AOH :: ISNQ4295.HTM

Secunia Weekly Summary - Issue: 2007-28




Secunia Weekly Summary - Issue: 2007-28
Secunia Weekly Summary - Issue: 2007-28



=======================================================================
                  The Secunia Weekly Advisory Summary                  
                        2007-07-05 - 2007-07-12                        

                       This week: 85 advisories                        

=======================================================================Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

=======================================================================1) Word From Secunia:

Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.

The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/ 

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.

=======================================================================2) This Week in Brief:

This week was a veritable vulnerability festival, with quite a number
of corporate applications reporting vulnerabilities, Microsoft Tuesday,
taking place, and popular client software also releasing security
updates.

Five advisories for various SAP products were published this week,
covering a variety of impacts, from system access to cross-site
scripting . The affected products and accompanying advisories are:

EnjoySAP Two ActiveX Controls Buffer Overflows
http://secunia.com/advisories/25959/ 

SAP DB Web Server Buffer Overflow
http://secunia.com/advisories/25954/ 

SAP Message Server "group" Buffer Overflow Vulnerability
http://secunia.com/advisories/25966/ 

SAP Web Application Server Internet Communication Manager Denial of
Service
http://secunia.com/advisories/25964/ 

SAP Internet Graphics Service "PARAMS" Cross-Site Scripting
http://secunia.com/advisories/25950/ 

 --

Microsoft Tuesday yielded five Microsoft advisories, with several
Microsoft Excel and Publisher vulnerabilities that can allow remote
code execution. The releases also included an update for the Vista
Firewall, and another for the .NET framework. The affected products
and accompanying advisories are:

Microsoft Excel Multiple Code Execution Vulnerabilities
http://secunia.com/advisories/25995/ 

Microsoft Office Publisher Arbitrary Pointer Dereference Vulnerability
http://secunia.com/advisories/25988/ 

Microsoft .NET Framework Multiple Vulnerabilities
http://secunia.com/advisories/26003/ 

Microsoft Windows Active Directory Two Vulnerabilities
http://secunia.com/advisories/26002/ 

Windows Vista Firewall Teredo Blocking Rule Security Bypass
http://secunia.com/advisories/26001/ 

Secunia has constructed the Secunia Software Inspector, which you can
use to check if your system is vulnerable:
http://secunia.com/software_inspector/ 

 --

Version 2.6.22 of the Linux Kernel was also released this week,
solving several remote and local Denial of Service vulnerabilities.
For more information, refer to:
http://secunia.com/advisories/25955/ 

 --

A highly critical buffer overflow vulnerability in Sun Java Web Start
was disclosed this week, which may allow an attacker to compromise a
vulnerable system. Sun has released a solution for this issue, which
affects JRE and JDK 1.6 and 1.5. For more information, refer to:
http://secunia.com/advisories/25981/ 

Secunia has constructed the Secunia Software Inspector, which you can
use to check if your system is vulnerable:
http://secunia.com/software_inspector/ 

 --

Five advisories from various Symantec products were also published this
week, including a highly critical one due to incorrect handling of CAB
and RAR archive files. The affected products and accompanying 
advisories are:

Symantec Products CAB and RAR Archive Handling Vulnerabilities
http://secunia.com/advisories/26053/ 

Symantec Backup Exec RPC Interface Heap Overflow Vulnerability
http://secunia.com/advisories/26032/ 

Symantec Products SYMTDI.SYS IOCTL Handler Privilege Escalation
http://secunia.com/advisories/26042/ 

Symantec Products Real-Time Scanner Notification Window Privilege
Escalation
http://secunia.com/advisories/26054/ 

Symantec Products Internet Email Auto-Protect Stack Overflow
http://secunia.com/advisories/26036/ 

 --

Some eight vulnerabilities in Apple Quicktime were resolved this week
as Apple released a security update for the media application. All
vulnerabilities could be exploited by an attacker to execute
arbitrary code on a user's system. For more information, refer to:
http://secunia.com/advisories/26034/ 

Secunia has constructed the Secunia Software Inspector, which you can
use to check if your system is vulnerable:
http://secunia.com/software_inspector/ 

 --

Adobe also released a security update for Flash this week, disclosing
and resolving two vulnerabilities that could be used to execute
arbitrary code, or to disclose key presses to a Flash applet. For
more information, refer to:
http://secunia.com/advisories/26027/ 

Secunia has constructed the Secunia Software Inspector, which you can
use to check if your system is vulnerable:
http://secunia.com/software_inspector/ 

 --

A vulnerability in Firefox has been discovered that could allow
malicious people to compromise a user's system. The vulnerability is
due to Firefox registering the "firefoxurl://" URI handler, and can
be exploited when a user visits a specially crafted website using
Internet Explorer, which in turn invokes Firefox, triggering the
vulnerability.

Mozilla is reportedly working on a fix. In the meantime, users who
have installed Firefox in Windows are advised to disable the
"firefoxurl://" handler in the meantime. For more information, 
refer to:
http://secunia.com/advisories/25984/ 

 --

VIRUS ALERTS:

During the past week Secunia collected 185 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

=======================================================================3) This Weeks Top Ten Most Read Advisories:

1.  [SA25984] Firefox "firefoxurl" URI Handler Registration
              Vulnerability
2.  [SA25966] SAP Message Server "group" Buffer Overflow
              Vulnerability
3.  [SA25897] Citrix Presentation Server Clients Content-Redirection
              Vulnerability
4.  [SA25959] EnjoySAP Two ActiveX Controls Buffer Overflow
              Vulnerabilities
5.  [SA25954] SAP DB Web Server Buffer Overflow Vulnerability
6.  [SA25950] SAP Internet Graphics Service "PARAMS" Cross-Site
              Scripting
7.  [SA25968] MDaemon Server DomainPOP malformed Messages Denial of
              Service
8.  [SA25974] eMeeting Online Dating Software "id" Multiple SQL
              Injection
9.  [SA25948] Levent Veysi Portal "id" SQL Injection
10. [SA25958] SUSE update for evolution and evolution-data-server

=======================================================================4) Vulnerabilities Summary Listing

Windows:
[SA25995] Microsoft Excel Multiple Code Execution Vulnerabilities
[SA25988] Microsoft Office Publisher Arbitrary Pointer Dereference
Vulnerability
[SA25984] Firefox "firefoxurl" URI Handler Registration Vulnerability
[SA25959] EnjoySAP Two ActiveX Controls Buffer Overflow
Vulnerabilities
[SA26020] enVivo!CMS "ID" SQL Injection Vulnerability
[SA26003] Microsoft .NET Framework Multiple Vulnerabilities
[SA25994] QuarkXPress Word Document Text-Import Font Handling Buffer
Overflow
[SA25977] Visual IRC JOIN Command Response Processing Buffer Overflow
[SA25968] MDaemon Server DomainPOP malformed Messages Denial of
Service
[SA25964] SAP Web Application Server Internet Communication Manager
Denial of Service
[SA26043] Cisco Unified Communications Manager Two Vulnerabilities
[SA26032] Symantec Backup Exec RPC Interface Heap Overflow
Vulnerability
[SA26029] McAfee ePolicy Orchestrator / ProtectionPilot Common
Management Agent Vulnerabilities
[SA26002] Microsoft Windows Active Directory Two Vulnerabilities
[SA25954] SAP DB Web Server Buffer Overflow Vulnerability
[SA25962] Chilkat Zip ActiveX Component Zip2 ActiveX Control Two
Insecure Methods
[SA26054] Symantec Products Real-Time Scanner Notification Window
Privilege Escalation
[SA26042] Symantec Products SYMTDI.SYS IOCTL Handler Privilege
Escalation
[SA25998] AVG Antivirus AVG7CORE.SYS IOCTL Handler Privilege
Escalation
[SA25982] WinPcap NPF.SYS IOCTL Handler Privilege Escalation
Vulnerability
[SA26001] Windows Vista Firewall Teredo Blocking Rule Security Bypass
[SA26036] Symantec Products Internet Email Auto-Protect Stack Overflow

UNIX/Linux:
[SA26057] Red Hat update for flash-plugin
[SA26049] SUSE update for Java / IBM Java
[SA26033] Novell Kerberos KDC Multiple Vulnerabilities
[SA26022] Ubuntu update for openoffice.org
[SA26010] Mandriva update for openoffice.org
[SA26006] Gentoo XnView XPM File Handling Buffer Overflow
[SA25992] Ubuntu update for imagemagick
[SA25980] Debian update for vlc
[SA25965] AsteriDex "callboth.php" CRLF Injection Vulnerability
[SA26044] rPath update for gimp
[SA26004] Mandriva update for wireshark
[SA25987] rPath update for tshark and wireshark
[SA25983] GameSiteScript "params" SQL Injection Vulnerability
[SA25961] SUSE update for kernel
[SA25955] Linux Kernel Multiple Denial of Service Vulnerabilities
[SA25966] SAP Message Server "group" Buffer Overflow Vulnerability
[SA26055] Red Hat update for perl-Net-DNS
[SA25989] OpenBSD update for file
[SA25958] SUSE update for evolution and evolution-data-server
[SA25956] Gentoo update for webmin and usermin
[SA25972] Hitachi TPBroker ADM Daemon Process Denial of Service
[SA25970] IBM AIX libodm ODMPATH Processing Buffer Overflow
Vulnerability
[SA25967] Debian update for gfax
[SA26037] Xfce Terminal "Open Link" Command Injection Security Issue
[SA26056] Red Hat update for xorg-x11
[SA26024] Sun Solaris rcp Command Line Shell Command Injection
[SA25963] Red Hat update for kernel

Other:
[SA26017] 3Com TippingPoint IPS Fragmented Packets Detection Bypass
[SA26013] 3Com TippingPoint IPS Extended Unicode Detection Bypass
[SA26059] Belkin Wireless G Plus Router DHCP Client Hostname Script
Insertion

Cross Platform:
[SA26053] Symantec Products CAB and RAR Archive Handling
Vulnerabilities
[SA26035] SquirrelMail G/PGP Encryption Plugin Multiple
Vulnerabilities
[SA26034] Apple QuickTime Multiple Vulnerabilities
[SA26027] Adobe Flash Player Multiple Vulnerabilities
[SA26007] FlashBB "phpbb_root_path"  File Inclusion Vulnerability
[SA25981] Sun Java Web Start JNLP File Processing Buffer Overflow
[SA26060] SurgeMail Payment Emails "amount" Format String
Vulnerability
[SA26038] ClamAV RAR Archive Processing Denial of Service
Vulnerability
[SA26031] Sun Java JRE/JDK Processing of XSLT Stylesheets in XML
Signatures Vulnerability
[SA26019] Webmatic Unspecified SQL Injection Vulnerability and Security
Bypass
[SA26016] Entertainment Media Sharing "adminLogged" Cookie
Authentication Bypass
[SA26015] Java Secure Socket Extension Denial of Service Vulnerability
[SA26009] Mail Machine Local File Inclusion Vulnerability
[SA26000] ImgSvr "template" Directory Traversal Vulnerability
[SA25997] OpenLD "id" SQL Injection Vulnerability
[SA25996] Aigaion "topic_id" SQL Injection Vulnerability
[SA25991] CodeIgniter Weakness and Directory Traversal Vulnerability
[SA25986] RPG Inferno "id" SQL Injection Vulnerability
[SA25985] Unobtrusive AJAX Star Rating Bar Multiple Vulnerabilities
[SA25976] phpTrafficA "isloggedin()" Authentication Bypass
Vulnerability
[SA25975] phpVID "cat" SQL Injection Vulnerability
[SA25974] eMeeting Online Dating Software "id" Multiple SQL Injection
[SA25969] AV Tutorial Script "id" and "userid" SQL Injection
[SA25960] FlashGameScript "user" SQL Injection Vulnerability
[SA26061] SurgeFTP Denial of Service and Script Insertion
Vulnerability
[SA26039] Cisco Unified Communications Manager and Presence Server
Security Bypass
[SA25999] Drupal Forward Module Access Restriction Bypass
[SA25990] Firefox "wyciwyg://" Handler Vulnerability
[SA25978] Drupal Print Module Access Restriction Bypass
[SA25973] Hitachi JP1/HiCommand Series Two Vulnerabilities
[SA25971] DotClear Cross-Site Request Forgery Vulnerability
[SA26023] Sun Java System Web / Application Server XSLT Processing
Vulnerability
[SA26030] Sun Java System Access Manager "message" Debug Level Password
Disclosure

=======================================================================5) Vulnerabilities Content Listing

Windows:--

[SA25995] Microsoft Excel Multiple Code Execution Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-10

Some vulnerabilities have been reported in Microsoft Excel, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25995/ 

 --

[SA25988] Microsoft Office Publisher Arbitrary Pointer Dereference
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-10

eEye Digital Security has reported a vulnerability in Microsoft Office
Publisher 2007, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25988/ 

 --

[SA25984] Firefox "firefoxurl" URI Handler Registration Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-10

A vulnerability has been discovered in Firefox, which can be exploited
by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25984/ 

 --

[SA25959] EnjoySAP Two ActiveX Controls Buffer Overflow
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-06

Mark Litchfield has reported two vulnerabilities in EnjoySAP, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25959/ 

 --

[SA26020] enVivo!CMS "ID" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-11

durito has reported a vulnerability in enVivo!CMS, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/26020/ 

 --

[SA26003] Microsoft .NET Framework Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-07-10

Some vulnerabilities have been reported in Microsoft .NET Framework,
which can be exploited by malicious people to disclose potentially
sensitive information or compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26003/ 

 --

[SA25994] QuarkXPress Word Document Text-Import Font Handling Buffer
Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-07-11

Tan Chew Keong has discovered a vulnerability in QuarkXPress, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25994/ 

 --

[SA25977] Visual IRC JOIN Command Response Processing Buffer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-07-09

Krystian Kloskowski has discovered a vulnerability in Visual IRC, which
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25977/ 

 --

[SA25968] MDaemon Server DomainPOP malformed Messages Denial of
Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-07-06

A vulnerability has been reported in MDaemon, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25968/ 

 --

[SA25964] SAP Web Application Server Internet Communication Manager
Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-07-06

Mark Litchfield has reported a vulnerability in SAP Web Application
Server, which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/25964/ 

 --

[SA26043] Cisco Unified Communications Manager Two Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2007-07-12

Some vulnerabilities have been reported in Cisco Unified Communications
Manager (CUCM), which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26043/ 

 --

[SA26032] Symantec Backup Exec RPC Interface Heap Overflow
Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2007-07-11

A vulnerability has been reported in Symantec Backup Exec, which can be
exploited by malicious people to cause a DoS (Denial of Service) and
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26032/ 

 --

[SA26029] McAfee ePolicy Orchestrator / ProtectionPilot Common
Management Agent Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-07-11

Neel Mehta has reported some vulnerabilities in McAfee ePolicy
Orchestrator and ProtectionPilot, which can be exploited by malicious
people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26029/ 

 --

[SA26002] Microsoft Windows Active Directory Two Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2007-07-10

Two vulnerabilities have been reported in Windows Active Directory,
which can be exploited by malicious users and malicious people to cause
a DoS (Denial of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26002/ 

 --

[SA25954] SAP DB Web Server Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-07-06

Mark Litchfield has reported a vulnerability in SAP DB, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25954/ 

 --

[SA25962] Chilkat Zip ActiveX Component Zip2 ActiveX Control Two
Insecure Methods

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-09

shinnai has discovered two vulnerabilities in Chilkat Zip ActiveX
Component, which can be exploited by malicious people to overwrite
arbitrary files.

Full Advisory:
http://secunia.com/advisories/25962/ 

 --

[SA26054] Symantec Products Real-Time Scanner Notification Window
Privilege Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-12

A vulnerability has been reported in some Symantec products, which can
be exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/26054/ 

 --

[SA26042] Symantec Products SYMTDI.SYS IOCTL Handler Privilege
Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-12

A vulnerability has been reported in various Symantec products, which
can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/26042/ 

 --

[SA25998] AVG Antivirus AVG7CORE.SYS IOCTL Handler Privilege
Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-12

Jonathan Lindsay has reported a vulnerability in AVG Antivirus, which
potentially can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/25998/ 

 --

[SA25982] WinPcap NPF.SYS IOCTL Handler Privilege Escalation
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-10

A vulnerability has been reported in WinPcap, which can be exploited by
malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/25982/ 

 --

[SA26001] Windows Vista Firewall Teredo Blocking Rule Security Bypass

Critical:    Not critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-07-10

A security issue has been reported in Windows Vista, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/26001/ 

 --

[SA26036] Symantec Products Internet Email Auto-Protect Stack Overflow

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-07-12

A vulnerability has been reported in some Symantec products, which can
be exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/26036/ 


UNIX/Linux:--

[SA26057] Red Hat update for flash-plugin

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-12

Red Hat has issued an update for flash-plugin. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/26057/ 

 --

[SA26049] SUSE update for Java / IBM Java

Critical:    Highly critical
Where:       From remote
Impact:      Privilege escalation, DoS, System access
Released:    2007-07-12

SUSE has issued an update for Java and IBM Java. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, cause a DoS (Denial of Service), or
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26049/ 

 --

[SA26033] Novell Kerberos KDC Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-07-12

Novell has acknowledged some vulnerabilities in Novell Kerberos KDC,
which can be exploited by malicious users and malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26033/ 

 --

[SA26022] Ubuntu update for openoffice.org

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-11

Ubuntu has issued an update for openoffice.org and
openoffice.org-amd64. This fixes a vulnerability, which potentially can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26022/ 

 --

[SA26010] Mandriva update for openoffice.org

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-11

Mandriva has issued an update for openoffice.org. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26010/ 

 --

[SA26006] Gentoo XnView XPM File Handling Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-12

Gentoo has acknowledged a vulnerability in XnView, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26006/ 

 --

[SA25992] Ubuntu update for imagemagick

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-10

Ubuntu has issued an update for imagemagick. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25992/ 

 --

[SA25980] Debian update for vlc

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-10

Debian has issued an update for vlc. This fixes some vulnerabilities,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/25980/ 

 --

[SA25965] AsteriDex "callboth.php" CRLF Injection Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-06

Carl Livitt has reported a vulnerability in AsteriDex, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25965/ 

 --

[SA26044] rPath update for gimp

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-07-12

rPath has issued an update for gimp. This fixes some vulnerabilities,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/26044/ 

 --

[SA26004] Mandriva update for wireshark

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-07-11

Mandriva has issued an update for wireshark. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/26004/ 

 --

[SA25987] rPath update for tshark and wireshark

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-07-11

rPath has issued an update for tshark and wireshark. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25987/ 

 --

[SA25983] GameSiteScript "params" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-09

Xenduer77 has reported a vulnerability in GameSiteScript, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25983/ 

 --

[SA25961] SUSE update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Brute force, DoS
Released:    2007-07-09

SUSE has issued an update for the kernel. This fixes some
vulnerabilities and a weakness, which can be exploited by malicious,
local users to cause a DoS (Denial of Service) or malicious people to
cause a DoS and bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/25961/ 

 --

[SA25955] Linux Kernel Multiple Denial of Service Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-07-09

Some vulnerabilities have been reported in the Linux Kernel, which can
be exploited by malicious, local users and malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25955/ 

 --

[SA25966] SAP Message Server "group" Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-07-06

Mark Litchfield has reported a vulnerability in SAP Message Server,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/25966/ 

 --

[SA26055] Red Hat update for perl-Net-DNS

Critical:    Less critical
Where:       From remote
Impact:      Spoofing, DoS
Released:    2007-07-12

Red Hat has issued an update for perl-Net-DNS. This can be exploited to
poison the DNS cache or to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/26055/ 

 --

[SA25989] OpenBSD update for file

Critical:    Less critical
Where:       From remote
Impact:      System access, DoS
Released:    2007-07-10

OpenBSD has issued an update for file. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/25989/ 

 --

[SA25958] SUSE update for evolution and evolution-data-server

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-07-06

SUSE has issued an update for evolution and evolution-data-server. This
fixes a vulnerability, which potentially can be exploited by malicious
people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25958/ 

 --

[SA25956] Gentoo update for webmin and usermin

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-06

Gentoo has issued an update for webmin and usermin. This fixes a
vulnerability, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25956/ 

 --

[SA25972] Hitachi TPBroker ADM Daemon Process Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-07-06

A vulnerability has been reported in Hitachi TPBroker, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25972/ 

 --

[SA25970] IBM AIX libodm ODMPATH Processing Buffer Overflow
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-10

A vulnerability has been reported in IBM AIX, which can be exploited by
malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/25970/ 

 --

[SA25967] Debian update for gfax

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-06

Debian has issued an update for gfax. This fixes a security issue,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/25967/ 

 --

[SA26037] Xfce Terminal "Open Link" Command Injection Security Issue

Critical:    Not critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-07-12

Lasse Krkkinen has reported a security issue in Xfce Terminal, which
can be exploited by malicious people to inject shell commands.

Full Advisory:
http://secunia.com/advisories/26037/ 

 --

[SA26056] Red Hat update for xorg-x11

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-12

Red Hat has issued an update for xorg-x11 and xorg-x11-xfs. This fixes
a vulnerability, which can be exploited by malicious, local users to
perform actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/26056/ 

 --

[SA26024] Sun Solaris rcp Command Line Shell Command Injection

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-11

A weakness has been reported in Sun Solaris, which can be exploited by
malicious, local users to perform certain actions with escalated
privileges.

Full Advisory:
http://secunia.com/advisories/26024/ 

 --

[SA25963] Red Hat update for kernel

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-07-10

Red Hat has issued an update for the kernel. This fixes a
vulnerability, which can be exploited by malicious, local users to
cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/25963/ 


Other:--

[SA26017] 3Com TippingPoint IPS Fragmented Packets Detection Bypass

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-07-11

A vulnerability has been reported in TippingPoint IPS, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/26017/ 

 --

[SA26013] 3Com TippingPoint IPS Extended Unicode Detection Bypass

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-07-11

A vulnerability has been reported in TippingPoint IPS, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/26013/ 

 --

[SA26059] Belkin Wireless G Plus Router DHCP Client Hostname Script
Insertion

Critical:    Not critical
Where:       From local network
Impact:      Cross Site Scripting
Released:    2007-07-12

Nico Leidecker has reported a vulnerability in the Belkin Wireless G
Plus Router, which can be exploited by malicious people to conduct
script insertion attacks.

Full Advisory:
http://secunia.com/advisories/26059/ 


Cross Platform:--

[SA26053] Symantec Products CAB and RAR Archive Handling
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-07-12

Two vulnerabilities have been reported in various Symantec products,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26053/ 

 --

[SA26035] SquirrelMail G/PGP Encryption Plugin Multiple
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-07-12

iDefense has reported some vulnerabilities in the SquirrelMail G/PGP
Encryption Plugin, which can be exploited by malicious users and
malicious people to disclose sensitive information or to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/26035/ 

 --

[SA26034] Apple QuickTime Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of sensitive information, DoS, System access
Released:    2007-07-12

Some vulnerabilities have been reported in Apple QuickTime, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26034/ 

 --

[SA26027] Adobe Flash Player Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2007-07-11

Some vulnerabilities have been reported in Adobe Flash Player, which
can be exploited by malicious people to gain knowledge of sensitive
information or compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26027/ 

 --

[SA26007] FlashBB "phpbb_root_path"  File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-12

kw3rln has reported a vulnerability in FlashBB, which can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26007/ 

 --

[SA25981] Sun Java Web Start JNLP File Processing Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-10

A vulnerability has been reported in Sun Java Web Start, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25981/ 

 --

[SA26060] SurgeMail Payment Emails "amount" Format String
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-07-12

Nico Leidecker has reported a vulnerability in SurgeMail, which can be
exploited by malicious users to potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/26060/ 

 --

[SA26038] ClamAV RAR Archive Processing Denial of Service
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-07-12

Metaeye SG has reported a vulnerability in ClamAV, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/26038/ 

 --

[SA26031] Sun Java JRE/JDK Processing of XSLT Stylesheets in XML
Signatures Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-07-11

Brad Hill has reported a vulnerability in Sun JDK and JRE, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26031/ 

 --

[SA26019] Webmatic Unspecified SQL Injection Vulnerability and Security
Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2007-07-12

A vulnerability and a security issue have been reported in Webmatic,
which can be exploited by malicious users to bypass certain security
restrictions or by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/26019/ 

 --

[SA26016] Entertainment Media Sharing "adminLogged" Cookie
Authentication Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-07-11

Kw3rLn has reported a vulnerability in Entertainment Media Sharing,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/26016/ 

 --

[SA26015] Java Secure Socket Extension Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-07-11

A vulnerability has been reported in the Java Secure Socket Extension
(JSSE), which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/26015/ 

 --

[SA26009] Mail Machine Local File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-07-12

H4 has discovered a vulnerability in Mail Machine, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/26009/ 

 --

[SA26000] ImgSvr "template" Directory Traversal Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-07-12

Tim Brown has discovered a vulnerability in ImgSvr, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/26000/ 

 --

[SA25997] OpenLD "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-10

Cody "CypherXero" Rester has discovered a vulnerability in OpenLD,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/25997/ 

 --

[SA25996] Aigaion "topic_id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-10

Cody "CypherXero" Rester has discovered a vulnerability in Aigaion,
which can be exploited by malicious people to  conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/25996/ 

 --

[SA25991] CodeIgniter Weakness and Directory Traversal Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of system information,
Exposure of sensitive information
Released:    2007-07-11

Lukasz Pilorz has reported a vulnerability and a weakness in
CodeIgniter, which can be exploited by malicious people to disclose
sensitive information and conduct cross-site scripting and header
injection attacks.

Full Advisory:
http://secunia.com/advisories/25991/ 

 --

[SA25986] RPG Inferno "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-10

t0pP8uZz and xprog have reported a vulnerability in RPG Inferno, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25986/ 

 --

[SA25985] Unobtrusive AJAX Star Rating Bar Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Manipulation of
data
Released:    2007-07-10

sullo has reported some vulnerabilities in Unobtrusive Ajax Star Rating
Bar, which can be exploited by malicious people to bypass certain
security restrictions or conduct cross-site scripting and SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/25985/ 

 --

[SA25976] phpTrafficA "isloggedin()" Authentication Bypass
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-07-09

CorryL has discovered a vulnerability in phpTrafficA, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/25976/ 

 --

[SA25975] phpVID "cat" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-09

t0pP8uZz and xprog have reported a vulnerability in phpVID, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25975/ 

 --

[SA25974] eMeeting Online Dating Software "id" Multiple SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-07-06

Some vulnerabilities have been reported in eMeeting Online Dating
Software, which can be exploited by malicious users and malicious
people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25974/ 

 --

[SA25969] AV Tutorial Script "id" and "userid" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-09

A vulnerability has been discovered in AV Tutorial Script, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25969/ 

 --

[SA25960] FlashGameScript "user" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-09

Xenduer77 has reported a vulnerability in FlashGameScript, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25960/ 

 --

[SA26061] SurgeFTP Denial of Service and Script Insertion
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, DoS
Released:    2007-07-12

Nico Leidecker has reported some vulnerabilities in SurgeFTP, which can
be exploited by malicious people to conduct script insertion attacks and
cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/26061/ 

 --

[SA26039] Cisco Unified Communications Manager and Presence Server
Security Bypass

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-07-12

Two vulnerabilities have been reported in Cisco Unified Communications
Manager (CUCM, formerly CallManager) and Cisco Unified Presence Server
(CUPS), which can be exploited by malicious users to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/26039/ 

 --

[SA25999] Drupal Forward Module Access Restriction Bypass

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-07-11

A security issue has been discovered in the Drupal Forward Module,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/25999/ 

 --

[SA25990] Firefox "wyciwyg://" Handler Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Spoofing, Exposure of sensitive information
Released:    2007-07-10

Michal Zalewski has discovered a vulnerability in Mozilla Firefox,
which can be exploited by malicious people to disclose sensitive
information and conduct spoofing attacks.

Full Advisory:
http://secunia.com/advisories/25990/ 

 --

[SA25978] Drupal Print Module Access Restriction Bypass

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-07-11

A security issue has been discovered in the Drupal Print Module, which
can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/25978/ 

 --

[SA25973] Hitachi JP1/HiCommand Series Two Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting
Released:    2007-07-06

Two vulnerabilities have been reported in Hitachi JP1/HiCommand
products, which can be exploited by malicious people to potentially
bypass certain security restrictions or to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/25973/ 

 --

[SA25971] DotClear Cross-Site Request Forgery Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-10

PsychoGun has reported a vulnerability in DotClear, which can be
exploited by malicious people to conduct cross-site request forgery
attacks.

Full Advisory:
http://secunia.com/advisories/25971/ 

 --

[SA26023] Sun Java System Web / Application Server XSLT Processing
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass, Privilege escalation
Released:    2007-07-11

A vulnerability has been reported in Sun Java System Web Server and
Application Server, which can be exploited by malicious, local users to
perform actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/26023/ 

 --

[SA26030] Sun Java System Access Manager "message" Debug Level Password
Disclosure

Critical:    Not critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2007-07-11

Sun has acknowledged a security issue in Sun Java System Access
Manager, which can be exploited by malicious, local users to gain
sensitive information.

Full Advisory:
http://secunia.com/advisories/26030/ 



=======================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/ 

Subscribe:
http://secunia.com/secunia_weekly_summary/ 

Contact details:
Web	: http://secunia.com/ 
E-mail	: support@secunia.com 
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45



_____________________________________________________
Attend Black Hat USA, July 28-August 2 in Las Vegas, 
the world's premier technical event for ICT security 
experts. Featuring 30 hands-on training courses and 
90 Briefings presentations with lots of new content 
and new tools. Network with 4,000 delegates from 
70 nations.   Visit product displays by 30 top
sponsors in a relaxed setting. Rates increase on 
June 1 so register today. http://www.blackhat.com 

Site design & layout copyright © 1986-2014 CodeGods