AOH :: ISNQ4877.HTM

Secunia Weekly Summary - Issue: 2007-48




Secunia Weekly Summary - Issue: 2007-48
Secunia Weekly Summary - Issue: 2007-48



=======================================================================
                  The Secunia Weekly Advisory Summary                  
                        2007-11-22 - 2007-11-29                        

                       This week: 55 advisories                        

=======================================================================Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

=======================================================================1) Word From Secunia:

2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published

How do you know which Secunia advisories are important to you?

The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively.

Get a free trial of the Secunia Vulnerability Intelligence Solutions:
http://corporate.secunia.com/how_to_buy/38/vi/?ref=summary_sm 

=======================================================================2) This Week in Brief:

A vulnerability in Apple QuickTime, which can be exploited by malicious
people to compromise a user's system. The extremely vulnerability, which
is unpatched, is currently being exploited and has a number of attack
vectors, including via plug-ins, and QTL file download.

The vulnerability is caused due to a boundary error when processing
RTSP replies and can be exploited to cause a stack-based buffer
overflow via a specially crafted RTSP reply containing an overly long
"Content-Type" header.

Successful exploitation allows execution of arbitrary code and requires
that the user is, for example, tricked into opening a malicious QTL file
or visiting a malicious web site.

The vulnerability is confirmed in version 7.3. Users are urged to avoid
browsing untrusted sites and, following untrusted links, and opening
untrusted QTL files.

For more information, refer to:
http://secunia.com/advisories/27755/ 

 --

Secunia Research has discovered several vulnerabilities in Symantec
Backup Exec for Windows servers. These vulnerabilities are rated as
"Less critical" by Secunia because they can only be exploited by
malicious people from the local network to cause a Denial of Service
(DoS).

A NULL-pointer dereference error in the Backup Exec Job Engine service
(bengine.exe) when handling exceptions can be exploited to crash the
service by sending a specially crafted packet to default port 5633/TCP.

Two integer overflow errors within the Backup Exec Job Engine service
can be exploited to cause the service to enter an infinite loop and
exhaust all available memory or consume large amounts of CPU resource
by sending a specially crafted packet to default port 5633/TCP.

The vulnerabilities are confirmed in Symantec Backup Exec for Windows
Servers version 11d build 11.0.7170 and also affect version 11d build
11.0.6.6235. Symantec has released hotfixes for both affected versions.

For more information, refer to:
http://secunia.com/advisories/26975/ 

Corporate users can request for a trial of the Secunia Network Software
Inspector, which you can use to check which systems in your network are
vulnerable:
http://secunia.com/network_software_inspector/ 

 --

Some vulnerabilities were reported this week in IBM Lotus Notes, which
can be exploited by malicious people to compromise a user's system.

The vulnerabilities are caused due to boundary errors within the Lotus
1-2-3 file viewer (l123sr.dll), and can be exploited to cause buffer
overflows by tricking a user into viewing a specially crafted Lotus
1-2-3 attachment with, for example, a specially crafted type SRANGE
record. Successful exploitation allows execution of arbitrary code.

The vulnerabilities reportedly affect versions 7.0 and 8.0. The vendor
has supplied patches for both affected versions.

For more information, refer to:
http://secunia.com/advisories/27835/ 

Corporate users can request for a trial of the Secunia Network Software
Inspector, which you can use to check which systems in your network are
vulnerable:
http://secunia.com/network_software_inspector/ 

 --

Mozilla has released version 2.0.0.10 of the Firefox browser. This
release fixes some vulnerabilities in Mozilla Firefox, which can be
exploited by malicious people to conduct cross-site request forgery
attacks and potentially compromise a user's system.

A race condition when setting the "window.location" property can be
exploited to generate a fake HTTP Referer header, which can be used to
conduct cross-site request forgery attacks.

Some errors within the XBL component, the "drawImage()" function, and
the "nsCSSFrameConstructor" can be exploited to cause memory corruption
and potentially allow execution of arbitrary code.

This release also fixed a security issue disclosed in early November
regarding "jar:" protocol handling.

Users are urged to upgrade to the latest version of Mozilla Firefox to
fix these vulnerabilities.

For more information, refer to:
http://secunia.com/advisories/27725/ 
http://secunia.com/advisories/27605/ 

Secunia has constructed the Secunia Personal Software Inspector, which
you can use to check if your personal system is vulnerable:
https://psi.secunia.com/

Corporate users can request for a trial of the Secunia Network Software
Inspector, which you can use to check which systems in your network are
vulnerable:
http://secunia.com/network_software_inspector/ 

 --

VIRUS ALERTS:

During the past week Secunia collected 193 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

=======================================================================3) This Weeks Top Ten Most Read Advisories:

1.  [SA27755] Apple QuickTime RTSP "Content-Type" Header Buffer
              Overflow
2.  [SA27785] Apple Mail Command Execution Vulnerability
3.  [SA27725] Mozilla Firefox Multiple Vulnerabilities
4.  [SA27777] Wireshark Multiple Denial of Service Vulnerabilities
5.  [SA27787] Debian update for samba
6.  [SA27756] SUSE Update for Multiple Packages
7.  [SA27789] Gadu-Gadu "emots.txt" Buffer Overflow Vulnerability
8.  [SA27778] MySpace Scripts Poll Creator Script Insertion
              Vulnerabilities
9.  [SA27765] DevMass Shopping Cart "kfm_base_path" File Inclusion
10. [SA27782] K+B-Bestellsystem "domain"/"tld" Command Execution
              Vulnerabilities

=======================================================================4) Vulnerabilities Summary Listing

Windows:
[SA27849] Autonomy Keyview SDK Lotus 1-2-3 File Viewer Buffer
Overflows
[SA27836] IBM Lotus Notes 5 / 6 Lotus 1-2-3 File Viewer Buffer
Overflows
[SA27835] IBM Lotus Notes Lotus 1-2-3 File Viewer Buffer Overflows
[SA27822] DWD Realty Two SQL Injection Vulnerabilities
[SA27813] NetAuctionHelp Classified Ads Two SQL Injection
Vulnerabilities
[SA27812] Dora Emlak Script Multiple SQL Injection Vulnerabilities
[SA27811] SafeNet Sentinel Protection Server/Key Server Directory
Traversal Vulnerability
[SA27803] E-Lite POS Login SQL Injection Vulnerability and User
Enumeration
[SA27798] My-Time Two SQL Injection Vulnerabilities

UNIX/Linux:
[SA27856] rPath update for cups, poppler, and tetex
[SA27855] Fedora update for firefox
[SA27845] Slackware update for firefox
[SA27804] Red Hat update for java-1.5.0-ibm
[SA27797] Red Hat update for firefox
[SA27796] Ubuntu update for firefox
[SA27817] Debian update for wireshark
[SA27806] Debian update for tk8.3
[SA27801] Debian update for tk8.4
[SA27857] Mandriva update for cpio
[SA27818] Debian update for ruby1.9
[SA27830] Samhain Random Number Generator Weakness
[SA27823] Debian update for mysql-dfsg, mysql-dfsg-5.0, and
mysql-dfsg-4.1
[SA27860] IBM Lotus Notes Client for Linux Insecure File Permissions
[SA27847] Fedora scanbuttond Insecure Temporary Files
[SA27841] Audacity Insecure Temporary Files
[SA27858] Ubuntu update for pidgin
[SA27799] Fedora update for blam

Other:
[SA27870] Avaya Products OpenSSL Vulnerabilities
[SA27869] Avaya Products PCRE Regex Parsing Multiple Vulnerabilities
[SA27862] Avaya Products PCRE Character Class Processing Vulnerability
[SA27832] Sun Solaris libTIFF Multiple Vulnerabilities
[SA27829] Cisco Unified IP Phone Extension Mobility Weakness
[SA27831] Sun Solaris Remote Procedure Call Module Denial of Service

Cross Platform:
[SA27854] Charray's CMS "ccms_library_path" File Inclusion
[SA27852] PHP_CON "webappcfg[APPPATH]" File Inclusion
[SA27800] Netscape Multiple Vulnerabilities
[SA27866] TuMusika Evolution Multiple Vulnerabilities
[SA27848] GNUMP3d Authentication Bypass Security Issue
[SA27843] wpQuiz Two SQL Injection Vulnerabilities
[SA27825] Ruby-GNOME2 "Gtk::MessageDialog.new()" Format String
Vulnerability
[SA27820] Project Alumni Multiple Vulnerabilities
[SA27816] SeaMonkey Multiple Vulnerabilities
[SA27815] Amber Script "id" Local File Inclusion Vulnerability
[SA27810] PHP-Nuke NSN Script Depository Module Information Disclosure
[SA27808] Softbiz Freelancers Cross-Site Scripting and SQL Injection
[SA27837] @Mail "func" Cross-Site Scripting Vulnerability
[SA27834] Basic Analysis and Security Engine "base_qry_main.php"
Cross-Site Scripting
[SA27828] PHPDevShell Privilege Escalation Vulnerability
[SA27826] FMDeluxe "id" Cross-Site Scripting Vulnerability
[SA27821] Liferay Portal "emailAddress" Cross-Site Scripting
[SA27814] vBTube "search" Cross-Site Scripting Vulnerability
[SA27809] PHPSlideshow "directory" Cross-Site Scripting
[SA27807] JAF CMS Two Cross-Site Scripting Vulnerabilities
[SA27833] ManageEngine EventLog Analyzer Insecure MySQL Installation
[SA27840] BEA AquaLogic Interaction Plumtree Portal Information
Disclosure

=======================================================================5) Vulnerabilities Content Listing

Windows:--

[SA27849] Autonomy Keyview SDK Lotus 1-2-3 File Viewer Buffer
Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-11-29

Some vulnerabilities have been reported in Autonomy Keyview SDK, which
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27849/ 

 --

[SA27836] IBM Lotus Notes 5 / 6 Lotus 1-2-3 File Viewer Buffer
Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-11-27

Some vulnerabilities have been reported in IBM Lotus Notes, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27836/ 

 --

[SA27835] IBM Lotus Notes Lotus 1-2-3 File Viewer Buffer Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-11-27

Some vulnerabilities have been reported in IBM Lotus Notes, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27835/ 

 --

[SA27822] DWD Realty Two SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2007-11-27

Aria-Security Team have reported two vulnerabilities in DWD Realty,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/27822/ 

 --

[SA27813] NetAuctionHelp Classified Ads Two SQL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-11-27

Aria-Security Team have reported two vulnerabilities in NetAuctionHelp
Classified Ads, which can be exploited by malicious people to conduct
SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27813/ 

 --

[SA27812] Dora Emlak Script Multiple SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-11-26

GeFORC3 has reported some vulnerabilities in Dora Emlak Script, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27812/ 

 --

[SA27811] SafeNet Sentinel Protection Server/Key Server Directory
Traversal Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-11-27

A vulnerability has been reported in SafeNet Sentinel Protection Server
and Key Server, which can be exploited by malicious people to disclose
sensitive information.

Full Advisory:
http://secunia.com/advisories/27811/ 

 --

[SA27803] E-Lite POS Login SQL Injection Vulnerability and User
Enumeration

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of system information
Released:    2007-11-26

A vulnerability and a weakness have been reported in E-Lite POS, which
can be exploited by malicious people to enumerate valid user accounts
or conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27803/ 

 --

[SA27798] My-Time Two SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2007-11-26

Aria-Security Team have reported two vulnerabilities in My-Time
(Timesheet), which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/27798/ 


UNIX/Linux:--

[SA27856] rPath update for cups, poppler, and tetex

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-11-29

rPath has issued an update for cups, poppler, and tetex. This fixes
some vulnerabilities, which can be exploited by malicious people to
cause a DoS (Denial of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27856/ 

 --

[SA27855] Fedora update for firefox

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, DoS, System access
Released:    2007-11-29

Fedora has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting and cross-site request forgery attacks or
potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27855/ 

 --

[SA27845] Slackware update for firefox

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, DoS, System access
Released:    2007-11-28

Slackware has issued an update for firefox. This fixes a security issue
and some vulnerabilities, which can be exploited by malicious people to
conduct cross-site scripting and cross-site request forgery attacks or
potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27845/ 

 --

[SA27804] Red Hat update for java-1.5.0-ibm

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data, Exposure of system
information, Exposure of sensitive information, System access
Released:    2007-11-28

Red Hat has issued an update for java-1.5.0-ibm. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, manipulate data, disclose
sensitive/system information, or potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/27804/ 

 --

[SA27797] Red Hat update for firefox

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, DoS, System access
Released:    2007-11-27

Red Hat has issued an update for firefox. This fixes a security issue
and some vulnerabilities, which can be exploited by malicious people to
conduct cross-site scripting and cross-site request forgery attacks and
potentially to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27797/ 

 --

[SA27796] Ubuntu update for firefox

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, DoS, System access
Released:    2007-11-27

Ubuntu has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting and cross-site request forgery attacks and
potentially to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27796/ 

 --

[SA27817] Debian update for wireshark

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-11-27

Debian has issued an update for wireshark. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27817/ 

 --

[SA27806] Debian update for tk8.3

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-11-28

Debian has issued an update for tk8.3. This fixes a vulnerability,
which can be exploited by malicious people to compromise an application
using the library.

Full Advisory:
http://secunia.com/advisories/27806/ 

 --

[SA27801] Debian update for tk8.4

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-11-28

Debian has issued an update for tk8.4. This fixes a vulnerability,
which can be exploited by malicious people to compromise an application
using the library.

Full Advisory:
http://secunia.com/advisories/27801/ 

 --

[SA27857] Mandriva update for cpio

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-11-29

Mandriva has issued an update for cpio. This fixes two vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27857/ 

 --

[SA27818] Debian update for ruby1.9

Critical:    Less critical
Where:       From remote
Impact:      Spoofing
Released:    2007-11-26

Debian has issued an update for ruby1.9. This fixes some security
issues, which can be exploited by malicious people to conduct spoofing
attacks.

Full Advisory:
http://secunia.com/advisories/27818/ 

 --

[SA27830] Samhain Random Number Generator Weakness

Critical:    Less critical
Where:       From local network
Impact:      Brute force, Exposure of sensitive information
Released:    2007-11-27

A weakness has been reported in Samhain, which can be exploited by
malicious people to disclose potentially sensitive information and to
perform brute force attacks.

Full Advisory:
http://secunia.com/advisories/27830/ 

 --

[SA27823] Debian update for mysql-dfsg, mysql-dfsg-5.0, and
mysql-dfsg-4.1

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass, Privilege escalation, DoS
Released:    2007-11-27

Debian has issued an update for mysql-dfsg, mysql-dfsg-5.0, and
mysql-dfsg-4.1. This fixes some security issues and vulnerabilities,
which can be exploited by malicious users to bypass certain security
restrictions, gain escalated privileges, or cause a DoS (Denial of
Service), and by malicious people to cause a DoS.

Full Advisory:
http://secunia.com/advisories/27823/ 

 --

[SA27860] IBM Lotus Notes Client for Linux Insecure File Permissions

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-11-29

Some security issues have been reported in Lotus Notes for Linux, which
can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/27860/ 

 --

[SA27847] Fedora scanbuttond Insecure Temporary Files

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-11-28

Michal Jaegermann has reported a security issue in Fedora, which can be
exploited by malicious, local users to perform certain actions with
escalated privileges.

Full Advisory:
http://secunia.com/advisories/27847/ 

 --

[SA27841] Audacity Insecure Temporary Files

Critical:    Less critical
Where:       Local system
Impact:      Manipulation of data, DoS
Released:    2007-11-28

Viktor Griph has reported a security issue in Audacity, which can be
exploited by malicious, local users to cause a DoS (Denial of Service)
or to delete arbitrary files and directories.

Full Advisory:
http://secunia.com/advisories/27841/ 

 --

[SA27858] Ubuntu update for pidgin

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2007-11-29

Ubuntu has issued an update for pidgin. This fixes a weakness, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/27858/ 

 --

[SA27799] Fedora update for blam

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-11-27

Fedora has issued an update for blam. This fixes a vulnerability, which
can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/27799/ 


Other:--

[SA27870] Avaya Products OpenSSL Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2007-11-29

Avaya has acknowledged a vulnerability and a weakness in various Avaya
products, which can be exploited by malicious, local users to disclose
sensitive information and by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/27870/ 

 --

[SA27869] Avaya Products PCRE Regex Parsing Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-11-29

Avaya has acknowledged some vulnerabilities in various Avaya products,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/27869/ 

 --

[SA27862] Avaya Products PCRE Character Class Processing Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-11-29

Avaya has acknowledged a vulnerability in various Avaya products, which
potentially can be exploited by malicious people to cause a DoS (Denial
of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27862/ 

 --

[SA27832] Sun Solaris libTIFF Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-11-29

Sun has acknowledged some vulnerabilities in Sun Solaris, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27832/ 

 --

[SA27829] Cisco Unified IP Phone Extension Mobility Weakness

Critical:    Not critical
Where:       From local network
Impact:      Security Bypass
Released:    2007-11-29

Joffrey Czarney has reported a weakness in Cisco Unified IP Phones,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/27829/ 

 --

[SA27831] Sun Solaris Remote Procedure Call Module Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-11-29

Sun has acknowledged a vulnerability in Sun Solaris, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/27831/ 


Cross Platform:--

[SA27854] Charray's CMS "ccms_library_path" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-11-29

MhZ91 has discovered two vulnerabilities in Charray's CMS, which can be
exploited by malicious people to disclose sensitive information or to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27854/ 

 --

[SA27852] PHP_CON "webappcfg[APPPATH]" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-11-29

GoLd_M has reported a vulnerability in PHP_CON, which can be exploited
by malicious people to disclose sensitive information or to compromise
a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27852/ 

 --

[SA27800] Netscape Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, DoS, System access
Released:    2007-11-28

Netscape has acknowledged some vulnerabilities in Netscape Navigator,
which can be exploited by malicious people to conduct cross-site
scripting and cross-site request forgery attacks or potentially to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27800/ 

 --

[SA27866] TuMusika Evolution Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-11-29

Some vulnerabilities have been discovered in TuMusika Evolution, which
can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/27866/ 

 --

[SA27848] GNUMP3d Authentication Bypass Security Issue

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-11-28

James has reported a security issue in GNUMP3d, which can be exploited
by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/27848/ 

 --

[SA27843] wpQuiz Two SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-11-28

Kacper has discovered two vulnerabilities in wpQuiz, which can be
exploited by malicious people and malicious users to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/27843/ 

 --

[SA27825] Ruby-GNOME2 "Gtk::MessageDialog.new()" Format String
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-11-28

Chris Rohlf has reported a vulnerability in Ruby-GNOME2, which can
potentially be exploited by malicious people to compromise an
application using the library.

Full Advisory:
http://secunia.com/advisories/27825/ 

 --

[SA27820] Project Alumni Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
system information, Exposure of sensitive information
Released:    2007-11-26

tomplixsee has discovered some vulnerabilities in Project Alumni, which
can be exploited by malicious people to conduct cross-site scripting and
SQL injection attacks and to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/27820/ 

 --

[SA27816] SeaMonkey Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, DoS, System access
Released:    2007-11-27

Some vulnerabilities have been reported in Mozilla SeaMonkey, which can
be exploited by malicious people to conduct cross-site scripting and
cross-site request forgery attacks and potentially to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/27816/ 

 --

[SA27815] Amber Script "id" Local File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-11-26

Crackers_Child has reported a vulnerability in Amber Script, which can
be exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/27815/ 

 --

[SA27810] PHP-Nuke NSN Script Depository Module Information Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-11-27

KiNgOfThEwOrLd has discovered a vulnerability in the NSN Script
Depository module for PHP-Nuke, which can be exploited by malicious
people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/27810/ 

 --

[SA27808] Softbiz Freelancers Cross-Site Scripting and SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2007-11-29

IRCRASH (Dr.Crash) has reported some vulnerabilities in Softbiz
Freelancers Script, which can be exploited by malicious people to
conduct cross-site scripting and SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27808/ 

 --

[SA27837] @Mail "func" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-11-29

A vulnerability has been reported in @Mail, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/27837/ 

 --

[SA27834] Basic Analysis and Security Engine "base_qry_main.php"
Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-11-27

Two vulnerabilities have been reported in Base Analysis and Security
Engine, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/27834/ 

 --

[SA27828] PHPDevShell Privilege Escalation Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Privilege escalation
Released:    2007-11-28

A vulnerability has been reported in PHPDevShell, which can be
exploited by malicious users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/27828/ 

 --

[SA27826] FMDeluxe "id" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-11-27

Jose Luis Gngora Fernndez has discovered a vulnerability in FMDeluxe,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/27826/ 

 --

[SA27821] Liferay Portal "emailAddress" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-11-28

Joshua Morin has reported a vulnerability in Liferay Portal, which can
be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/27821/ 

 --

[SA27814] vBTube "search" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-11-28

Crackers_Child has reported a vulnerability in vBTube, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/27814/ 

 --

[SA27809] PHPSlideshow "directory" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-11-26

Jose Luis Gngora Fernndez has discovered a vulnerability in
PHPSlideshow, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/27809/ 

 --

[SA27807] JAF CMS Two Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-11-26

lammat has discovered two vulnerabilities in JAF CMS, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/27807/ 

 --

[SA27833] ManageEngine EventLog Analyzer Insecure MySQL Installation

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass
Released:    2007-11-28

A security issue has been reported in ManageEngine EventLog Analyzer,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/27833/ 

 --

[SA27840] BEA AquaLogic Interaction Plumtree Portal Information
Disclosure

Critical:    Not critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-11-28

Adrian Pastor and Jan Fry have reported some weaknesses in BEA
AquaLogic Interaction, which can be exploited by malicious people to
disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/27840/ 



=======================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/ 

Subscribe:
http://secunia.com/secunia_weekly_summary/ 

Contact details:
Web	: http://secunia.com/ 
E-mail	: support@secunia.com 
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


__________________________________________________________________      
Visit InfoSec News
http://www.infosecnews.org/ 

Site design & layout copyright © 1986-2014 CodeGods