AOH :: ISN-3248.HTM

Secunia Weekly Summary - Issue: 2006-45




Secunia Weekly Summary - Issue: 2006-45
Secunia Weekly Summary - Issue: 2006-45



  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--1457021584-1289351498-1163142314=:2511
Content-Type: TEXT/PLAIN; charset=UTF-8
Content-Transfer-Encoding: QUOTED-PRINTABLE

=======================================================================
                  The Secunia Weekly Advisory Summary                  
                        2006-11-02 - 2006-11-09                        

                       This week: 71 advisories                        

=======================================================================Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

=======================================================================1) Word From Secunia:

We are proud to announce the availability of the Secunia "Security
Watchdog" Blog.

The Secunia "Security Watchdog" Blog is used to communicate our
opinions about vulnerabilities, security, ethics, and our responses to
articles, research papers, and other blog entries regarding Secunia
and vulnerabilities.

To get the facts about vulnerabilities read our Secunia advisories. To
get our opinions read the Secunia "Security Watchdog" Blog.

The Blog:
http://secunia.com/blog/ 

Subscribe to the RSS Feed:
http://secunia.com/blog_rss/o.rss 

=======================================================================2) This Week in Brief:

Another "Zero-day" vulnerability, this time affecting Microsoft XML
Core Services has been reported.

The vulnerability can be exploited by malicious people to compromise a
users system.

Secunia has issue a "Extremely Critical" advisory regarding this
vulnerability as it is already being actively exploited.

Reference:
http://secunia.com/SA22687 

 --
 
Some vulnerabilities have been reported in Mozilla Firefox and Mozilla
SeaMonkey, which can be exploited by malicious people to bypass
certain security restrictions, conduct cross-site scripting attacks,
and potentially compromise a vulnerable system.

Reference:
http://secunia.com/SA22722 

 --
 
A vulnerability has been reported in America Online ICQ, which can be
exploited by malicious people to compromise a user's system.

The vendor has issued a fix, which is applied automatically once
connected to the ICQ service.

Reference:
http://secunia.com/SA22670 

 --

VIRUS ALERTS:

During the past week Secunia collected 166 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

=======================================================================3) This Weeks Top Ten Most Read Advisories:

1.  [SA22687] Microsoft XMLHTTP ActiveX Control Code Execution
              Vulnerability
2.  [SA22477] Internet Explorer 7 "mhtml:" Redirection Information
              Disclosure
3.  [SA22653] PHP "htmlentities()" and "htmlspecialchars()" Buffer
              Overflows
4.  [SA22628] Internet Explorer 7 Window Injection Vulnerability
5.  [SA22603] Microsoft Visual Studio WMI Object Broker ActiveX Control
              Code Execution
6.  [SA21910] Internet Explorer daxctle.ocx "KeyFrame()" Method
              Vulnerability
7.  [SA22542] Internet Explorer 7 Popup Address Bar Spoofing Weakness
8.  [SA22722] Mozilla Firefox and SeaMonkey Multiple Vulnerabilities
9.  [SA13129] Mozilla / Mozilla Firefox Window Injection Vulnerability
10. [SA19738] Internet Explorer "mhtml:" Redirection Disclosure of
              Sensitive Information

=======================================================================4) Vulnerabilities Summary Listing

Windows:
[SA22687] Microsoft XMLHTTP ActiveX Control Code Execution
Vulnerability
[SA22718] Essentia Web Server GET/HEAD Buffer Overflow
[SA22751] Omni-NFS NFS Server Buffer Overflow
[SA22755] War FTP Daemon CWD Denial Of Service
[SA22739] Easy Chat Server Information Disclosure Security Issue
[SA22717] XM Easy Personal FTP Server NLST Denial Of Service

UNIX/Linux:
[SA22769] GreenBeast CMS File Upload And Logon Bypass
[SA22764] Gentoo update for nvidia-drivers
[SA22763] Red Hat update for seamonkey
[SA22756] Advanced Guestbook "include_path" Parameter File Inclusion
[SA22753] Red Hat update for PHP
[SA22752] Mandriva update for imlib2
[SA22744] Ubuntu update for imlib2
[SA22737] Red Hat update for firefox
[SA22732] imlib2 Multiple Image File Processing Vulnerabilities
[SA22730] Ubuntu update for nvidia-glx
[SA22713] Debian update for php4
[SA22693] Mandriva update for php
[SA22688] Ubuntu update for PHP
[SA22762] Mandriva update for kernel
[SA22750] OpenLDAP BIND Denial of Service Vulnerability
[SA22738] Gentoo update for qt
[SA22731] Linux Kernel Fragmented IPv6 Packet Filtering Bypass
[SA22727] Red Hat update for thunderbird
[SA22709] OpenWBEM Unspecified Privilege Escalation Vulnerability
[SA22703] Quick.Cms.Lite "sLanguage" Cookie Local File Inclusion
[SA22692] Mandriva update for wireshark
[SA22768] Mandriva update for librpm4
[SA22761] Red Hat update for ruby
[SA22745] Ubuntu update for librpm4
[SA22740] RPM Buffer Overflow Vulnerability
[SA22726] Slackware update for screen
[SA22715] If-CMS "rns" Cross-Site Scripting Vulnerability
[SA22707] Gentoo update for screen
[SA22697] Hyper NIKKI System Cross-Site Scripting Vulnerability
[SA22696] Mandriva update for pam_ldap
[SA22694] Debian update for pam_ldap
[SA22700] OWFS owserver Path Type Denial Of Service
[SA22749] Mandriva update for libx11
[SA22742] OpenBase SQL "openexec" Privilege Escalation Vulnerability
[SA22736] FreeBSD "ffs_mountfs()" Integer Overflow Vulnerability
[SA22712] Debian update for thttpd
[SA22767] Fedora Core "zlib_inflate()" Denial of Service Vulnerability
[SA22746] Fedora Core ISO9660 Local Denial of Service
[SA22714] Sun Solaris UFS File System Denial Of Service
[SA22702] Linux Kernel ISO9660 Local Denial of Service

Other:


Cross Platform:
[SA22772] cwRsync OpenSSL Vulnerabilities and OpenSSH Weakness
[SA22757] iPrimal Forums Multiple Vulnerabilities
[SA22748] iWare Professional SimpleChat "msg" PHP Code Execution
[SA22735] Soholaunch Pro "_SESSION[docroot_path]" File Inclusion
[SA22722] Mozilla Firefox and SeaMonkey Multiple Vulnerabilities
[SA22721] Cyberfolio "av" File Inclusion Vulnerabilities
[SA22710] phpDynaSite "racine" File Inclusion Vulnerabilities
[SA22708] SazCart "cart.php" File Inclusion Vulnerability
[SA22695] OpenEMR "srcdir" Parameter File Inclusion Vulnerabilities
[SA22770] Mozilla Thunderbird Multiple Vulnerabilities
[SA22729] Creasito "finame" Parameter Authentication Bypass
[SA22720] FunkBoard "name" Script Insertion Vulnerability
[SA22719] All In One Control Panel (AIOCP) Multiple Vulnerabilities
[SA22706] Webdrivers Simple Forum "id" SQL Injection Vulnerability
[SA22704] PHP Classifieds "user_id" SQL Injection Vulnerability
[SA22698] Article Script "category" SQL Injection Vulnerability
[SA22691] HP System Management Homepage PHP Multiple Vulnerabilities
[SA22689] Slackware update for bind
[SA22760] phpComasy "username" and "password" Cross-Site Scripting
[SA22733] Sun Java System Multiple Products RSA Signature Forgery
[SA22701] iG Shop "id" and URL Cross-Site Scripting Vulnerabilities
[SA22690] Yazd Discussion Forum Two Security Bypass Issues
[SA22773] copssh Privilege Separation Monitor Weakness
[SA22771] OpenSSH Privilege Separation Monitor Weakness

=======================================================================5) Vulnerabilities Content Listing

Windows:--

[SA22687] Microsoft XMLHTTP ActiveX Control Code Execution
Vulnerability

Critical:    Extremely critical
Where:       From remote
Impact:      System access
Released:    2006-11-04

A vulnerability has been discovered in Microsoft XML Core Services,
which can be exploited by malicious people to compromise a users
system.

Full Advisory:
http://secunia.com/advisories/22687/ 

 --

[SA22718] Essentia Web Server GET/HEAD Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-11-07

CorryL has discovered a vulnerability in Essentia Web Server, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22718/ 

 --

[SA22751] Omni-NFS NFS Server Buffer Overflow

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2006-11-07

Evgeny Legerov has discovered a vulnerability in Omni-NFS Server, which
can be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22751/ 

 --

[SA22755] War FTP Daemon CWD Denial Of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2006-11-08

Joxean Koret has discovered a vulnerability in War FTP Daemon, which
can be exploited by malicious users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/22755/ 

 --

[SA22739] Easy Chat Server Information Disclosure Security Issue

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-11-07

Greg Linares has discovered a security issue in Easy Chat Server, which
can be exploited by malicious people to gain knowledge of sensitive
information.

Full Advisory:
http://secunia.com/advisories/22739/ 

 --

[SA22717] XM Easy Personal FTP Server NLST Denial Of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2006-11-06

boecke has discovered a vulnerability in XM Easy Personal FTP Server,
which can be exploited by malicious users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/22717/ 


UNIX/Linux:--

[SA22769] GreenBeast CMS File Upload And Logon Bypass

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, System access
Released:    2006-11-09

skulmatic has reported two vulnerabilities in GreenBeast CMS, which
potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/22769/ 

 --

[SA22764] Gentoo update for nvidia-drivers

Critical:    Highly critical
Where:       From remote
Impact:      Privilege escalation, DoS, System access
Released:    2006-11-08

Gentoo has issued an update for nvidia-drivers. This fixes a
vulnerability, which can be exploited by malicious, local users to gain
escalated privileges and potentially by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/22764/ 

 --

[SA22763] Red Hat update for seamonkey

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, DoS, System access
Released:    2006-11-09

Red Hat has issued an update for seamonkey. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, conduct cross-site scripting attacks,
and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22763/ 

 --

[SA22756] Advanced Guestbook "include_path" Parameter File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-11-07

BrokeN-ProXy has discovered a vulnerability in Advanced Guestbook,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22756/ 

 --

[SA22753] Red Hat update for PHP

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-11-07

Red Hat has issued an update for PHP. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22753/ 

 --

[SA22752] Mandriva update for imlib2

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-11-08

Mandriva has issued an update for imlib2. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise an application using
the library.

Full Advisory:
http://secunia.com/advisories/22752/ 

 --

[SA22744] Ubuntu update for imlib2

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-11-06

Ubuntu has issued an update for imlib2. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise an application using
the library.

Full Advisory:
http://secunia.com/advisories/22744/ 

 --

[SA22737] Red Hat update for firefox

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, DoS, System access
Released:    2006-11-09

Red Hat has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, conduct cross-site scripting attacks,
and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22737/ 

 --

[SA22732] imlib2 Multiple Image File Processing Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-11-06

Some vulnerabilities have been reported in imlib2, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
potentially compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/22732/ 

 --

[SA22730] Ubuntu update for nvidia-glx

Critical:    Highly critical
Where:       From remote
Impact:      Privilege escalation, DoS, System access
Released:    2006-11-06

Ubuntu has issued an updated for nvidia-glx. This fixes a
vulnerability, which can be exploited by malicious, local users to gain
escalated privileges and potentially by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/22730/ 

 --

[SA22713] Debian update for php4

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2006-11-08

Debian has issued an update for php4. This fixes some vulnerabilities,
which can be exploited by malicious people to bypass certain security
restrictions, cause a DoS (Denial of Service), and compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/22713/ 

 --

[SA22693] Mandriva update for php

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-11-03

Mandriva has issued an update for php. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22693/ 

 --

[SA22688] Ubuntu update for PHP

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-11-03

Ubuntu has issued an update for PHP. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22688/ 

 --

[SA22762] Mandriva update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS
Released:    2006-11-07

Mandriva has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22762/ 

 --

[SA22750] OpenLDAP BIND Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-11-07

Evgeny Legerov has reported a vulnerability in OpenLDAP, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22750/ 

 --

[SA22738] Gentoo update for qt

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-11-06

Gentoo has issued an update for qt. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of Service)
and potentially compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/22738/ 

 --

[SA22731] Linux Kernel Fragmented IPv6 Packet Filtering Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-11-07

Some vulnerabilities have been reported in the Linux Kernel, which can
be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/22731/ 

 --

[SA22727] Red Hat update for thunderbird

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, DoS, System access
Released:    2006-11-09

Red Hat has issued an update for thunderbird. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, conduct cross-site scripting attacks,
and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22727/ 

 --

[SA22709] OpenWBEM Unspecified Privilege Escalation Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Privilege escalation
Released:    2006-11-06

A vulnerability has been reported in OpenWBEM, which can be exploited
by malicious users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/22709/ 

 --

[SA22703] Quick.Cms.Lite "sLanguage" Cookie Local File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-11-08

Kacper has discovered a vulnerability in Quick.Cms.Lite, which can be
exploited by malicious people to disclose potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/22703/ 

 --

[SA22692] Mandriva update for wireshark

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-11-03

Mandriva has issued an update for wireshark. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22692/ 

 --

[SA22768] Mandriva update for librpm4

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-11-08

Mandriva has issued an update for librpm4. This fixes a vulnerability
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22768/ 

 --

[SA22761] Red Hat update for ruby

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2006-11-09

Red Hat has issued an update for ruby. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/22761/ 

 --

[SA22745] Ubuntu update for librpm4

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-11-06

Ubuntu has issued an update for librpm4. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22745/ 

 --

[SA22740] RPM Buffer Overflow Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-11-06

A vulnerability has been reported in RPM, which can be exploited by
malicious people to cause a DoS (Denial of Service) or potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22740/ 

 --

[SA22726] Slackware update for screen

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-11-06

Slackware has issued an update for screen. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22726/ 

 --

[SA22715] If-CMS "rns" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-11-06

Benjamin Moss=C3=A9 and Laurent Gaffi=C3=A9 have discovered a vulnerability in
If-CMS, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22715/ 

 --

[SA22707] Gentoo update for screen

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-11-06

Gentoo has issued an update for screen. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22707/ 

 --

[SA22697] Hyper NIKKI System Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-11-06

A vulnerability has been reported in Hyper NIKKI System, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22697/ 

 --

[SA22696] Mandriva update for pam_ldap

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-11-08

Mandriva has issued an update for pam_ldap. This fixes a security
issue, which can be exploited by malicious people to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/22696/ 

 --

[SA22694] Debian update for pam_ldap

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-11-03

Debian has issued an update for pam_ldap. This fixes a security issue,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/22694/ 

 --

[SA22700] OWFS owserver Path Type Denial Of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2006-11-07

A vulnerability has been reported in OWFS's owserver module, which can
be exploited by malicious users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22700/ 

 --

[SA22749] Mandriva update for libx11

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2006-11-08

Mandriva has issued an update for libx11. This fixes a vulnerability,
which can be exploited by malicious, local users to disclose
potentially sensitive information.

Full Advisory:
http://secunia.com/advisories/22749/ 

 --

[SA22742] OpenBase SQL "openexec" Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-11-08

Kevin Finisterre has reported two vulnerabilities in OpenBase SQL,
which can be exploited by malicious, local users to perform actions
with escalated privileges.

Full Advisory:
http://secunia.com/advisories/22742/ 

 --

[SA22736] FreeBSD "ffs_mountfs()" Integer Overflow Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation, DoS
Released:    2006-11-06

LMH has reported a vulnerability in FreeBSD, which can be exploited by
malicious, local users to cause a DoS (Denial of Service) or gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/22736/ 

 --

[SA22712] Debian update for thttpd

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-11-06

Debian has issued an update for thttpd. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/22712/ 

 --

[SA22767] Fedora Core "zlib_inflate()" Denial of Service Vulnerability

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-11-08

LMH has reported a vulnerability in Fedora Core, which can be exploited
by malicious, local users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22767/ 

 --

[SA22746] Fedora Core ISO9660 Local Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-11-06

A vulnerability has been reported in Fedora Core, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/22746/ 

 --

[SA22714] Sun Solaris UFS File System Denial Of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-11-06

LMH has reported a vulnerability in Solaris, which can be exploited by
malicious, local users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22714/ 

 --

[SA22702] Linux Kernel ISO9660 Local Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-11-06

LMH has reported a vulnerability in the Linux Kernel, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/22702/ 


Other:


Cross Platform:--

[SA22772] cwRsync OpenSSL Vulnerabilities and OpenSSH Weakness

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-11-08

Some vulnerabilities and a weakness have been reported in cwRsync,
which can be exploited by malicious people to bypass certain security
restrictions, cause a DoS (Denial of Service), or compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/22772/ 

 --

[SA22757] iPrimal Forums Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, System access
Released:    2006-11-07

Some vulnerabilities have been discovered in iPrimal Forums, which can
be exploited by malicious people to bypass certain security
restrictions or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22757/ 

 --

[SA22748] iWare Professional SimpleChat "msg" PHP Code Execution

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-11-07

nuffsaid has discovered a vulnerability in iWare Professional, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22748/ 

 --

[SA22735] Soholaunch Pro "_SESSION[docroot_path]" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-11-08

Dedi Dwianto has reported a vulnerability in Soholaunch Pro, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22735/ 

 --

[SA22722] Mozilla Firefox and SeaMonkey Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, DoS, System access
Released:    2006-11-08

Some vulnerabilities have been reported in Mozilla Firefox and Mozilla
SeaMonkey, which can be exploited by malicious people to bypass certain
security restrictions, conduct cross-site scripting attacks, and
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22722/ 

 --

[SA22721] Cyberfolio "av" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-11-06

Dedi Dwianto has reported some vulnerabilities in Cyberfolio, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22721/ 

 --

[SA22710] phpDynaSite "racine" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-11-06

Dr.Pantagon has reported some vulnerabilities in phpDynaSite, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22710/ 

 --

[SA22708] SazCart "cart.php" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-11-06

IbnuSina has reported a vulnerability in SazCart, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22708/ 

 --

[SA22695] OpenEMR "srcdir" Parameter File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-11-07

Dedi Dwianto has discovered several vulnerabilities in OpenEMR, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22695/ 

 --

[SA22770] Mozilla Thunderbird Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, DoS, System access
Released:    2006-11-08

Some vulnerabilities have been reported in Mozilla Thunderbird, which
can be exploited by malicious people to bypass certain security
restrictions, conduct cross-site scripting attacks, and potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22770/ 

 --

[SA22729] Creasito "finame" Parameter Authentication Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-11-06

SlimTim10 has reported some vulnerabilities in Creasito E-Commerce
Content Manager, which can be exploited by malicious people to bypass
certain security restriction.

Full Advisory:
http://secunia.com/advisories/22729/ 

 --

[SA22720] FunkBoard "name" Script Insertion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-11-06

A vulnerability has been reported in FunkBoard, which can be exploited
by malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/22720/ 

 --

[SA22719] All In One Control Panel (AIOCP) Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2006-11-07

Laurent Gaffi=C3=A9 and Benjamin Moss=C3=A9 have discovered several
vulnerabilities in All In One Control Panel (AIOCP), which can be
exploited by malicious people to conduct SQL injection attacks or
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22719/ 

 --

[SA22706] Webdrivers Simple Forum "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-11-06

Bl0od3r has discovered a vulnerability in Webdrivers Simple Forum,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/22706/ 

 --

[SA22704] PHP Classifieds "user_id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-11-08

ajann has discovered a vulnerability in PHP Classifieds, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/22704/ 

 --

[SA22698] Article Script "category" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-11-06

Liz0ziM has reported a vulnerability in Article Script, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/22698/ 

 --

[SA22691] HP System Management Homepage PHP Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, DoS, System access
Released:    2006-11-03

HP has acknowledged some vulnerabilities in HP System Management
Homepage, which can be exploited by malicious people to conduct
cross-site scripting attacks, bypass certain security restrictions, and
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22691/ 

 --

[SA22689] Slackware update for bind

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS
Released:    2006-11-07

Slackware has issued an update for bind. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22689/ 

 --

[SA22760] phpComasy "username" and "password" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-11-08

David Vieira-Kurz has discovered two vulnerabilities in phpComasy,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/22760/ 

 --

[SA22733] Sun Java System Multiple Products RSA Signature Forgery

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-11-06

Sun has acknowledged a vulnerability in various Sun Java System
products, which can be exploited by malicious people to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/22733/ 

 --

[SA22701] iG Shop "id" and URL Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-11-06

SnipEr.X has reported some vulnerabilities in iG Shop, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22701/ 

 --

[SA22690] Yazd Discussion Forum Two Security Bypass Issues

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information
Released:    2006-11-03

Two security issues have been reported in Yazd Discussion Forum
Software, which potentially can be exploited by malicious users to gain
sensitive information and bypass security functionality.

Full Advisory:
http://secunia.com/advisories/22690/ 

 --

[SA22773] copssh Privilege Separation Monitor Weakness

Critical:    Not critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-11-08

A weakness has been reported in copssh, which can be exploited by
malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/22773/ 

 --

[SA22771] OpenSSH Privilege Separation Monitor Weakness

Critical:    Not critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-11-08

A weakness has been reported in OpenSSH, which can be exploited by
malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/22771/ 



=======================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/ 

Subscribe:
http://secunia.com/secunia_weekly_summary/ 

Contact details:
Web=09: http://secunia.com/ 
E-mail=09: support@secunia.com 
Tel=09: +45 70 20 51 44
Fax=09: +45 70 20 51 45


--1457021584-1289351498-1163142314=:2511
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn 
 
--1457021584-1289351498-1163142314=:2511--

Site design & layout copyright © 1986-2014 CodeGods