AOH :: ISN-3164.HTM

Secunia Weekly Summary - Issue: 2006-42




Secunia Weekly Summary - Issue: 2006-42
Secunia Weekly Summary - Issue: 2006-42



=======================================================================
                  The Secunia Weekly Advisory Summary                  
                        2006-10-12 - 2006-10-19                        

                       This week: 83 advisories                        

=======================================================================Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

=======================================================================1) Word From Secunia:

Secunia Corporate Website has been Released

Learn more about what Secunia can offer you and your company, see and
download detailed product descriptions, and view comprehensive flash
presentations of both our products and corporate profile.

Visit the Secunia Corporate Website:
http://corporate.secunia.com/ 


Secunia Vulnerability and Advisory Portal has been Updated

Our publicly available Vulnerability and Advisory Portal
secunia.com has been updated with improved accessibility and usability,
enhanced features, and improved search capabilities along with
availability of extensive product reports.

Over the years, the Secunia brand has become synonymous with credible,
accurate, and reliable vulnerability intelligence and our services
are used by more than 5 million unique users every year at secunia.com.

Visit the Secunia Vulnerability and Advisory Portal:
http://secunia.com/ 

=======================================================================2) This Week in Brief:

A few hours after Microsoft released Internet Explorer 7 the first
vulnerability affecting it has been reported.

The vulnerability can be exploited by malicious people to disclose
potentially sensitive information.

Secunia has a demonstration available here:
http://secunia.com/Internet_Explorer_Arbitrary_Content_Disclosure_Vulnerability_Test/ 

NOTE: This vulnerability was initially reported 6 months ago in
Internet Explorer 6.

References:
http://secunia.com/SA22477 
http://secunia.com/SA19738 

 --
 
A vulnerability has been reported in Opera 9, which can be exploited
by malicious people to compromise a user's system.

Further information is available in the referenced Secunia advisory
below.

Reference:
http://secunia.com/SA22218 

 --
 
Two vulnerabilities have been reported in Clam AntiVirus, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
potentially compromise a vulnerable system.

An updated version is available from the vendor.

Reference:
http://secunia.com/SA22370 

 --

VIRUS ALERTS:

During the past week Secunia collected 196 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

=======================================================================3) This Weeks Top Ten Most Read Advisories:

1.  [SA22394] Microsoft PowerPoint Unspecified Code Execution
              Vulnerability
2.  [SA22159] Microsoft Windows Shell Code Execution Vulnerability
3.  [SA21910] Internet Explorer daxctle.ocx "KeyFrame()" Method
              Vulnerability
4.  [SA20153] Microsoft Word Malformed Object Pointer Vulnerability
5.  [SA21735] Microsoft Word Code Execution Vulnerabilities
6.  [SA22370] Clam AntiVirus CHM Unpacker and PE Rebuilding
              Vulnerabilities
7.  [SA22218] Opera Web Browser URL Handling Buffer Overflow
              Vulnerability
8.  [SA22419] NVIDIA Binary Graphics Driver for Linux Buffer Overflow
              Vulnerability
9.  [SA21865] Adobe Flash Player Multiple Vulnerabilities
10. [SA22396] Oracle Products Multiple Vulnerabilities

=======================================================================4) Vulnerabilities Summary Listing

Windows:
[SA22396] Oracle Products Multiple Vulnerabilities
[SA22394] Microsoft PowerPoint Unspecified Code Execution
Vulnerability
[SA22386] JustSystems Ichitaro Unspecified Buffer Overflow
Vulnerability
[SA22402] Toshiba Bluetooth Stack Memory Corruption Vulnerability
[SA22477] Internet Explorer 7 "mhtml:" Redirection Information
Disclosure

UNIX/Linux:
[SA22461] Lou Portail "g_admin_rep" File Inclusion Vulnerability
[SA22500] Debian update for openssl096
[SA22457] Trustix Updates for Multiple Packages
[SA22450] Gentoo update for capi4hylafax
[SA22440] Avaya Products PHP Multiple Vulnerabilities
[SA22422] Avaya Products Firefox Multiple Vulnerabilities
[SA22421] Mandriva update for clamav
[SA22419] NVIDIA Binary Graphics Driver for Linux Buffer Overflow
Vulnerability
[SA22393] Ubuntu update for libmusicbrainz
[SA22391] Gentoo update for seamonkey
[SA22385] Avaya Products OpenSSL Multiple Vulnerabilities
[SA22378] Avaya Products Wireshark Multiple Vulnerabilities
[SA22481] Ubuntu update for pike
[SA22473] Ubuntu update for libksba
[SA22448] Gentoo update for python
[SA22445] Mandriva update for libksba
[SA22435] Avaya Products gzip Multiple Vulnerabilities
[SA22417] Avaya Products Linux Kernel Multiple Vulnerabilities
[SA22388] Sun Solaris Apache "mod_rewrite" and "mod_imap"
Vulnerabilities
[SA22384] TorrentFlux Cross-Site Scripting and Script Insertion
[SA22379] Avaya Python "repr()" Unicode String Buffer Overflow
Vulnerability
[SA22446] Gentoo update for nss
[SA22441] rPath update for kernel
[SA22425] Avaya CMS / IR Sun Solaris ACK Storm Denial of Service
[SA22382] Mandriva update for kernel
[SA22474] Apple Xcode WebObjects Plugin Privilege Escalation
Vulnerability
[SA22424] Mandriva update for php
[SA22390] OpenBase SQL Privilege Escalation Vulnerability
[SA22453] Sun Solaris TCP Fusion Local Denial of Service
[SA22439] X.Org X11 X Display Manager "Xsession" Script Security Issue
[SA22413] FreeBSD "fruncate()" and Scheduler Local Denial of Service

Other:
[SA22406] IronMail IronWebMail Directory Traversal Vulnerability
[SA22444] FirePass 1000 SSL VPN "sid" Cross-Site Scripting
Vulnerability
[SA22463] Fuji Xerox DocuPrint Multiple Vulnerabilities

Cross Platform:
[SA22471] phpPowerCards "txt.inc.php" PHP Code Injection
[SA22470] Comdev Misc Tools "path[docroot]" File Inclusion
[SA22466] Easynews "en_login_id" Authentication Bypass Vulnerability
[SA22465] Brim "renderer" File Inclusion Vulnerabilities
[SA22458] Apache HTTP Server mod_tcl Format String Vulnerabilities
[SA22455] Php AMX "plug_path" File Inclusion Vulnerability
[SA22449] PMB Multiple Vulnerabilities
[SA22447] Specimen Image Database "dir" File Inclusion Vulnerability
[SA22443] phpBB Archive for Search Engines "phpbb_root_path" File
Inclusion
[SA22442] WoltLab Burning Book SQL Injection and "eval()" Injection
[SA22438] SpamOborona "phpbb_root_path" File Inclusion Vulnerability
[SA22437] SuperMod "sourcedir" File Inclusion Vulnerabilities
[SA22436] ACP User Registration "phpbb_root_path" File Inclusion
Vulnerability
[SA22434] phpBB News Defilante Horizontale "phpbb_root_path" File
Inclusion
[SA22432] phpBB lat2cyr "phpbb_root_path" File Inclusion Vulnerability
[SA22430] French Language Pack for phpBB Prillian "phpbb_root_path"
File Inclusion
[SA22429] Lodel "home" File Inclusion Vulnerability
[SA22427] PHPRecipeBook "g_rb_basedir" File Inclusion Vulnerability
[SA22420] IncCMS Core "inc_dir" File Inclusion Vulnerability
[SA22416] CDS Agenda "AGE" File Inclusion Vulnerability
[SA22414] phpBB PlusXL "phpbb_root_path" File Inclusion Vulnerability
[SA22412] Open Conference Systems "fullpath" File Inclusion
Vulnerability
[SA22411] phpMyConference "lvc_include_path" File Inclusion
Vulnerability
[SA22404] phpht Topsites "phpht_real_path" File Inclusion
Vulnerability
[SA22403] NuralStorm Webmail "DEFAULT_SKIN" File Inclusion
Vulnerability
[SA22401] miniBB Keyword Replacer "pathToFiles" File Inclusion
Vulnerability
[SA22387] Journals System "phpbb_root_path" File Inclusion
Vulnerability
[SA22383] Download-Engine "spaw_root" File Inclusion Vulnerability
[SA22381] Leicestershire Community Portals "cp_root_path" File
Inclusion
[SA22472] Asbru Website Manager Shell Command Injection
[SA22423] libksba X.509 Certificates Denial of Service Vulnerability
[SA22409] Bugzilla Multiple Vulnerabilities
[SA22400] Invision Gallery Information Disclosure and SQL Injection
[SA22389] Def-Blog "article" SQL Injection Vulnerability
[SA22460] Sun Grid Engine Multiple OpenSSL Vulnerabilities
[SA22454] Brim Unspecified Information Disclosure Vulnerability
[SA22431] phplist "p" Cross-Site Scripting Vulnerability
[SA22418] Cerberus Helpdesk "rpc.php" Security Bypass Vulnerability
[SA22407] dbc CMS Cross-Site Scripting Vulnerability
[SA22405] phplist "unsubscribeemail" Cross-Site Scripting
Vulnerability
[SA22395] ViewVC UTF-7 Cross-Site Scripting Vulnerability
[SA22392] MySQLDumper "db" Cross-Site Scripting Vulnerability
[SA22399] HP Version Control Agent Security Bypass Vulnerability
[SA22469] Ubuntu update for xinit

=======================================================================5) Vulnerabilities Content Listing

Windows:--

[SA22396] Oracle Products Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Unknown, Manipulation of data, DoS, System access
Released:    2006-10-18

Multiple vulnerabilities have been reported in various Oracle products.
Some of these vulnerabilities have unknown impacts while others can be
exploited to cause a DoS (Denial of Service), conduct SQL injection
attacks, and potentially compromise the system.

Full Advisory:
http://secunia.com/advisories/22396/ 

 --

[SA22394] Microsoft PowerPoint Unspecified Code Execution
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-13

Nanika has reported a vulnerability in Microsoft PowerPoint, which
potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/22394/ 

 --

[SA22386] JustSystems Ichitaro Unspecified Buffer Overflow
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-18

A vulnerability has been reported in Ichitaro, which can be exploited
by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/22386/ 

 --

[SA22402] Toshiba Bluetooth Stack Memory Corruption Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-17

A vulnerability has been reported in Toshiba Bluetooth Stack, which can
be exploited by malicious people to cause a DoS (Denial of Service) and
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22402/ 

 --

[SA22477] Internet Explorer 7 "mhtml:" Redirection Information
Disclosure

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-10-19

A vulnerability has been discovered in Internet Explorer, which can be
exploited by malicious people to disclose potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/22477/ 


UNIX/Linux:--

[SA22461] Lou Portail "g_admin_rep" File Inclusion Vulnerability

Critical:    Highly critical
Where:       
Impact:      
Released:    2006-10-18

MP has discovered a vulnerability in Lou Portail, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22461/ 

 --

[SA22500] Debian update for openssl096

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-19

Debian has issued an update for openssl096. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22500/ 

 --

[SA22457] Trustix Updates for Multiple Packages

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2006-10-18

Trustix has issued updates for multiple packages. These fix some
vulnerabilities, which can be exploited by malicious, local users to
bypass certain security restrictions, and malicious people to cause a
DoS (Denial of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22457/ 

 --

[SA22450] Gentoo update for capi4hylafax

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-18

Gentoo has issued an update for capi4hylafax. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22450/ 

 --

[SA22440] Avaya Products PHP Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, DoS, System access
Released:    2006-10-16

Avaya has acknowledged some vulnerabilities in PHP included in various
Avaya products, which can be exploited by malicious, local users to
bypass certain security restrictions, and by malicious people to
conduct cross-site scripting and HTTP response splitting attacks, cause
a DoS (Denial of Service), and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22440/ 

 --

[SA22422] Avaya Products Firefox Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Spoofing, DoS,
System access
Released:    2006-10-17

Avaya has acknowledged some vulnerabilities in Firefox included in
various Avaya products, which can be exploited by malicious people to
conduct man-in-the-middle, spoofing, and cross-site scripting attacks,
and potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/22422/ 

 --

[SA22421] Mandriva update for clamav

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-18

Mandriva has issued an update for clamav. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22421/ 

 --

[SA22419] NVIDIA Binary Graphics Driver for Linux Buffer Overflow
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Privilege escalation, DoS, System access
Released:    2006-10-17

Rapid7 has reported a vulnerability in NVIDIA Binary Graphics Driver
for Linux, which can be exploited by malicious, local users to gain
escalated privileges and potentially by malicious people to compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/22419/ 

 --

[SA22393] Ubuntu update for libmusicbrainz

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-12

Ubuntu has issued an update for libmusicbrainz. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22393/ 

 --

[SA22391] Gentoo update for seamonkey

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Spoofing, DoS, System access
Released:    2006-10-16

Gentoo has issued an update for seamonkey. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing attacks, bypass certain security restrictions, and potentially
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/22391/ 

 --

[SA22385] Avaya Products OpenSSL Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-13

Avaya has acknowledged some vulnerabilities in OpenSSL included in
various Avaya products, which can be exploited by malicious people to
cause a DoS (Denial of Service) and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22385/ 

 --

[SA22378] Avaya Products Wireshark Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-13

Avaya has acknowledged some vulnerabilities in Wireshark included in
various Avaya products, which can be exploited by malicious people to
cause a DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22378/ 

 --

[SA22481] Ubuntu update for pike

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-10-19

Ubuntu has issued an update for pike. This fixes a vulnerability, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/22481/ 

 --

[SA22473] Ubuntu update for libksba

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-10-17

Ubuntu has issued an update for libksba. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/22473/ 

 --

[SA22448] Gentoo update for python

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-18

Gentoo has issued an update for python. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22448/ 

 --

[SA22445] Mandriva update for libksba

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-10-18

Mandriva has issued an update for libksba. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/22445/ 

 --

[SA22435] Avaya Products gzip Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-16

Avaya has acknowledged some vulnerabilities in gzip included in various
Avaya products, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22435/ 

 --

[SA22417] Avaya Products Linux Kernel Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information, DoS
Released:    2006-10-16

Avaya has acknowledged some vulnerabilities in the Linux Kernel
included in various Avaya products, which can be exploited by
malicious, local users to bypass certain security restrictions, gain
knowledge of potentially sensitive information, or cause a DoS (Denial
of Service), and by malicious people to bypass certain security
restrictions or cause a DoS.

Full Advisory:
http://secunia.com/advisories/22417/ 

 --

[SA22388] Sun Solaris Apache "mod_rewrite" and "mod_imap"
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, DoS, System access
Released:    2006-10-12

Sun has acknowledged some vulnerabilities in Solaris, which can be
exploited by malicious people to conduct cross-site scripting attacks
and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22388/ 

 --

[SA22384] TorrentFlux Cross-Site Scripting and Script Insertion

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-16

Steven Roddis has discovered some vulnerabilities in TorrentFlux, which
can be exploited by malicious people to conduct cross-site scripting and
script insertion attacks.

Full Advisory:
http://secunia.com/advisories/22384/ 

 --

[SA22379] Avaya Python "repr()" Unicode String Buffer Overflow
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-13

Avaya has acknowledged a vulnerability in Python included in various
Avaya products, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22379/ 

 --

[SA22446] Gentoo update for nss

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-10-18

Gentoo has issued an update for nss. This fixes a vulnerability, which
can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/22446/ 

 --

[SA22441] rPath update for kernel

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2006-10-18

rPath has issued an update for the kernel. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/22441/ 

 --

[SA22425] Avaya CMS / IR Sun Solaris ACK Storm Denial of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2006-10-16

Avaya has acknowledged a vulnerability in Avaya CMS/IR, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22425/ 

 --

[SA22382] Mandriva update for kernel

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2006-10-12

Mandriva has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users and
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22382/ 

 --

[SA22474] Apple Xcode WebObjects Plugin Privilege Escalation
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-10-17

A vulnerability has been reported in Apple Xcode, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/22474/ 

 --

[SA22424] Mandriva update for php

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2006-10-18

Mandriva has issued an update for php. This fixes some vulnerabilities,
which can be exploited by malicious, local users to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/22424/ 

 --

[SA22390] OpenBase SQL Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-10-17

Kevin Finisterre has reported a vulnerability in OpenBase, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/22390/ 

 --

[SA22453] Sun Solaris TCP Fusion Local Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-10-18

A vulnerability has been reported in Sun Solaris, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/22453/ 

 --

[SA22439] X.Org X11 X Display Manager "Xsession" Script Security Issue

Critical:    Not critical
Where:       Local system
Impact:      Exposure of system information
Released:    2006-10-17

A security issue has been reported in X.Org X11, which can be exploited
by malicious, local users to gain access to system information.

Full Advisory:
http://secunia.com/advisories/22439/ 

 --

[SA22413] FreeBSD "fruncate()" and Scheduler Local Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-10-18

Some vulnerabilities have been reported in FreeBSD, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/22413/ 


Other:--

[SA22406] IronMail IronWebMail Directory Traversal Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-10-17

Derek Callaway has reported a vulnerability in IronMail, which can be
exploited by malicious people to gain knowledge of sensitive
information.

Full Advisory:
http://secunia.com/advisories/22406/ 

 --

[SA22444] FirePass 1000 SSL VPN "sid" Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-18

Richard Brain has reported a vulnerability in FirePass 1000 SSL VPN,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/22444/ 

 --

[SA22463] Fuji Xerox DocuPrint Multiple Vulnerabilities

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass, DoS
Released:    2006-10-16

Some vulnerabilities have been reported in various Fuji Xerox DocuPrint
printers, which can be exploited by malicious people to bypass certain
security restrictions or to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22463/ 


Cross Platform:--

[SA22471] phpPowerCards "txt.inc.php" PHP Code Injection

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-19

nuffsaid has reported some vulnerabilities in phpPowerCards, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22471/ 

 --

[SA22470] Comdev Misc Tools "path[docroot]" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-19

disfigure has reported a vulnerability in Comdev Misc Tools, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22470/ 

 --

[SA22466] Easynews "en_login_id" Authentication Bypass Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-10-18

nuffsaid has discovered a vulnerability in Easynews, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/22466/ 

 --

[SA22465] Brim "renderer" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-18

mdx and The_Bat_Hacker have discovered some vulnerabilities in Brim,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22465/ 

 --

[SA22458] Apache HTTP Server mod_tcl Format String Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-16

Some vulnerabilities have been reported in the mod_tcl module for
Apache HTTP server, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22458/ 

 --

[SA22455] Php AMX "plug_path" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-18

MP has reported a vulnerability in Php AMX, which can be exploited by
malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22455/ 

 --

[SA22449] PMB Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2006-10-18

Some vulnerabilities have been reported in PMB (PhpMyBibli), which can
be exploited by malicious people to disclose potentially sensitive
information and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22449/ 

 --

[SA22447] Specimen Image Database "dir" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-17

Kw3[R]Ln has discovered a vulnerability in Specimen Image Database,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22447/ 

 --

[SA22443] phpBB Archive for Search Engines "phpbb_root_path" File
Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-16

Ashiyane Corporation has reported a vulnerability in the phpBB Archive
for Search Engines module, which can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22443/ 

 --

[SA22442] WoltLab Burning Book SQL Injection and "eval()" Injection

Critical:    Highly critical
Where:       From remote
Impact:      Manipulation of data, System access
Released:    2006-10-17

ShAnKaR has discovered some vulnerabilities in WoltLab Burning Book,
which can be exploited by malicious people to conduct SQL injection
attacks and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22442/ 

 --

[SA22438] SpamOborona "phpbb_root_path" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-16

Ashiyane Corporation has reported a vulnerability in the SpamOborona
module for phpBB, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22438/ 

 --

[SA22437] SuperMod "sourcedir" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-16

sZ has discovered some vulnerabilities in SuperMod, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22437/ 

 --

[SA22436] ACP User Registration "phpbb_root_path" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-16

bd0rk has reported a vulnerability in the ACP User Registration module
for phpBB, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/22436/ 

 --

[SA22434] phpBB News Defilante Horizontale "phpbb_root_path" File
Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-18

Ashiyane Corporation has reported a vulnerability in the News Defilante
Horizontale module for phpBB, which can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22434/ 

 --

[SA22432] phpBB lat2cyr "phpbb_root_path" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-16

Ashiyane Corporation has reported a vulnerability in the lat2cyr module
for phpBB, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/22432/ 

 --

[SA22430] French Language Pack for phpBB Prillian "phpbb_root_path"
File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-16

Ashiyane Corporation has reported some vulnerabilities in the French
Language Pack for the phpBB Prillian module, which can be exploited by
malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22430/ 

 --

[SA22429] Lodel "home" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-18

The_Bekir and ERNE have reported a vulnerability in Lodel, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22429/ 

 --

[SA22427] PHPRecipeBook "g_rb_basedir" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-17

r0ut3r has reported a vulnerability in PHPRecipeBook, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22427/ 

 --

[SA22420] IncCMS Core "inc_dir" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-16

Kacper has reported a vulnerability in IncCMS Core, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22420/ 

 --

[SA22416] CDS Agenda "AGE" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-16

Drago84 has reported a vulnerability in CDS Agenda, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22416/ 

 --

[SA22414] phpBB PlusXL "phpbb_root_path" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-16

Ashiyane Corporation has reported a vulnerability in phpBB PlusXL,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22414/ 

 --

[SA22412] Open Conference Systems "fullpath" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-16

k1tk4t has reported a vulnerability in Open Conference Systems, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22412/ 

 --

[SA22411] phpMyConference "lvc_include_path" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-16

k1tk4t has reported a vulnerability in phpMyConference, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22411/ 

 --

[SA22404] phpht Topsites "phpht_real_path" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-13

XORON has reported a vulnerability in phpht Topsites, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22404/ 

 --

[SA22403] NuralStorm Webmail "DEFAULT_SKIN" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-16

Kw3rLn has reported a vulnerability in NuralStorm Webmail, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22403/ 

 --

[SA22401] miniBB Keyword Replacer "pathToFiles" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-13

Kw3[R]Ln has discovered a vulnerability in the Keyword Replacer plugin
for miniBB, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/22401/ 

 --

[SA22387] Journals System "phpbb_root_path" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-13

Ashiyane Corporation has discovered some vulnerabilities in Journals
System for phpBB, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22387/ 

 --

[SA22383] Download-Engine "spaw_root" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-13

v1per-haCker has discovered a vulnerability in Download-Engine, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22383/ 

 --

[SA22381] Leicestershire Community Portals "cp_root_path" File
Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-12

Ashiyane Corporation has discovered a vulnerability in Leicestershire
Community Portals, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22381/ 

 --

[SA22472] Asbru Website Manager Shell Command Injection

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-10-17

A vulnerability has been reported in Asbru Website Manager, which can
be exploited by malicious users to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22472/ 

 --

[SA22423] libksba X.509 Certificates Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-10-17

A vulnerability has been reported in libksba, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22423/ 

 --

[SA22409] Bugzilla Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
sensitive information
Released:    2006-10-16

Some vulnerabilities have been reported in Bugzilla, which can be
exploited by malicious people or malicious users to disclose
potentially sensitive information, conduct cross-site scripting, script
insertion, and request forgery attacks.

Full Advisory:
http://secunia.com/advisories/22409/ 

 --

[SA22400] Invision Gallery Information Disclosure and SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2006-10-13

_1nf3ct0r_ has reported some vulnerabilities in Invision Gallery, which
can be exploited by malicious people to disclose potentially sensitive
information and conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/22400/ 

 --

[SA22389] Def-Blog "article" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-10-16

SHiKaA has discovered a vulnerability in Def-Blog, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/22389/ 

 --

[SA22460] Sun Grid Engine Multiple OpenSSL Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2006-10-16

Sun Microsystems has acknowledged some vulnerabilities in Sun Grid
Engine, which can be exploited by malicious people to cause a DoS
(Denial of Service) and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22460/ 

 --

[SA22454] Brim Unspecified Information Disclosure Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-10-18

A vulnerability has been reported in Brim, which can be exploited by
malicious users to disclose certain sensitive information.

Full Advisory:
http://secunia.com/advisories/22454/ 

 --

[SA22431] phplist "p" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-18

b0rizQ has discovered a vulnerability in phplist, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22431/ 

 --

[SA22418] Cerberus Helpdesk "rpc.php" Security Bypass Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-10-18

A vulnerability has been reported in Cerberus Helpdesk, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/22418/ 

 --

[SA22407] dbc CMS Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-19

landseer has reported a vulnerability in dbc CMS, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22407/ 

 --

[SA22405] phplist "unsubscribeemail" Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-13

MustLive has reported a vulnerability in phplist, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22405/ 

 --

[SA22395] ViewVC UTF-7 Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-16

Stefan Esser has reported a vulnerability in ViewVC, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22395/ 

 --

[SA22392] MySQLDumper "db" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-12

Crackers_Child has discovered a vulnerability in MySQLDumper, which can
be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/22392/ 

 --

[SA22399] HP Version Control Agent Security Bypass Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass
Released:    2006-10-13

A vulnerability has been reported in HP Version Control Agent, which
can be exploited by malicious users to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/22399/ 

 --

[SA22469] Ubuntu update for xinit

Critical:    Not critical
Where:       Local system
Impact:      Exposure of system information
Released:    2006-10-17

Ubuntu has issued an update for xinit. This fixes a security issue,
which can be exploited by malicious, local users to gain access to
system information.

Full Advisory:
http://secunia.com/advisories/22469/ 



=======================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/ 

Subscribe:
http://secunia.com/secunia_weekly_summary/ 

Contact details:
Web	: http://secunia.com/ 
E-mail	: support@secunia.com 
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_________________________________
Visit the InfoSec News store!
http://www.shopinfosecnews.org 

Site design & layout copyright © 1986-2014 CodeGods