysql.php" Cross-Site
Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-03-20

r57shell has reported a vulnerability in Burning Board and Burning
Board Lite, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/19293/ 

 --

[SA19277] phpMyAdmin "set_theme" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-03-17

A vulnerability has been reported in phpMyAdmin, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/19277/ 

 --

[SA19268] Skull-Splitter's PHP Guestbook Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-03-17

Aliaksandr Hartsuyeu has discovered a vulnerability in Skull-Splitter's
PHP Guestbook, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/19268/ 



=======================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/ 

Subscribe:
http://secunia.com/secunia_weekly_summary/ 

Contact details:
Web	: http://secunia.com/ 
E-mail	: support@secunia.com 
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45



_________________________________
InfoSec News v2.0 - Coming Soon! 
http://www.infosecnews.org 

Site design & layout copyright © 1986-2014 CodeGods