AOH :: ISNQ4353.HTM

Secunia Weekly Summary - Issue: 2007-30




Secunia Weekly Summary - Issue: 2007-30
Secunia Weekly Summary - Issue: 2007-30



=======================================================================
                  The Secunia Weekly Advisory Summary                  
                        2007-07-19 - 2007-07-26                        

                       This week: 75 advisories                        

=======================================================================Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

=======================================================================1) Word From Secunia:

BETA test the new Secunia Personal Software Inspector!

The Secunia PSI detects installed software on your computer and
categorises it as either Insecure, End-of-Life, or Up-To-Date.
Effectively enabling you to focus your attention on software
installations where more secure versions are available from the
vendors.

Download the free PSI BETA from the Secunia website:
https://psi.secunia.com/

=======================================================================2) This Week in Brief:

A vulnerability in the LinkedIn Toolbar for Internet Explorer 
was discovered this week, which could be used by a malicious person to
compromise a user's system. LinkedIn, the popular business-oriented
social networking site, is often used by prospective employers to
assess the work experience and industry networks of applicants.

Successful exploitation requires that the user be tricked into visiting
a malicious website. The vulnerability is due to an error within the
ActiveX control when handling the "Search()" method.

Since working exploit code is publicly available, Secunia has tagged
this vulnerability as "Extremely critical". LinkedIn has yet to issue
a patch to the vulnerability. In the meantime, users are urged to set
the kill-bit for the affected ActiveX control.

For more information, please refer to:
http://secunia.com/advisories/26181/ 

 --

Two vulnerabilities in several Panda products were reported this week.
The first, a buffer overflow caused by a boundary error in the parsing
of .EXE files, could be exploited by a malicious person to compromise
a vulnerable system. It can be exploited to cause the buffer overflow
by scanning a specially crafted .EXE file.

This vulnerability is reported in Panda Antivirus products, including
the Panda Antivirus Enterprise Suite.

For more information on this vulnerability, please refer to:
http://secunia.com/advisories/26171/ 

The second vulnerability is reported in Panda AdminSecure, and is
caused by an integer overflow in the Panda AdminSecure agent. This
can be exploited to cause a heap-based buffer overflow via a
specially crafted packet sent to default port 19226/TCP or
19227/TCP.

For more information on this vulnerability, please refer to:
http://secunia.com/advisories/26157/ 

Patches are available for both vulnerabilities. Users are advised to
update as soon as possible.

 --

Several vulnerabilities in various CA products were also reported
this week.

The first vulnerability is a buffer overflow in the CA Message
Queuing Server when processing packets. This can be exploited by a 
malicious person to cause a stack-based buffer overflow by sending
a specially crafted packet to default port 3104/TCP. Successful
exploitation allows the attacker to gain access to the vulnerable
system.

For more information, and a complete list of the affected software,
please refer to:
http://secunia.com/advisories/26190/ 

Denial of service vulnerabilities were also reported in a variety
of CA products due to the way that they process CHM and RAR files.
An input validation error when processing CHM files can be
exploited to cause an infinite loop, while an unspecified error
when processing a specially crafted RAR file can be exploited to
cause the program to hang.

For more information, and a complete list of the affected
software, please refer to:
http://secunia.com/advisories/26155/ 

And finally, a vulnerable ActiveX control with several insecure
methods may allow loading arbitrary DLL files, and calling the
exported functions with controlled parameters. Successful
exploitation requires that a user is tricked into visiting a
malicious website.

The vulnerabilities are in an ActiveX control included in the
eTrust Instrusion Detection 3.x product. For more information,
please refer to:
http://secunia.com/advisories/26134/ 

All vulnerabilities are currently patched. Users are advised to
update their software as soon as possible.

 --

VIRUS ALERTS:

During the past week Secunia collected 174 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

=======================================================================3) This Weeks Top Ten Most Read Advisories:

1.  [SA26176] Mozilla SeaMonkey Multiple Vulnerabilities
2.  [SA26197] Windows RSH daemon Packet Processing Buffer Overflow
              Vulnerability
3.  [SA26137] McAfee VirusScan Command Line for Linux ZIP Decompression
              Vulnerability
4.  [SA26210] Avaya CMS / IR Solaris rcp Command Line Shell Command
              Injection
5.  [SA26134] CA eTrust Intrusion Detection CallCode ActiveX Control
              Insecure Methods
6.  [SA26187] Sun Java System Application Server JSP Source Code
              Disclosure
7.  [SA26155] CA Products CHM and RAR File Processing Denial of Service
              Vulnerabilities
8.  [SA26190] CA Message Queuing Server Buffer Overflow Vulnerability
9.  [SA26161] Cisco Multiple Products Wireless ARP Requests Denial of
              Service
10. [SA26199] Novell GroupWise Mobile Server Multiple Vulnerabilities

=======================================================================4) Vulnerabilities Summary Listing

Windows:
[SA26181] LinkedIn Internet Explorer Toolbar IEContextMenu ActiveX
Control Code Execution
[SA26213] Clever Internet ActiveX Suite clWebDav ActiveX Control
Insecure Method
[SA26201] Microsoft Windows URI Handling Command Execution
Vulnerability
[SA26178] Norman Antivirus Products Multiple File Parsing
Vulnerabilities
[SA26199] Novell GroupWise Mobile Server Multiple Vulnerabilities
[SA26187] Sun Java System Application Server JSP Source Code
Disclosure
[SA26173] Dora Emlak Script Multiple Vulnerabilities
[SA26172] WebSpell "site" File Inclusion Vulnerability
[SA26169] ImageRacer "SearchWord" SQL Injection
[SA26167] SecurityReporter "name" Directory Traversal
[SA26154] Ipswitch Instant Messaging Server Denial of Service
[SA26153] Property Pro "vir_login.asp" SQL Injection Vulnerabilities
[SA26222] BakBone NetVault Report Manager Buffer Overflow
Vulnerabilities
[SA26190] CA Message Queuing Server Buffer Overflow Vulnerability
[SA26189] Borland InterBase "create" Request Buffer Overflow
Vulnerability
[SA26157] Panda AdminSecure Agent Buffer Overflow Vulnerability
[SA26182] W1L3D4 Philboard "searchterms" Cross-Site Scripting
[SA26174] Asp cvmatik Cross-Site Scripting Vulnerability
[SA26141] TeamSpeak Denial of Service Vulnerability
[SA26197] Windows RSH daemon Packet Processing Buffer Overflow
Vulnerability

UNIX/Linux:
[SA26228] Gentoo update for mit-krb5
[SA26223] Mandriva update for tcpdump
[SA26216] SUSE update for MozillaFirefox
[SA26211] SGI Advanced Linux Environment Multiple Updates
[SA26205] Slackware update for seamonkey
[SA26204] Slackware update for thunderbird
[SA26179] rPath update for firefox and thunderbird
[SA26177] Mandriva update for ImageMagick
[SA26168] rPath update for tcpdump
[SA26166] HP Oracle for OpenView Multiple Vulnerabilities
[SA26159] Debian update for iceape
[SA26151] Debian update for iceweasel
[SA26149] Slackware update for firefox
[SA26227] Mandriva update for bind
[SA26221] Cisco Products Java Secure Socket Extension SSL/TLS Request
Denial of Service
[SA26209] Kolab Server ClamAV RAR Archive Processing Denial of Service
Vulnerability
[SA26207] Gentoo update for mplayer
[SA26195] Red Hat update for bind
[SA26184] fsplib Multiple Vulnerabilities
[SA26164] Debian update for clamav
[SA26160] Sun Solaris BIND Predictable DNS Query IDs Vulnerability
[SA26158] rPath update for lighttpd
[SA26148] Ubuntu update for bind
[SA26147] RSBAC User Management Authentication Bypass Vulnerability
[SA26203] Avaya Products file "file_printf()" Integer Underflow
Vulnerability
[SA26229] Gentoo festival Privilege Escalation
[SA26220] Sun Solaris lbxproxy Privilege Escalation Vulnerability
[SA26208] NVClock "set_default_speeds()" Insecure Temporary Files
[SA26200] Gentoo update for nvclock
[SA26210] Avaya CMS / IR Solaris rcp Command Line Shell Command
Injection

Other:
[SA26161] Cisco Multiple Products Wireless ARP Requests Denial of
Service
[SA26192] Aruba Mobility Controller Cross-Site Scripting

Cross Platform:
[SA26176] Mozilla SeaMonkey Multiple Vulnerabilities
[SA26175] epesi framework Gallery File Upload Vulnerability
[SA26171] Panda Antivirus EXE File Parsing Buffer Overflow
Vulnerability
[SA26143] Citrix Access Gateway Multiple Vulnerabilities
[SA26215] Gentoo update for gimp
[SA26194] Entertainment Media Sharing "pagename" Local File Inclusion
[SA26185] Kerio MailServer Attachment Filter Unspecified Vulnerability
[SA26183] IBM WebSphere Application Server Unspecified Vulnerability
[SA26170] BlogSite Professional "news_id" SQL Injection
[SA26165] JBlog Security Bypass and Cross-Site Scripting
[SA26156] phpMyForum editpost.php SQL Injection
[SA26155] CA Products CHM and RAR File Processing Denial of Service
Vulnerabilities
[SA26152] BIND Predictable DNS Query IDs Vulnerability
[SA26146] Itaka "/screenshot" URL Security Bypass
[SA26206] FORMfields AdMan login.php Cross-Site Scripting
[SA26196] Vikingboard Two Vulnerabilities and Debug Information
Weakness
[SA26186] iFoto "dir" Directory Traversal
[SA26150] DokuWiki "spell_utf8test()" Cross-Site Scripting
[SA26144] dirLIST "folder" Directory Traversal and Security Bypass
[SA26142] VHCS Session Fixation Vulnerability
[SA26140] Tor Multiple Weaknesses and Vulnerability

=======================================================================5) Vulnerabilities Content Listing

Windows:--

[SA26181] LinkedIn Internet Explorer Toolbar IEContextMenu ActiveX
Control Code Execution

Critical:    Extremely critical
Where:       From remote
Impact:      System access
Released:    2007-07-24

Jared DeMott and Justin Seitz have discovered a vulnerability in
LinkedIn Internet Explorer Toolbar, which can be exploited by malicious
people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26181/ 

 --

[SA26213] Clever Internet ActiveX Suite clWebDav ActiveX Control
Insecure Method

Critical:    Highly critical
Where:       From remote
Impact:      Manipulation of data, System access
Released:    2007-07-26

shinnai has discovered a vulnerability in Clever Internet ActiveX
Suite, which can be exploited by malicious people to overwrite
arbitrary files or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26213/ 

 --

[SA26201] Microsoft Windows URI Handling Command Execution
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-26

A vulnerability has been discovered in Microsoft Windows, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26201/ 

 --

[SA26178] Norman Antivirus Products Multiple File Parsing
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2007-07-24

Sergio Alvarez has reported some vulnerabilities in Norman Antivirus
products, which can be exploited by malware to bypass certain scanning
functionality and by malicious people to cause a DoS (Denial of
Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26178/ 

 --

[SA26199] Novell GroupWise Mobile Server Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of system information,
Exposure of sensitive information, DoS
Released:    2007-07-25

Novell has acknowledged some vulnerabilities in Novell GroupWise Mobile
Server, which can be exploited by malicious people to gain knowledge of
sensitive information, conduct cross-site scripting attacks, manipulate
certain data, or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/26199/ 

 --

[SA26187] Sun Java System Application Server JSP Source Code
Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-07-25

A vulnerability has been reported in Sun Java System Application
Server, which can be exploited by malicious people to disclose certain
sensitive information.

Full Advisory:
http://secunia.com/advisories/26187/ 

 --

[SA26173] Dora Emlak Script Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2007-07-23

GeFORC3 has discovered some vulnerabilities in Dora Emlak Script, which
can be exploited by malicious people to conduct cross-site scripting and
SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/26173/ 

 --

[SA26172] WebSpell "site" File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-07-24

A vulnerability has been discovered in WebSpell, which can be exploited
by malicious people to potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26172/ 

 --

[SA26169] ImageRacer "SearchWord" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-24

Aria-Security Team have reported a vulnerability in ImageRacer, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/26169/ 

 --

[SA26167] SecurityReporter "name" Directory Traversal

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-07-24

Oliver Karow has reported a vulnerability in SecurityReporter, which
can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/26167/ 

 --

[SA26154] Ipswitch Instant Messaging Server Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-07-24

A vulnerability has been reported in Ipswitch Instant Messaging Server,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/26154/ 

 --

[SA26153] Property Pro "vir_login.asp" SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-23

The-0utl4w has reported some vulnerabilities in Property Pro, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/26153/ 

 --

[SA26222] BakBone NetVault Report Manager Buffer Overflow
Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2007-07-26

Two vulnerabilities have been reported in BakBone NetVault Report
Manager, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/26222/ 

 --

[SA26190] CA Message Queuing Server Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-07-25

IBM ISS X-Force has reported a vulnerability in CA Message Queuing
(CAM/CAFT), which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/26190/ 

 --

[SA26189] Borland InterBase "create" Request Buffer Overflow
Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2007-07-25

TippingPoint has reported a vulnerability in Borland InterBase, which
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26189/ 

 --

[SA26157] Panda AdminSecure Agent Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-07-25

A vulnerability has been reported in Panda AdminSecure, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26157/ 

 --

[SA26182] W1L3D4 Philboard "searchterms" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-25

GeFORC3 has reported a vulnerability in W1L3D4 Philboard, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/26182/ 

 --

[SA26174] Asp cvmatik Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-23

GeFORC3 has discovered a vulnerability in Asp cvmatik, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/26174/ 

 --

[SA26141] TeamSpeak Denial of Service Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-07-24

Yag Kohha has reported a vulnerability in TeamSpeak, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/26141/ 

 --

[SA26197] Windows RSH daemon Packet Processing Buffer Overflow
Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      System access
Released:    2007-07-25

Joey Mengele has discovered a vulnerability in Windows RSH daemon,
which can be exploited by malicious users to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/26197/ 


UNIX/Linux:--

[SA26228] Gentoo update for mit-krb5

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-07-26

Gentoo has issued an update for mit-krb5. This fixes some
vulnerabilities, which can be exploited by malicious users and
malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26228/ 

 --

[SA26223] Mandriva update for tcpdump

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-26

Mandriva has issued an update for tcpdump. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/26223/ 

 --

[SA26216] SUSE update for MozillaFirefox

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Spoofing, Exposure of sensitive
information, DoS, System access
Released:    2007-07-26

SUSE has issued an update for MozillaFirefox. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing and cross-site scripting attacks, disclose sensitive
information and compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26216/ 

 --

[SA26211] SGI Advanced Linux Environment Multiple Updates

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Spoofing, Exposure of sensitive
information, DoS, System access
Released:    2007-07-25

SGI has issued multiple updates for SGI Advanced Linux Environment.
These fix some vulnerabilities, which can be exploited by malicious,
local users to cause a DoS (Denial of Service), and by malicious people
to disclose potentially sensitive information, conduct spoofing and
cross-site scripting attack, cause a DoS, and potentially compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/26211/ 

 --

[SA26205] Slackware update for seamonkey

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-07-25

Slackware has issued an update for seamonkey. This fixes some
vulnerabilities, which can potentially be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26205/ 

 --

[SA26204] Slackware update for thunderbird

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-07-25

Slackware has issued an update for thunderbird. This fixes some
vulnerabilities, which can potentially be exploited to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/26204/ 

 --

[SA26179] rPath update for firefox and thunderbird

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Spoofing, Exposure of sensitive
information, DoS, System access
Released:    2007-07-23

rPath has issued an update for firefox and thunderbird. This fixes some
vulnerabilities, which can be exploited by malicious people to disclose
potentially sensitive information, conduct cross-site scripting and
spoofing attacks, and potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26179/ 

 --

[SA26177] Mandriva update for ImageMagick

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-07-23

Mandriva has issued an update for ImageMagick. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26177/ 

 --

[SA26168] rPath update for tcpdump

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-23

rPath has issued an update for tcpdump. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/26168/ 

 --

[SA26166] HP Oracle for OpenView Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Unknown, Security Bypass, Manipulation of data, DoS,
System access
Released:    2007-07-24

HP has acknowledged some vulnerabilities in HP OfO (Oracle for
Openview). Some of these have unknown impacts, while others can be
exploited to bypass certain security restrictions and conduct SQL
injection attacks, cause a DoS (Denial of Service), and potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26166/ 

 --

[SA26159] Debian update for iceape

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Spoofing, Exposure of sensitive
information, DoS, System access
Released:    2007-07-24

Debian has issued an update for iceape. This fixes some
vulnerabilities, which can be exploited by malicious people to disclose
potentially sensitive information, conduct spoofing and cross-site
scripting attacks, and potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26159/ 

 --

[SA26151] Debian update for iceweasel

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Spoofing, Exposure of sensitive
information, DoS, System access
Released:    2007-07-24

Debian has issued an update for iceweasel. This fixes some
vulnerabilities, which can be exploited by malicious people to disclose
potentially sensitive information, conduct spoofing and cross-site
scripting attacks, and potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26151/ 

 --

[SA26149] Slackware update for firefox

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Spoofing, Exposure of sensitive
information, DoS, System access
Released:    2007-07-20

Slackware has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing and cross-site scripting attacks, disclose sensitive
information, and potentially to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26149/ 

 --

[SA26227] Mandriva update for bind

Critical:    Moderately critical
Where:       From remote
Impact:      Spoofing
Released:    2007-07-26

Mandriva has issued an update for bind. This fixes a vulnerability,
which can be exploited by malicious people to poison the DNS cache.

Full Advisory:
http://secunia.com/advisories/26227/ 

 --

[SA26221] Cisco Products Java Secure Socket Extension SSL/TLS Request
Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-07-26

Cisco has acknowledged a vulnerability in some products, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/26221/ 

 --

[SA26209] Kolab Server ClamAV RAR Archive Processing Denial of Service
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-07-25

A vulnerability has been reported in Kolab Server, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/26209/ 

 --

[SA26207] Gentoo update for mplayer

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-07-25

Gentoo has issued an update for mplayer. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26207/ 

 --

[SA26195] Red Hat update for bind

Critical:    Moderately critical
Where:       From remote
Impact:      Spoofing
Released:    2007-07-25

Red Hat has issued an update for bind. This fixes a vulnerability,
which can be exploited by malicious people to poison the DNS cache.

Full Advisory:
http://secunia.com/advisories/26195/ 

 --

[SA26184] fsplib Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-07-24

Some vulnerabilities in have been reported fsplib, which potentially
can be exploited by malicious people to compromise an application using
the library.

Full Advisory:
http://secunia.com/advisories/26184/ 

 --

[SA26164] Debian update for clamav

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-07-24

Debian has issued an update for clamav. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/26164/ 

 --

[SA26160] Sun Solaris BIND Predictable DNS Query IDs Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Spoofing
Released:    2007-07-26

Sun has acknowledged a vulnerability in BIND for Sun Solaris, which can
be exploited by malicious people to poison the DNS cache.

Full Advisory:
http://secunia.com/advisories/26160/ 

 --

[SA26158] rPath update for lighttpd

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS
Released:    2007-07-20

rPath has issued an update for lighttpd. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions or to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/26158/ 

 --

[SA26148] Ubuntu update for bind

Critical:    Moderately critical
Where:       From remote
Impact:      Spoofing
Released:    2007-07-26

Ubuntu has issued an update for bind. This fixes a vulnerability, which
can be exploited by malicious people to poison the DNS cache.

Full Advisory:
http://secunia.com/advisories/26148/ 

 --

[SA26147] RSBAC User Management Authentication Bypass Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-07-23

A vulnerability has been reported in RSBAC, which can be exploited by
malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/26147/ 

 --

[SA26203] Avaya Products file "file_printf()" Integer Underflow
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-07-25

Avaya has acknowledged a vulnerability in various Avaya products, which
potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/26203/ 

 --

[SA26229] Gentoo festival Privilege Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-26

Gentoo has acknowledged a vulnerability in the festival package, which
can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/26229/ 

 --

[SA26220] Sun Solaris lbxproxy Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Exposure of system information, Exposure of sensitive
information, Privilege escalation
Released:    2007-07-26

A vulnerability has been reported in Sun Solaris, which can be
exploited by malicious, local users to perform certain actions with
escalated privileges.

Full Advisory:
http://secunia.com/advisories/26220/ 

 --

[SA26208] NVClock "set_default_speeds()" Insecure Temporary Files

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-25

Tavis Ormandy has reported a vulnerability in NVClock, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/26208/ 

 --

[SA26200] Gentoo update for nvclock

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-25

Gentoo has issued an update for nvclock. This fixes a security issue,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/26200/ 

 --

[SA26210] Avaya CMS / IR Solaris rcp Command Line Shell Command
Injection

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-25

Avaya has acknowledged a weakness in Avaya CMS / IR, which can be
exploited by malicious, local users to perform certain actions with
escalated privileges.

Full Advisory:
http://secunia.com/advisories/26210/ 


Other:--

[SA26161] Cisco Multiple Products Wireless ARP Requests Denial of
Service

Critical:    Moderately critical
Where:       From local network
Impact:      DoS
Released:    2007-07-25

Some vulnerabilities have been reported in multiple Cisco products,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/26161/ 

 --

[SA26192] Aruba Mobility Controller Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-25

A vulnerability has been reported in Aruba Mobility Controller, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/26192/ 


Cross Platform:--

[SA26176] Mozilla SeaMonkey Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-07-25

Some vulnerabilities have been reported in SeaMonkey, which can
potentially be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/26176/ 

 --

[SA26175] epesi framework Gallery File Upload Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-25

A vulnerability has been reported in the epesi framework, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/26175/ 

 --

[SA26171] Panda Antivirus EXE File Parsing Buffer Overflow
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-23

Sergio Alvarez has reported a vulnerability in Panda Antivirus, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/26171/ 

 --

[SA26143] Citrix Access Gateway Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of sensitive information,
System access
Released:    2007-07-20

Some vulnerabilities and a security issue have been reported in Citrix
Access Gateway, which can be exploited by malicious people to disclose
sensitive information, conduct cross-site request forgery attacks, or
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/26143/ 

 --

[SA26215] Gentoo update for gimp

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-07-26

Gentoo has issued an update for gimp. This fixes some vulnerabilities,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/26215/ 

 --

[SA26194] Entertainment Media Sharing "pagename" Local File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-07-25

Kw3rLn has reported a vulnerability in Entertainment Media Sharing,
which can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/26194/ 

 --

[SA26185] Kerio MailServer Attachment Filter Unspecified Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown
Released:    2007-07-24

A vulnerability with an unknown impact has been reported in Kerio
MailServer.

Full Advisory:
http://secunia.com/advisories/26185/ 

 --

[SA26183] IBM WebSphere Application Server Unspecified Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown
Released:    2007-07-24

A vulnerability with an unknown impact has been reported in IBM
WebSphere Application Server.

Full Advisory:
http://secunia.com/advisories/26183/ 

 --

[SA26170] BlogSite Professional "news_id" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-23

t0pP8uZz & xprog have reported a vulnerability in BlogSite
Professional, which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/26170/ 

 --

[SA26165] JBlog Security Bypass and Cross-Site Scripting

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting
Released:    2007-07-23

S4mi has discovered some vulnerabilities in JBlog, which can be
exploited by malicious people to conduct cross-site scripting attacks
and to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/26165/ 

 --

[SA26156] phpMyForum editpost.php SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-23

A vulnerability has been reported in phpMyForum, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/26156/ 

 --

[SA26155] CA Products CHM and RAR File Processing Denial of Service
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-07-25

Two vulnerabilities have been reported in various CA products, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/26155/ 

 --

[SA26152] BIND Predictable DNS Query IDs Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Spoofing
Released:    2007-07-24

Amit Klein has reported a vulnerability in BIND, which can be exploited
by malicious people to poison the DNS cache.

Full Advisory:
http://secunia.com/advisories/26152/ 

 --

[SA26146] Itaka "/screenshot" URL Security Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information
Released:    2007-07-20

A vulnerability has been discovered in Itaka, which can be exploited by
malicious people to bypass certain security restrictions and disclose
sensitive information.

Full Advisory:
http://secunia.com/advisories/26146/ 

 --

[SA26206] FORMfields AdMan login.php Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-25

r0t has reported a vulnerability in AdMan, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/26206/ 

 --

[SA26196] Vikingboard Two Vulnerabilities and Debug Information
Weakness

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-25

Lostmon has discovered a weakness and two vulnerabilities in
Vikingboard, which can be exploited by malicious users to disclose
system information and conduct script-insertion attacks, and malicious
people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/26196/ 

 --

[SA26186] iFoto "dir" Directory Traversal

Critical:    Less critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-07-26

Lostmon has discovered a vulnerability in iFoto, which can be exploited
by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/26186/ 

 --

[SA26150] DokuWiki "spell_utf8test()" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-20

Cyrill Brunschwiler has reported a vulnerability in DokuWiki, which can
be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/26150/ 

 --

[SA26144] dirLIST "folder" Directory Traversal and Security Bypass

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information
Released:    2007-07-20

Some vulnerabilities have been discovered in dirLIST, which can be
exploited by malicious people to disclose sensitive information and to
bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/26144/ 

 --

[SA26142] VHCS Session Fixation Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Hijacking
Released:    2007-07-23

David Vieira-Kurz has reported a vulnerability in VHCS, which can be
exploited by malicious people to conduct session fixation attacks.

Full Advisory:
http://secunia.com/advisories/26142/ 

 --

[SA26140] Tor Multiple Weaknesses and Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information, DoS
Released:    2007-07-24

Some weaknesses and a vulnerability have been reported in Tor, which
potentially can be exploited by malicious people to bypass certain
security restrictions, disclose certain sensitive information, or
potentially cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/26140/ 



=======================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/ 

Subscribe:
http://secunia.com/secunia_weekly_summary/ 

Contact details:
Web	: http://secunia.com/ 
E-mail	: support@secunia.com 
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_____________________________________________________
Attend Black Hat USA, July 28-August 2 in Las Vegas, 
the world's premier technical event for ICT security 
experts. Featuring 30 hands-on training courses and 
90 Briefings presentations with lots of new content 
and new tools. Network with 4,000 delegates from 
70 nations.   Visit product displays by 30 top
sponsors in a relaxed setting. Rates increase on 
June 1 so register today. http://www.blackhat.com 

Site design & layout copyright © 1986-2014 CodeGods