AOH :: ISNQ4913.HTM

Secunia Weekly Summary - Issue: 2007-49




Secunia Weekly Summary - Issue: 2007-49
Secunia Weekly Summary - Issue: 2007-49



=======================================================================
                  The Secunia Weekly Advisory Summary                  
                        2007-11-29 - 2007-12-06                        

                       This week: 74 advisories                        

=======================================================================Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

=======================================================================1) Word From Secunia:

New blog entry:

Vendors still use the "legal" weapon

In these days, one would have believed that vendors have learned the
lesson not to threaten with legal actions to withhold and suppress
significant information about vulnerabilities in their products.

Well, nonetheless, Secunia just received a sequel of letters from
Autonomy, likely not known to many, but it is the software company that
supplies the "Swiss Army Knife" in handling and opening documents in
well known software like IBM Lotus Notes and Symantec Mail Security.

...[more information in the full blog]...

Our response to these claims and accusations

Despite Autonomy's unsubstantiated legal threats, Secunia will quite
legally continue to do vulnerability research in Autonomy products and
any other products of interest. Naturally, Secunia will also continue
to publish research articles and advisories in an unbiased, balanced,
accurate, and truthful manner as we serve one purpose only: To provide
accurate and reliable Vulnerability Intelligence to our customers and
the Internet in general.

Secunia is in continuous, ongoing, and positive dialogues with most
vendors including large professional organisations like Microsoft, IBM,
Adobe, Symantec, Novell, Apple, and CA. All understand and respect the
need for informing the public about vulnerabilities and prefer to
co-ordinate and synchronise the publication with important
Vulnerability Intelligence sources such as Secunia rather than battling
to keep things secret. It is truly sad to see that certain vendors like
Autonomy still behave like many software vendors did back in the
previous millennium.

Read more and see the correspondance:
http://secunia.com/blog/15/ 

=======================================================================2) This Week in Brief:

Some vulnerabilities have been acknowledged in Novell BorderManager,
which can be exploited by malicious people to bypass certain security
restrictions or compromise a vulnerable system.

An unspecified error in Novell Client Trust can be exploited to execute
arbitrary code. This may be related to a prior Secunia advisory in the
same application reported early last month:
http://secunia.com/advisories/27468/ 

An error in the handling of full-width and half-width unicode-encoded
HTTP traffic can be exploited to bypass certain security controls. This
may be related to a prior Secunia advisory on the same software reported
in early September 2007:
http://secunia.com/advisories/26698/ 

Novell also reports that proxy authentication and access controls are
bypassed when requests come through another proxy.

Patches are available in Support Pack5 Interim Release 1. Users are
urged to apply updates as soon as possible.

For more information:
http://secunia.com/advisories/27963/ 

 --

A highly critical vulnerability has been reported in avast!
Home/Professional, which can be exploited by malicious people to
compromise a vulnerable system.

The vulnerability is caused due to an error within the handling of
specially crafted TAR files. This can be exploited to corrupt heap
memory via certain unspecified TAR fields.

The vendor has released a patch solving this vulnerability in versions
prior to 4.7.1098.

For more information:
http://secunia.com/advisories/27929/ 

Secunia has constructed the Secunia Personal Software Inspector, which
you can use to check if your personal system is vulnerable:
https://psi.secunia.com/

Corporate users can request for a trial of the Secunia Network Software
Inspector, which you can use to check which systems in your network are
vulnerable:
http://secunia.com/network_software_inspector/ 

 --

A highly critical vulnerability has been reported in OpenOffice, which
potentially can be exploited by malicious people to compromise a user's
system.

The vulnerability is caused due to an unspecified error in the HSQLDB
database engine and can be exploited to execute arbitrary static Java
code via a specially crafted database document.

A fixed version is available for users. For more information:
http://secunia.com/advisories/27928/ 

Secunia has constructed the Secunia Personal Software Inspector, which
you can use to check if your personal system is vulnerable:
https://psi.secunia.com/

Corporate users can request for a trial of the Secunia Network Software
Inspector, which you can use to check which systems in your network are
vulnerable:
http://secunia.com/network_software_inspector/ 

 --

A moderately critical vulnerability has been reported in Cisco Security
Agent for Windows, which can be exploited by malicious people to cause a
DoS (Denial of Service) or compromise a vulnerable system.

The vulnerability is caused by a boundary error in an unspecified
system driver used by the application. This can be exploited to cause a
buffer overflow via a specially crafted packet sent to port 139/TCP or
445/TCP, and successful exploitation may allow execution of arbitrary
code.

The vulnerability is reported in all versions of Cisco Security Agent
for Windows.

For more information:
http://secunia.com/advisories/27947/ 

Corporate users are urged to request for a trial of the Secunia Network
Software Inspector, which you can use to check which systems in your
network are vulnerable:
http://secunia.com/network_software_inspector/ 

 --

VIRUS ALERTS:

During the past week Secunia collected 171 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

=======================================================================3) This Weeks Top Ten Most Read Advisories:

1.  [SA27755] Apple QuickTime RTSP "Content-Type" Header Buffer
              Overflow
2.  [SA27842] Linux Kernel "isdn_net_setcfg()" Buffer Overflow
              Vulnerability
3.  [SA27863] rsync Two Security Bypass Vulnerabilities
4.  [SA27875] FTP Admin Multiple Vulnerabilities
5.  [SA27860] IBM Lotus Notes Client for Linux Insecure File
              Permissions
6.  [SA27873] Asterisk Postgres Realtime Engine SQL Injection
7.  [SA27827] Asterisk Call Detail Record Postgres SQL Injection
8.  [SA27829] Cisco Unified IP Phone Extension Mobility Weakness
9.  [SA27883] Hitachi JP1/Cm2/Network Node Manager Unspecified
              Cross-Site Scripting
10. [SA27872] rPath update for idle and python

=======================================================================4) Vulnerabilities Summary Listing

Windows:
[SA27963] Novell BorderManager Multiple Vulnerabilities
[SA27929] avast! Home/Professional TAR File Processing Heap Corruption
[SA27930] HTTP File Server File Upload Directory Traversal
Vulnerability
[SA27923] Absolute News Manager .NET Multiple Vulnerabilities
[SA27911] Snitz Forums 2000 "BuildTime" SQL Injection Vulnerability
[SA27947] Cisco Security Agent Unspecified System Driver Buffer
Overflow Vulnerability
[SA27917] SonicWALL Global VPN Client Configuration File Format String
Vulnerability
[SA27901] Microsoft Web Proxy Auto-Discovery Feature Security Issue
[SA27935] Citrix EdgeSight Configuration File Information Disclosure
Weakness

UNIX/Linux:
[SA27944] SUSE update for MozillaFirefox
[SA27933] Mandriva update for openssl
[SA27931] Debian update for openoffice.org and hsqldb
[SA27916] Red Hat update for openoffice.org2
[SA27914] Red Hat update for openoffice.org and hsqldb
[SA27875] FTP Admin Multiple Vulnerabilities
[SA27965] SUSE Update for Multiple Packages
[SA27950] Gentoo update for cacti
[SA27943] Debian update for wesnoth
[SA27936] Ubuntu update for perl
[SA27920] Fedora update for wesnoth
[SA27919] Fedora update for kernel
[SA27910] Squid Cache Update Denial of Service Vulnerability
[SA27896] Slackware update for rsync
[SA27891] Debian update for cacti
[SA27888] SUSE update for kernel
[SA27887] Ubuntu update for cairo
[SA27880] Cairo PNG Image Processing Integer Overflow
[SA27927] SUSE update for samba
[SA27937] Ubuntu update for mono
[SA27912] SUSE update for kernel
[SA27892] Debian update for asterisk
[SA27890] Red Hat update for htdig
[SA27882] Mandriva update for apache
[SA27879] FreeBSD sys_dev_random Random Data Replay Vulnerability
[SA27915] Xen "mov_to_rr" Security Bypass Vulnerability
[SA27913] Red Hat update for kernel
[SA27899] Zsh difflog.pl Insecure Temporary Files
[SA27897] Claws Mail sylprint.pl Insecure Temporary Files
[SA27948] Debian update for zabbix
[SA27903] Zabbix "UserParameter" Privilege Escalation Weakness
[SA27952] Gentoo update for hugin
[SA27939] OpenVMS for Integrity Servers Denial of Service
Vulnerabilities
[SA27921] Avaya Products Xterm Security Bypass Security Issue
[SA27908] Linux Kernel "do_coredump()" Information Disclosure
[SA27886] Mandriva update for vixie-cron
[SA27884] Mac OS X Local Denial of Service Vulnerability
[SA27877] Solaris 10 Linux Branded Zones Denial of Service

Other:
[SA27904] F5 FirePass 4100 SSL VPN Cross-Site Scripting
Vulnerabilities
[SA27898] Cisco IP Phone 7940 SIP INVITE Denial of Service
Vulnerability
[SA27926] Sun SPARC Enterprise XCP Firmware Denial Of Service
Vulnerabilities
[SA27945] Nokia N95 SIP Message Processing Denial of Service Weakness

Cross Platform:
[SA27928] OpenOffice Database Document Processing Unspecified Code
Execution
[SA27895] tellmatic "tm_includepath" File Inclusion Vulnerabilities
[SA27878] VLC Media Player ActiveX Plugin and FLAC Vulnerabilities
[SA27876] p.mapper "_SESSION[PM_INCPHP]" File Inclusion
[SA27951] vbDrupal "taxonomy_select_nodes()" SQL Injection
[SA27949] SineCms SQL Injection and Script Insertion
[SA27932] Drupal "taxonomy_select_nodes()" SQL Injection
[SA27924] HP Select Identity Unspecified Unauthorised Access
Vulnerability
[SA27909] Beehive Forum SQL Injection and Unspecified Vulnerabilities
[SA27905] Typespeed Division By Zero Denial of Service
[SA27881] Seditio "pag_sub[]" SQL Injection Vulnerability
[SA27873] Asterisk Postgres Realtime Engine SQL Injection
[SA27953] Drupal Shoutbox Module Script Insertion Vulnerabilities
[SA27941] IBM Lotus Sametime Meeting WebRunMenuFrame Page Cross-Site
Scripting
[SA27925] Jetty Multiple Vulnerabilities
[SA27918] Fusion News Cross-Site Request Forgery
[SA27906] Apache HTTP Method Request Entity Too Large Cross-Site
Scripting
[SA27902] CiscoWorks Common Services Cross-Site Scripting
Vulnerability
[SA27900] IBM Tivoli Netcool Security Manager Unspecified Cross-Site
Scripting
[SA27889] e2fsprogs libext2fs Integer Overflow Vulnerabilities
[SA27883] Hitachi JP1/Cm2/Network Node Manager Unspecified Cross-Site
Scripting
[SA27874] CRM-CTT "CheckCustomerAccess()" Security Bypass
[SA27907] Firefox Charset Inheritance Cross-Site Scripting Security
Issue

=======================================================================5) Vulnerabilities Content Listing

Windows:--

[SA27963] Novell BorderManager Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, System access
Released:    2007-12-06

Some vulnerabilities have been reported in Novell BorderManager, which
can be exploited by malicious people to bypass certain security
restrictions or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27963/ 

 --

[SA27929] avast! Home/Professional TAR File Processing Heap Corruption

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-05

A vulnerability has been reported in avast! Home/Professional, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/27929/ 

 --

[SA27930] HTTP File Server File Upload Directory Traversal
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-12-06

Luigi Auriemma has reported a vulnerability in HTTP File Server, which
can be exploited by malicious users to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27930/ 

 --

[SA27923] Absolute News Manager .NET Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
system information, Exposure of sensitive information
Released:    2007-12-05

Some vulnerabilities have been reported in Absolute News Manager .NET,
which can be exploited by malicious people to conduct cross-site
scripting and SQL injection attacks, or to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/27923/ 

 --

[SA27911] Snitz Forums 2000 "BuildTime" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-12-04

Soroush Dalili has discovered a vulnerability in Snitz Forums, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27911/ 

 --

[SA27947] Cisco Security Agent Unspecified System Driver Buffer
Overflow Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2007-12-06

A vulnerability has been reported in Cisco Security Agent for Windows,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27947/ 

 --

[SA27917] SonicWALL Global VPN Client Configuration File Format String
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2007-12-05

A vulnerability has been discovered in SonicWALL GLobal VPN Client,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/27917/ 

 --

[SA27901] Microsoft Web Proxy Auto-Discovery Feature Security Issue

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information
Released:    2007-12-04

A security issue has been reported in Microsoft's Web Proxy
Auto-Discovery (WPAD) feature, which can be exploited by malicious
people to conduct man-in-the-middle (MITM) attacks.

Full Advisory:
http://secunia.com/advisories/27901/ 

 --

[SA27935] Citrix EdgeSight Configuration File Information Disclosure
Weakness

Critical:    Not critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2007-12-05

A weakness has been reported in Citrix EdgeSight, which can be
exploited by malicious, local users to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/27935/ 


UNIX/Linux:--

[SA27944] SUSE update for MozillaFirefox

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, DoS, System access
Released:    2007-12-06

SUSE has issued an update for MozillaFirefox. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site request forgery and cross-site scripting attacks or
potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27944/ 

 --

[SA27933] Mandriva update for openssl

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-05

Mandriva has issued an update for openssl. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27933/ 

 --

[SA27931] Debian update for openoffice.org and hsqldb

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-06

Debian has issued an update for openoffice.org and hsqldb. This fixes a
vulnerability, which potentially can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27931/ 

 --

[SA27916] Red Hat update for openoffice.org2

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-06

Red Hat has issued an update for openoffice.org2. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27916/ 

 --

[SA27914] Red Hat update for openoffice.org and hsqldb

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-06

Red Hat has issued an update for openoffice.org and hsqldb. This fixes
a vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27914/ 

 --

[SA27875] FTP Admin Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Exposure of system
information, Exposure of sensitive information, System access
Released:    2007-11-30

Omni has discovered some vulnerabilities in FTP Admin, which can be
exploited by malicious users to compromise a vulnerable system, and by
malicious people to conduct cross-site scripting attacks and bypass
certain security restrictions.

Full Advisory:
http://secunia.com/advisories/27875/ 

 --

[SA27965] SUSE Update for Multiple Packages

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Exposure of
sensitive information, DoS, System access
Released:    2007-12-06

SUSE has issued an update for multiple packages. This fixes a security
issue and some vulnerabilities, which can be exploited by malicious
people to disclose potentially sensitive information, conduct
cross-site scripting attacks, cause a DoS (Denial of Service), and
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27965/ 

 --

[SA27950] Gentoo update for cacti

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-12-06

Gentoo has issued an update for cacti. This fixes a vulnerability,
which potentially can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/27950/ 

 --

[SA27943] Debian update for wesnoth

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-12-06

Debian has issued an update for wesnoth. This fixes a vulnerability,
which can be exploited by malicious people to  disclose potentially
sensitive information.

Full Advisory:
http://secunia.com/advisories/27943/ 

 --

[SA27936] Ubuntu update for perl

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-05

Ubuntu has issued an update for perl. This fixes a vulnerability, which
can be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27936/ 

 --

[SA27920] Fedora update for wesnoth

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, DoS, System access
Released:    2007-12-04

Fedora has issued an update for wesnoth. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service), disclose potentially sensitive information, or
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27920/ 

 --

[SA27919] Fedora update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-12-04

Fedora has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users and
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27919/ 

 --

[SA27910] Squid Cache Update Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-12-04

A vulnerability has been reported in Squid, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27910/ 

 --

[SA27896] Slackware update for rsync

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2007-12-03

Slackware has issued an update for rsync. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions or potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/27896/ 

 --

[SA27891] Debian update for cacti

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-12-03

Debian has issued an update for cacti. This fixes a vulnerability,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/27891/ 

 --

[SA27888] SUSE update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-04

SUSE has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service) and by malicious people to cause a DoS
and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27888/ 

 --

[SA27887] Ubuntu update for cairo

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-12-04

Ubuntu has issued an update for cairo. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise an
application using the library.

Full Advisory:
http://secunia.com/advisories/27887/ 

 --

[SA27880] Cairo PNG Image Processing Integer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-11-30

A vulnerability has been reported in Cairo, which potentially can be
exploited by malicious people to compromise an application using the
library.

Full Advisory:
http://secunia.com/advisories/27880/ 

 --

[SA27927] SUSE update for samba

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-12-06

SUSE has issued an update for samba. This fixes some vulnerabilities,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/27927/ 

 --

[SA27937] Ubuntu update for mono

Critical:    Less critical
Where:       From remote
Impact:      System access, DoS
Released:    2007-12-05

Ubuntu has issued an update for mono. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of Service)
and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27937/ 

 --

[SA27912] SUSE update for kernel

Critical:    Less critical
Where:       From remote
Impact:      Unknown, Security Bypass, Privilege escalation, DoS,
System access
Released:    2007-12-04

SUSE has issued an update for the kernel. This fixes a weakness, a
security issue, and some vulnerabilities, where one has unknown impacts
and others can be exploited by malicious, local users to bypass certain
security restrictions, cause a DoS (Denial of Service), and gain
escalated privileges, or by malicious people to cause a DoS or
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27912/ 

 --

[SA27892] Debian update for asterisk

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-12-03

Debian has issued an update for asterisk. This fixes a vulnerability,
which can be exploited by malicious users to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/27892/ 

 --

[SA27890] Red Hat update for htdig

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-04

Red Hat has issued an update for htdig. This fixes a vulnerability,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/27890/ 

 --

[SA27882] Mandriva update for apache

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-12-04

Mandriva has issued an update for apache. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/27882/ 

 --

[SA27879] FreeBSD sys_dev_random Random Data Replay Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      Exposure of sensitive information
Released:    2007-11-30

A vulnerability has been reported in FreeBSD, which can be exploited by
malicious people to disclose potentially sensitive information.

Full Advisory:
http://secunia.com/advisories/27879/ 

 --

[SA27915] Xen "mov_to_rr" Security Bypass Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2007-12-05

A vulnerability has been reported in Xen, which can be exploited by
malicious, local users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/27915/ 

 --

[SA27913] Red Hat update for kernel

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass, DoS
Released:    2007-12-04

Red Hat has issued an update for the kernel. This fixes some security
issues and vulnerabilities, which can be exploited by malicious, local
users to cause a DoS (Denial of Service) or bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/27913/ 

 --

[SA27899] Zsh difflog.pl Insecure Temporary Files

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-12-03

A security issue has been reported in Zsh, which can be exploited by
malicious, local users to perform certain actions with escalated
privileges.

Full Advisory:
http://secunia.com/advisories/27899/ 

 --

[SA27897] Claws Mail sylprint.pl Insecure Temporary Files

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-12-03

A security issue has been reported in Claws Mail, which can be
exploited by malicious, local users to perform certain actions with
escalated privileges.

Full Advisory:
http://secunia.com/advisories/27897/ 

 --

[SA27948] Debian update for zabbix

Critical:    Not critical
Where:       From local network
Impact:      Privilege escalation
Released:    2007-12-06

Debian has issued an update for zabbix. This fixes a weakness, which
can be exploited by malicious users to perform certain actions with
escalated privileges.

Full Advisory:
http://secunia.com/advisories/27948/ 

 --

[SA27903] Zabbix "UserParameter" Privilege Escalation Weakness

Critical:    Not critical
Where:       From local network
Impact:      Privilege escalation
Released:    2007-12-03

A weakness has been reported in Zabbix, which can be exploited by
malicious users to perform certain actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/27903/ 

 --

[SA27952] Gentoo update for hugin

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-12-06

Gentoo has issued an update for hugin. This fixes a security issue,
which can be exploited by malicious, local users to perform certain
actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/27952/ 

 --

[SA27939] OpenVMS for Integrity Servers Denial of Service
Vulnerabilities

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-12-05

Some vulnerabilities have been reported in OpenVMS for Integrity
Servers, which can be exploited by malicious, local users to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27939/ 

 --

[SA27921] Avaya Products Xterm Security Bypass Security Issue

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2007-12-05

Avaya has acknowledged a security issue in various Avaya products,
which potentially can be exploited by malicious, local users to bypass
certain security restrictions.

Full Advisory:
http://secunia.com/advisories/27921/ 

 --

[SA27908] Linux Kernel "do_coredump()" Information Disclosure

Critical:    Not critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2007-12-05

A security issue has been reported in the Linux Kernel, which can be
exploited by malicious, local users to disclose potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/27908/ 

 --

[SA27886] Mandriva update for vixie-cron

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-12-04

Mandriva has issued an update for vixie-cron. This fixes a
vulnerability, which can be exploited by malicious, local users to
cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27886/ 

 --

[SA27884] Mac OS X Local Denial of Service Vulnerability

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-12-05

A vulnerability has been discovered in Mac OS X, which can be exploited
by malicious, local users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27884/ 

 --

[SA27877] Solaris 10 Linux Branded Zones Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-12-03

A vulnerability has been reported in Solaris 10, which can be exploited
by malicious, local users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27877/ 


Other:--

[SA27904] F5 FirePass 4100 SSL VPN Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-03

Some vulnerabilities have been reported in F5 FirePass 4100 SSL VPN,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/27904/ 

 --

[SA27898] Cisco IP Phone 7940 SIP INVITE Denial of Service
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-12-06

The Madynes research team has reported a vulnerability in Cisco IP
Phone 7940, which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/27898/ 

 --

[SA27926] Sun SPARC Enterprise XCP Firmware Denial Of Service
Vulnerabilities

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-12-05

Some vulnerabilities have been reported in the XSCF Control Package
(XCP) firmware for Sun SPARC Enterprise M4000/M5000/M8000/M9000, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/27926/ 

 --

[SA27945] Nokia N95 SIP Message Processing Denial of Service Weakness

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2007-12-06

Humberto J. Abdelnur, Radu State, and Olivier Festor have reported a
weakness in Nokia N95, which can be exploited by malicious people to
cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27945/ 


Cross Platform:--

[SA27928] OpenOffice Database Document Processing Unspecified Code
Execution

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-05

A vulnerability has been reported in OpenOffice, which potentially can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27928/ 

 --

[SA27895] tellmatic "tm_includepath" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-03

ShAy6oOoN has discovered some vulnerabilities in tellmatic, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27895/ 

 --

[SA27878] VLC Media Player ActiveX Plugin and FLAC Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-03

Some vulnerabilities have been reported in VLC Media Player, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/27878/ 

 --

[SA27876] p.mapper "_SESSION[PM_INCPHP]" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-12-03

ShAy6oOoN has reported a vulnerability in p.mapper, which can be
exploited by malicious people to disclose sensitive information or to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27876/ 

 --

[SA27951] vbDrupal "taxonomy_select_nodes()" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-12-06

A vulnerability has been reported in vbDrupal, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27951/ 

 --

[SA27949] SineCms SQL Injection and Script Insertion

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
sensitive information
Released:    2007-12-06

KiNgOfThEwOrLd has discovered some vulnerabilities in SineCms, which
can be exploited by malicious people to conduct script insertion and
SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27949/ 

 --

[SA27932] Drupal "taxonomy_select_nodes()" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-12-06

A vulnerability has been reported in Drupal, which can be exploited by
malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27932/ 

 --

[SA27924] HP Select Identity Unspecified Unauthorised Access
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-12-05

A vulnerability has been reported in HP Select Identity, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/27924/ 

 --

[SA27909] Beehive Forum SQL Injection and Unspecified Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, Manipulation of data, Exposure of sensitive
information
Released:    2007-12-04

Some vulnerabilities have been reported in Beehive Forum, some with
unknown impact and one which can be exploited by malicious users to
conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27909/ 

 --

[SA27905] Typespeed Division By Zero Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-12-03

A vulnerability has been reported in Typespeed, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/27905/ 

 --

[SA27881] Seditio "pag_sub[]" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-11-30

InATeam have discovered a vulnerability in Seditio, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27881/ 

 --

[SA27873] Asterisk Postgres Realtime Engine SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-11-30

A vulnerability has been reported in Asterisk, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27873/ 

 --

[SA27953] Drupal Shoutbox Module Script Insertion Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-06

Some vulnerabilities have been reported in the Shoutbox module for
Drupal, which can be exploited by malicious users to conduct script
insertion attacks.

Full Advisory:
http://secunia.com/advisories/27953/ 

 --

[SA27941] IBM Lotus Sametime Meeting WebRunMenuFrame Page Cross-Site
Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-06

A vulnerability has been reported in IBM Lotus Sametime, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/27941/ 

 --

[SA27925] Jetty Multiple Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, Hijacking
Released:    2007-12-05

Some vulnerabilities have been reported in Jetty, which can be
exploited by malicious people to conduct HTTP response splitting and
cross-site scripting attacks and potentially hijack a user session.

Full Advisory:
http://secunia.com/advisories/27925/ 

 --

[SA27918] Fusion News Cross-Site Request Forgery

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-06

A vulnerability has been reported in Fusion News, which can be
exploited by malicious users to conduct cross-site request forgery
attacks.

Full Advisory:
http://secunia.com/advisories/27918/ 

 --

[SA27906] Apache HTTP Method Request Entity Too Large Cross-Site
Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-03

Adrian Pastor and Amir Azam have discovered a vulnerability in Apache,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/27906/ 

 --

[SA27902] CiscoWorks Common Services Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-06

Dave Lewis has reported a vulnerability in CiscoWorks Common Services,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/27902/ 

 --

[SA27900] IBM Tivoli Netcool Security Manager Unspecified Cross-Site
Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-03

A vulnerability has been reported in IBM Tivoli Netcool Security
Manager, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/27900/ 

 --

[SA27889] e2fsprogs libext2fs Integer Overflow Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-06

Some vulnerabilities have been reported in the libext2fs library of
e2fsprogs, which potentially can be exploited by malicious people to
compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/27889/ 

 --

[SA27883] Hitachi JP1/Cm2/Network Node Manager Unspecified Cross-Site
Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-11-30

A vulnerability has been reported in Hitachi JP1/Cm2/Network Node
Manager, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/27883/ 

 --

[SA27874] CRM-CTT "CheckCustomerAccess()" Security Bypass

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-12-03

A security issue has been reported in CRM-CTT, which can be exploited
by malicious users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/27874/ 

 --

[SA27907] Firefox Charset Inheritance Cross-Site Scripting Security
Issue

Critical:    Not critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-04

Paul Szabo has discovered a security issue in Firefox, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/27907/ 



=======================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/ 

Subscribe:
http://secunia.com/secunia_weekly_summary/ 

Contact details:
Web	: http://secunia.com/ 
E-mail	: support@secunia.com 
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


__________________________________________________________________      
Visit InfoSec News
http://www.infosecnews.org/ 

Site design & layout copyright © 1986-2014 CodeGods