AOH :: ISNQ3707.HTM

Secunia Weekly Summary - Issue: 2007-9




Secunia Weekly Summary - Issue: 2007-9
Secunia Weekly Summary - Issue: 2007-9



=======================================================================
                  The Secunia Weekly Advisory Summary                  
                        2007-02-22 - 2007-03-01                        

                       This week: 63 advisories                        

=======================================================================Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

=======================================================================1) Word From Secunia:

Should you be interested in a career within Secunia, the current job
openings are available right now:

Security Sales Engineer:
http://corporate.secunia.com/about_secunia/54/ 

German Key Account Manager:
http://corporate.secunia.com/about_secunia/55/ 

International Account Manager - Enterprise Sales:
http://corporate.secunia.com/about_secunia/52/ 

International Sales Manager - IT Security Partner:
http://corporate.secunia.com/about_secunia/51/ 

Danish: Disassembling og Reversing
http://secunia.com/Disassembling_og_Reversing/ 

=======================================================================2) This Week in Brief:

Mozilla released a security update for Firefox this week, which fixed
32 vulnerabilities, with various impacts. Some vulnerabilities can be
exploited to execute arbitrary code on a user's system, while others
can be used to perform spoofing and cross-site scripting attacks, 
disclose sensitive information, or bypass security restrictions.

This security update fixes the password disclosure vulnerability from
November of last year, as well as the "locations.hostname"
vulnerability from the middle of February 2007.

Firefox users are encouraged to update their browsers to either version
2.0.0.2 or 1.5.0.10.

Use the Secunia Software Inspector to help you determine if your system
is up-to-date:
http://secunia.com/software_inspector/ 

For more information, refer to:
http://secunia.com/advisories/24205/ 

 --
 
A spoofing vulnerability in Internet Explorer (IE) 7 discovered by
Secunia Research was disclosed this week. The vulnerability is due to
an error in IE7's handling of "onunload" events. It can be exploited by
a malicious website to spoof the address bar if, for example, the user
types a new address manually into the address bar, which is considered
best practice.

Spoofing attacks can be used for phishing activities, as well as
installation vectors for malware and spyware.

The vulnerability is currently unpatched. Secunia recommends that IE
users close browsers after visiting untrusted web sites.

For more information, refer to:
http://secunia.com/secunia_research/2007-1/advisory/ 
http://secunia.com/advisories/23014/ 

 --

The vulnerabilities reported in Mozilla Firefox also apply to Mozilla
Seamonkey. They are reported to be patched in the upcoming version
1.0.8. For more information, refer to:
http://secunia.com/advisories/24238/ 

Mozilla Thunderbird is also susceptible to vulnerabilities numbers 2
and 9, which can be exploited to execute arbitrary code on a target
system. These vulnerabilities remain unpatched in Thunderbird, and
will reportedly be fixed in version 1.5.0.10. For more information,
refer to:
http://secunia.com/advisories/24252/ 

Netscape is also susceptible to vulnerabilities 1, 2, 6, and 7 of the
listed Firefox vulnerabilities. These vulnerabilities are reported in
version 8.1.2. For more information, refer to:
http://secunia.com/advisories/24264/ 

 --

VIRUS ALERTS:

During the past week Secunia collected 138 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

=======================================================================3) This Weeks Top Ten Most Read Advisories:

1.  [SA24205] Mozilla Firefox Multiple Vulnerabilities
2.  [SA23014] Internet Explorer 7 "onunload" Event Spoofing
              Vulnerability
3.  [SA24156] Internet Explorer Multiple Vulnerabilities
4.  [SA24252] Mozilla Thunderbird Multiple Vulnerabilities
5.  [SA24283] IBM DB2 Authorisation Bypass Vulnerability
6.  [SA24227] web-app.org WebAPP Unspecified Vulnerabilities
7.  [SA24270] Macrovision FLEXnet Connect Update Service Agent Buffer
              Overflow
8.  [SA24269] ZephyrSoft Toolbox ABC SQL Injection Vulnerabilities
9.  [SA24274] Novell ZENworks Desktop Management Image Upload Security
              Bypass
10. [SA18787] Internet Explorer Drag-and-Drop Vulnerability

=======================================================================4) Vulnerabilities Summary Listing

Windows:
[SA24350] Citrix Presentation Server Client Unspecified Code Execution
[SA24330] XM Easy Personal FTP Server Format String Vulnerability
[SA24289] Netscape Multiple Vulnerabilities
[SA24285] InstallShield InstallFromTheWeb Multiple Buffer Overflows
[SA24314] Internet Explorer Charset Inheritance Cross-Site Scripting
Vulnerability
[SA24309] CA eTrust Intrusion Detection Key Length Value Denial of
Service

UNIX/Linux:
[SA24343] Mandriva update for firefox
[SA24342] SGI update for seamonkey
[SA24339] Gentoo update for mplayer
[SA24333] Ubuntu update for firefox
[SA24328] Fedora update for firefox
[SA24327] Fedora update for seamonkey
[SA24320] Fedora update for firefox
[SA24293] rPath update for firefox
[SA24290] Red Hat update for firefox
[SA24287] Red Hat update for seamonkey
[SA24277] Fedora update for nspr and nss
[SA24335] Gentoo update for chmlib
[SA24326] Fedora update for php
[SA24322] rPath update for php, php-mysql, and php-pgsql
[SA24319] SUSE update for clamav
[SA24313] Gentoo update for nexuiz
[SA24303] SUSE update for kernel
[SA24298] Nexuiz Denial of Service and Command Injection
[SA24297] Gentoo Multiple Vulnerabilities in ufo2000
[SA24296] SQLiteManager "SQLiteManager_currentTheme" Directory
Traversal
[SA24295] Red Hat Stronghold update for php
[SA24288] Avaya Products Linux Kernel Denial of Service
[SA24284] SGI Advanced Linux Environment 3 Multiple Updates
[SA24282] Slackware update for php
[SA24338] Mandriva update for snort
[SA24315] Solaris PostgreSQL Denial of Service and Information
Disclosure
[SA24337] McAfee Virex VShieldExclude.txt Privilege Escalation
[SA24324] Debian Apache Privilege Escalation
[SA24317] Fedora update for gnucash
[SA24345] Dropbear hostkey Mismatch Warning Weakness
[SA24300] Red Hat update for kernel

Other:
[SA24344] Cisco Products NAM SNMP Spoofing Vulnerability
[SA24348] Cisco Products MPLS Denial of Service Vulnerability

Cross Platform:
[SA24336] MPlayer RTSP Stream Buffer Overflow Vulnerability
[SA24305] FCRing "s_fuss" File Inclusion Vulnerability
[SA24291] CS-Gallery "album" File Inclusion Vulnerability
[SA24280] STWC-Counter "stwc_counter_verzeichniss" File Inclusion
Vulnerabilities
[SA24275] ZPanel "body" and "page" File Inclusion Vulnerabilities
[SA24323] SHOUTcast Logfile Script Insertion Vulnerability
[SA24311] Stanford Conference And Research Forum "generaloptions.php"
Security Bypass
[SA24310] PhotoStand Cross-Site Scripting and Script Insertion
[SA24301] xt:Commerce "template" Local File Inclusion
[SA24299] Pagesetter "id" File Disclosure Vulnerability
[SA24294] Pickle "file" Directory Traversal Vulnerability
[SA24279] Shop Kit Plus "changetheme" Local File Inclusion
[SA24278] LoveCMS Multiple Vulnerabilities
[SA24276] Hitachi JP1/Cm2/Network Node Manager Unspecified
Vulnerabilities
[SA24325] MTCMS File Upload Vulnerability
[SA24316] WordPress Multiple Cross-Site Scripting Vulnerabilities
[SA24312] Opera Charset Inheritance Cross-Site Scripting Vulnerability
[SA24308] PhpWebGallery register.php Cross-Site Scripting
Vulnerabilities
[SA24306] WordPress templates.php Cross-Site Scripting Vulnerability
[SA24292] Simple one-file gallery "f" Cross-Site Scripting
Vulnerability
[SA24273] J-Web Pics Navigator "dir" Directory Traversal
[SA24283] IBM DB2 Authorisation Bypass Vulnerability
[SA24274] Novell ZENworks Desktop Management Image Upload Security
Bypass
[SA24321] Webmin / Usermin chooser.cgi Script Insertion Vulnerability

=======================================================================5) Vulnerabilities Content Listing

Windows:--

[SA24350] Citrix Presentation Server Client Unspecified Code Execution

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-03-01

A vulnerability has been reported in Citrix Presentation Server Client,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/24350/ 

 --

[SA24330] XM Easy Personal FTP Server Format String Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-03-01

Umesh Wanve has discovered a vulnerability in XM Easy Personal FTP
Server, which can be exploited by malicious people to cause a DoS
(Denial of Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24330/ 

 --

[SA24289] Netscape Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Exposure of
sensitive information, System access
Released:    2007-02-27

Multiple vulnerabilities have been reported in Netscape, which can be
exploited by malicious people to bypass certain security restrictions,
gain knowledge of sensitive information, conduct cross-site scripting
attacks, or potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24289/ 

 --

[SA24285] InstallShield InstallFromTheWeb Multiple Buffer Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-23

Will Dormann has reported some vulnerabilities in InstallShield
InstallFromTheWeb, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24285/ 

 --

[SA24314] Internet Explorer Charset Inheritance Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-02-26

Stefan Esser has discovered a vulnerability in Internet Explorer, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/24314/ 

 --

[SA24309] CA eTrust Intrusion Detection Key Length Value Denial of
Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-02-28

A vulnerability has been reported in CA eTrust Intrusion Detection,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/24309/ 


UNIX/Linux:--

[SA24343] Mandriva update for firefox

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Spoofing, Exposure
of sensitive information, System access
Released:    2007-03-01

Mandriva has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, conduct cross-site scripting and
spoofing attacks, gain knowledge of sensitive information, and
potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24343/ 

 --

[SA24342] SGI update for seamonkey

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Spoofing, Exposure
of sensitive information, System access
Released:    2007-03-01

SGI has issued an update for SGI Advanced Linux Environment. This fixes
some vulnerabilities, which can be exploited by malicious people to
bypass certain security restrictions, conduct cross-site scripting and
spoofing attacks, gain knowledge of sensitive information, and
potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24342/ 

 --

[SA24339] Gentoo update for mplayer

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-03-01

Gentoo has issued an update for mplayer. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/24339/ 

 --

[SA24333] Ubuntu update for firefox

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Spoofing, Exposure
of sensitive information, System access
Released:    2007-03-01

Ubuntu has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, conduct cross-site scripting and
spoofing attacks, gain knowledge of sensitive information, and
potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24333/ 

 --

[SA24328] Fedora update for firefox

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Spoofing, Exposure
of sensitive information, System access
Released:    2007-02-27

Fedora has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, conduct cross-site scripting and
spoofing attacks, gain knowledge of sensitive information, and
potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24328/ 

 --

[SA24327] Fedora update for seamonkey

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Spoofing, Exposure
of sensitive information, System access
Released:    2007-02-27

Fedora has issued an update for seamonkey. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, conduct cross-site scripting and
spoofing attacks, gain knowledge of sensitive information, and
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24327/ 

 --

[SA24320] Fedora update for firefox

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Spoofing, Exposure
of sensitive information, System access
Released:    2007-02-28

Fedora has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, conduct cross-site scripting and
spoofing attacks, gain knowledge of sensitive information, and
potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24320/ 

 --

[SA24293] rPath update for firefox

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Spoofing, Exposure
of sensitive information, System access
Released:    2007-02-27

rPath has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, conduct cross-site scripting and
spoofing attacks, gain knowledge of sensitive information, and
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24293/ 

 --

[SA24290] Red Hat update for firefox

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Spoofing, Exposure
of sensitive information, System access
Released:    2007-02-26

Red Hat has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, conduct cross-site scripting and
spoofing attacks, gain knowledge of sensitive information, and
potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24290/ 

 --

[SA24287] Red Hat update for seamonkey

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Spoofing, Exposure
of sensitive information, System access
Released:    2007-02-26

Red Hat has issued an update for seamonkey. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, conduct cross-site scripting and
spoofing attacks, gain knowledge of sensitive information, and
potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24287/ 

 --

[SA24277] Fedora update for nspr and nss

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-27

Fedora has issued an update for nspr and nss. This fixes two
vulnerabilities, which potentially can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24277/ 

 --

[SA24335] Gentoo update for chmlib

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-02-28

Gentoo has issued an update for chmlib. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/24335/ 

 --

[SA24326] Fedora update for php

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information, DoS,
System access
Released:    2007-02-27

Fedora has issued an update for php. This fixes some vulnerabilities
and a weakness, which can be exploited by malicious people to disclose
potentially sensitive information, bypass certain security
restrictions, cause a DoS (Denial of Service), and potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24326/ 

 --

[SA24322] rPath update for php, php-mysql, and php-pgsql

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information, DoS,
System access
Released:    2007-02-28

rPath has issued an update for php, php-mysql, and php-pgsql. This
fixes some vulnerabilities and a weakness, which can be exploited by
malicious people to disclose potentially sensitive information, bypass
certain security restrictions, cause a DoS (Denial of Service) and
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24322/ 

 --

[SA24319] SUSE update for clamav

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-02-27

SUSE has issued an update for clamav. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/24319/ 

 --

[SA24313] Gentoo update for nexuiz

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS
Released:    2007-02-27

Gentoo has issued an update for nexuiz. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions and cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24313/ 

 --

[SA24303] SUSE update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, Privilege escalation, DoS
Released:    2007-02-27

SUSE has issued an update for the kernel. This fixes some
vulnerabilities, where one has unknown impacts and others can be
exploited by malicious, local users to gain escalated privileges and
cause a DoS (Denial of Service), or by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/24303/ 

 --

[SA24298] Nexuiz Denial of Service and Command Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data, DoS
Released:    2007-02-27

Some vulnerabilities have been reported in Nexuiz, which can be
exploited by malicious people to bypass certain security restrictions
and cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24298/ 

 --

[SA24297] Gentoo Multiple Vulnerabilities in ufo2000

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, DoS, System access
Released:    2007-02-26

Gentoo has acknowledged some vulnerabilities in UFO2000, which can be
exploited by malicious people to conduct SQL injection attacks, cause a
DoS (Denial of Service), or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24297/ 

 --

[SA24296] SQLiteManager "SQLiteManager_currentTheme" Directory
Traversal

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-02-28

Simon Bonnard has discovered a vulnerability in SQLiteManager, which
can be exploited by malicious people to disclose sensitive data.

Full Advisory:
http://secunia.com/advisories/24296/ 

 --

[SA24295] Red Hat Stronghold update for php

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information, DoS,
System access
Released:    2007-02-26

Red Hat has issued an update for php. This fixes some vulnerabilities
and a weakness, which can be exploited by malicious people to disclose
potentially sensitive information, bypass certain security
restrictions, cause a DoS (Denial of Service),  and potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24295/ 

 --

[SA24288] Avaya Products Linux Kernel Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-02-27

Avaya has acknowledged a vulnerability in various Avaya products, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/24288/ 

 --

[SA24284] SGI Advanced Linux Environment 3 Multiple Updates

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Exposure of
sensitive information, DoS, System access
Released:    2007-02-23

SGI has issued an update for SGI Advanced Linux Environment. This fixes
some vulnerabilities, a security issue, and a weakness, which can be
exploited by malicious people to disclose potentially sensitive
information, bypass certain security restrictions, conduct cross-site
scripting attacks, cause a DoS (Denial of Service), or compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/24284/ 

 --

[SA24282] Slackware update for php

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information, DoS,
System access
Released:    2007-02-23

Slackware has issued an update for php. This fixes some vulnerabilities
and a weakness, which can be exploited by malicious people to disclose
potentially sensitive information, bypass certain security
restrictions, cause a DoS (Denial of Service) and potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24282/ 

 --

[SA24338] Mandriva update for snort

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-03-01

Mandriva has issued an update for snort. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24338/ 

 --

[SA24315] Solaris PostgreSQL Denial of Service and Information
Disclosure

Critical:    Less critical
Where:       From local network
Impact:      Exposure of sensitive information, DoS
Released:    2007-02-28

Sun has acknowledged two vulnerabilities in PostgreSQL, which can be
exploited by malicious users to gain knowledge of potentially sensitive
information and cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24315/ 

 --

[SA24337] McAfee Virex VShieldExclude.txt Privilege Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-02-28

Kevin Finisterre has reported a vulnerability in McAfee Virex, which
can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/24337/ 

 --

[SA24324] Debian Apache Privilege Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-02-27

A vulnerability has been discovered in Debian, which can be exploited
by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/24324/ 

 --

[SA24317] Fedora update for gnucash

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-02-28

Fedora has issued an update for gnucash. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/24317/ 

 --

[SA24345] Dropbear hostkey Mismatch Warning Weakness

Critical:    Not critical
Where:       From remote
Impact:      Hijacking, Security Bypass
Released:    2007-03-01

A weakness has been reported in Dropbear, which can be exploited by
malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/24345/ 

 --

[SA24300] Red Hat update for kernel

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-02-27

Red Hat has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24300/ 


Other:--

[SA24344] Cisco Products NAM SNMP Spoofing Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-03-01

A vulnerability has been reported in various Cisco products, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24344/ 

 --

[SA24348] Cisco Products MPLS Denial of Service Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-03-01

A vulnerability has been reported in various Cisco products, which can
be exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/24348/ 


Cross Platform:--

[SA24336] MPlayer RTSP Stream Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-03-01

A vulnerability has been reported in MPlayer, which potentially can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/24336/ 

 --

[SA24305] FCRing "s_fuss" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-03-01

kezzap66345 has reported a vulnerability in FCRing, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24305/ 

 --

[SA24291] CS-Gallery "album" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-26

burncycle has discovered a vulnerability in CS-Gallery, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24291/ 

 --

[SA24280] STWC-Counter "stwc_counter_verzeichniss" File Inclusion
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-27

burncycle has discovered some vulnerabilities in STWC-Counter, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/24280/ 

 --

[SA24275] ZPanel "body" and "page" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-02-23

Hamid Ebadi has discovered two vulnerabilities in ZPanel, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24275/ 

 --

[SA24323] SHOUTcast Logfile Script Insertion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-02-28

Muschiemann has discovered a vulnerability in SHOUTcast, which can be
exploited by malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/24323/ 

 --

[SA24311] Stanford Conference And Research Forum "generaloptions.php"
Security Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-02-27

A vulnerability has been reported in Stanford Conference And Research
Forum, which can be exploited by malicious people to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/24311/ 

 --

[SA24310] PhotoStand Cross-Site Scripting and Script Insertion

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-02-26

Simon Bonnard has discovered some vulnerabilities in PhotoStand, which
can be exploited by malicious people to conduct cross-site scripting
and script insertion attacks.

Full Advisory:
http://secunia.com/advisories/24310/ 

 --

[SA24301] xt:Commerce "template" Local File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-02-26

laurent gaffi has reported a vulnerability in xt:Commerce, which can
be exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/24301/ 

 --

[SA24299] Pagesetter "id" File Disclosure Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-02-27

A vulnerability has been reported in Pagesetter, which can be exploited
by malicious people to disclose potentially sensitive information.

Full Advisory:
http://secunia.com/advisories/24299/ 

 --

[SA24294] Pickle "file" Directory Traversal Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-02-26

laurent gaffi has reported a vulnerability in Pickle, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/24294/ 

 --

[SA24279] Shop Kit Plus "changetheme" Local File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-02-26

laurent gaffi has reported a vulnerability in Shop Kit Plus, which can
be exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/24279/ 

 --

[SA24278] LoveCMS Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
sensitive information
Released:    2007-02-23

Laurent Gaffi has discovered some vulnerabilities in LoveCMS, which
can be exploited by malicious people to disclose sensitive information,
and conduct SQL injection and cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/24278/ 

 --

[SA24276] Hitachi JP1/Cm2/Network Node Manager Unspecified
Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2007-02-23

Some vulnerabilities have been reported in Hitachi JP1/Cm2/Network Node
Manager, which can be exploited by malicious people to cause a DoS
(Denial of Service) or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/24276/ 

 --

[SA24325] MTCMS File Upload Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2007-02-27

laurent gaffi has discovered a vulnerability in MTCMS, which
potentially can be exploited by malicious users to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/24325/ 

 --

[SA24316] WordPress Multiple Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-02-27

Some vulnerabilities have been discovered in WordPress, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/24316/ 

 --

[SA24312] Opera Charset Inheritance Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-02-26

Stefan Esser has discovered a vulnerability in Opera, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/24312/ 

 --

[SA24308] PhpWebGallery register.php Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-02-26

Simon Bonnard has discovered some vulnerabilities in PhpWebGallery,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/24308/ 

 --

[SA24306] WordPress templates.php Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-02-26

PsychoGun has discovered a vulnerability in WordPress, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/24306/ 

 --

[SA24292] Simple one-file gallery "f" Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-02-26

Laurent Gaffi has discovered a vulnerability in Simple one-file
gallery, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/24292/ 

 --

[SA24273] J-Web Pics Navigator "dir" Directory Traversal

Critical:    Less critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-02-23

sn0oPy has discovered a vulnerability in J-Web Pics Navigator, which
can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/24273/ 

 --

[SA24283] IBM DB2 Authorisation Bypass Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass
Released:    2007-02-23

A vulnerability has been reported in IBM DB2, which can be exploited by
malicious users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/24283/ 

 --

[SA24274] Novell ZENworks Desktop Management Image Upload Security
Bypass

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass
Released:    2007-02-23

A vulnerability has been reported in Novell ZENworks Desktop
Management, which can be exploited by malicious users to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/24274/ 

 --

[SA24321] Webmin / Usermin chooser.cgi Script Insertion Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Cross Site Scripting
Released:    2007-03-01

A vulnerability has been reported in Webmin and Usermin, which can be
exploited by malicious, local users to conduct script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/24321/ 



=======================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/ 

Subscribe:
http://secunia.com/secunia_weekly_summary/ 

Contact details:
Web	: http://secunia.com/ 
E-mail	: support@secunia.com 
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_________________________________________
Visit the InfoSec News Security Bookstore
http://www.shopinfosecnews.org 

Site design & layout copyright © 1986-2014 CodeGods