AOH :: ISNQ4979.HTM

Secunia Weekly Summary - Issue: 2007-51




Secunia Weekly Summary - Issue: 2007-51
Secunia Weekly Summary - Issue: 2007-51



=======================================================================
                  The Secunia Weekly Advisory Summary                  
                        2007-12-13 - 2007-12-20                        

                       This week: 71 advisories                        

=======================================================================Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

=======================================================================1) Word From Secunia:

A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.

Download and test it today:
https://psi.secunia.com/

Read more about this new version:
https://psi.secunia.com/?page=changelog

=======================================================================2) This Week in Brief:

Some highly critical vulnerabilities have been reported in Apple
QuickTime, which can be exploited by malicious people to compromise a
user's system.

A boundary error in the handling of QTL files can be exploited to cause
a heap-based buffer overflow when a user views a specially crafted QTL
file. Various unspecified errors also exist in QuickTime's Flash media
handler.

Successful exploitation of any of these issues may allow execution of
arbitrary code. Quicktime 7.3.1 is patched against these
vulnerabilities, and is available for Mac and Windows users.

For more information:
http://secunia.com/advisories/28092/ 

The Secunia Personal Software Inspector - Release Candidate 1 is now
available, which you can use to check if your personal system is
vulnerable:
https://psi.secunia.com/

 --

Various vulnerabilities in Java have been reported and acknowledged in
Mac OS X, which can be exploited by malicious people to bypass certain
security restrictions, conduct cross-site scripting attacks, to cause a
DoS (Denial of Service), or to compromise a user's system.

An error in Java due to an improper access check can be exploited via a
specially crafted Java applet to add or remove items from a user's
Keychain, without prompting the user. This vulnerability affects Mac OS
X versions prior to 10.5.

Some vulnerabilities in Java 1.4 and J2SE 5.0 can be exploited to
bypass certain security restrictions, conduct cross-site scripting
attacks, to cause a DoS (Denial of Service), or to compromise a user's
system. Most of these vulnerabilities are known issues in Java from
2006 and 2007.

These vulnerabilities are reported in Mac OS X 10.4.10 and Mac OS X
Server 10.4.10. Mac OS X v10.5 is reportedly not affected. Java Release
6 for Mac OS X 10.4 is now available for all users to resolve the
issues.

For more information, including a complete list of Java
vulnerabilities:
http://secunia.com/advisories/28115/ 

 --

Apple has issued a security update for Mac OS X, which fixes multiple
vulnerabilities. Some of these vulnerabilities are due to known
vulnerabilities in third-party software (such as Tar, CUPS, perl, and
python), while some are vulnerabilities in Mac OS X components.

Apple has released Security Update 2007-09 to resolve these issues.
Both Mac OS X 10.4 and 10.5 are affected. All users are urged to update
their systems immediately.

For more information, including the complete list of all
vulnerabilities:
http://secunia.com/advisories/28136/ 

 --

Some vulnerabilities have been reported in Adobe Flash Player, where
one vulnerability has an unknown impact and others can be exploited by
malicious, local users to gain escalated privileges and by malicious
people to bypass certain security restrictions, conduct cross-site
scripting and HTTP request splitting attacks, disclose sensitive
information, cause a Denial of Service (DoS), or to potentially
compromise a user's system.

One of the vulnerabilities is due to the use of vulnerable PCRE code,
while another is a vulnerability present in the Flash Player in Opera
browsers.

Some vulnerabilities may be exploited to allow the execution of
arbitrary code, making them highly critical issues. Secunia urges all
users to install version 9.0.115.0 to fix these issues.

For more information, including the complete list of all
vulnerabilities:
http://secunia.com/advisories/28161/ 

The Secunia Personal Software Inspector - Release Candidate 1 is now
available, which you can use to check if your personal system is
vulnerable:
https://psi.secunia.com/

Corporate users can request for a trial of the Secunia Network Software
Inspector, which you can use to check which systems in your network are
vulnerable:
http://secunia.com/network_software_inspector/ 

 --

VIRUS ALERTS:

During the past week Secunia collected 116 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

=======================================================================3) This Weeks Top Ten Most Read Advisories:

1.  [SA28036] Internet Explorer Multiple Code Execution Vulnerabilities
2.  [SA28092] Apple QuickTime Multiple Vulnerabilities
3.  [SA28095] SquirrelMail Package Compromise
4.  [SA28161] Adobe Flash Player Multiple Vulnerabilities
5.  [SA27992] JustSystems Ichitaro Document Processing Buffer Overflow
6.  [SA28096] Sun Solaris 10 NFS "netgroups" Security Bypass
              Vulnerability
7.  [SA28048] Mac OS X "cs_validate_page()" Local Denial of Service
8.  [SA28072] Kerio WinRoute Firewall Proxy Server Unspecified Security
              Bypass
9.  [SA28059] WebGUI Create Admin Security Bypass
10. [SA27969] TYPO3 "indexed_search" SQL Injection Vulnerability

=======================================================================4) Vulnerabilities Summary Listing

Windows:
[SA28144] Rosoft Media Player File Processing Buffer Overflow
Vulnerability
[SA28134] iMesh IMWebControl Class ActiveX Control Code Execution
[SA28120] PeerCast "handshakeHTTP()" Buffer Overflow Vulnerability
[SA28160] WFTPD Explorer LIST Reply Buffer Overflow Vulnerability
[SA28143] RaidenHTTPD "ulang" Local File Inclusion Vulnerability
[SA28111] phPay Local File Inclusion Vulnerability
[SA28131] St. Bernard Open File Manager Buffer Overflow Vulnerability
[SA28177] HP Software Update ContentCollection Class ActiveX Control
Insecure Method
[SA28150] Citrix Web Interface Unspecified Cross-Site Scripting
Vulnerability
[SA28142] SurgeMail Webmail "Host" Header Processing Denial of Service

UNIX/Linux:
[SA28157] Red Hat update for flash-plugin
[SA28136] Apple Mac OS X Security Update Fixes Multiple
Vulnerabilities
[SA28135] Sun Solaris Firefox / Thunderbird Multiple Vulnerabilities
[SA28115] Mac OS X Java Multiple Vulnerabilities
[SA28112] Centreon "fileOreonConf" File Inclusion Vulnerabilities
[SA28084] HP-UX update for OpenSSL
[SA28170] Ubuntu update for kernel
[SA28167] IBM AIX Perl Regular Expressions Unicode Data Buffer
Overflow
[SA28147] Ubuntu update for libgd2
[SA28132] Exiv2 EXIF Parsing Integer Overflow Vulnerability
[SA28114] Sun Solaris Gimp Multiple Vulnerabilities
[SA28113] Gentoo update for cups
[SA28109] Red Hat update for squid
[SA28103] Debian update for centericq
[SA28101] Debian update for link-grammar
[SA28091] Fedora update for squid
[SA28090] Gentoo update for ircservices
[SA28086] Debian update for mydns
[SA28151] Sun Management Center Default Account Security Issue
[SA28129] CUPS SNMP Backend "asn1_get_string()" Signedness
Vulnerability
[SA28089] Avaya Products Samba "send_mailslot()" Buffer Overflow
[SA28087] HP-UX DCE swagentd Buffer Overflow Vulnerability
[SA28162] Red Hat update for kernel
[SA28107] rPath update for tetex
[SA28148] Sun Ray Device Manager Daemon Data Manipulation and DoS
[SA28108] Slackware update for mysql
[SA28099] Red Hat update for mysql
[SA28139] Alternate pdftops Filter for CUPS Insecure Temporary Files
[SA28123] scponly Command Passthrough Security Bypass
[SA28105] Linux Kernel "hrtimer_start()" Integer Overflow
Vulnerability
[SA28097] Fedora update for autofs
[SA28094] Gentoo Portage "etc-update" Information Disclosure
[SA28088] rPath update for kernel
[SA28181] rPath update for kdebase
[SA28104] KDE KDM Local Denial of Service Weakness

Other:
[SA28175] Cisco Firewall Services Module Denial of Service
Vulnerability
[SA28100] Juniper JUNOS BGP UPDATE Message Processing Denial of
Service
[SA28096] Sun Solaris 10 NFS "netgroups" Security Bypass Vulnerability
[SA28093] NeoOffice Unspecified OpenOffice.org Vulnerability

Cross Platform:
[SA28169] Opera Multiple Vulnerabilities
[SA28161] Adobe Flash Player Multiple Vulnerabilities
[SA28117] ClamAV "cli_scanpe()" MEW Handling Integer Overflow
[SA28095] SquirrelMail Package Compromise
[SA28092] Apple QuickTime Multiple Vulnerabilities
[SA28155] phpMyRealty Two SQL Injection Vulnerabilities
[SA28154] Dokeos "My productions" Multiple Extensions File Upload
Vulnerability
[SA28138] PunBB Automatic Image Upload with Thumbnails Module File
Upload
[SA28137] LineShout Two Script Insertion Vulnerabilities
[SA28126] FreeWebshop.org Admin Credentials Information Disclosure
[SA28124] Hammer of Thyrion "HuffDecode()" Buffer Overflow
Vulnerability
[SA28119] PHP Real Estate Classifieds "id" SQL Injection
[SA28110] exiftags Multiple Vulnerabilities
[SA28098] CourseMill Learning Management System "user" SQL Injection
[SA28164] GF-3XPLORER Cross-Site Scripting and Information Disclosure
[SA28149] Asterisk Registration Database Security Bypass
[SA28133] Mambo Two Cross-Site Scripting Vulnerabilities
[SA28130] WordPress Draft Information Disclosure
[SA28122] Google Web Toolkit Benchmark Reporting System Cross-Site
Scripting
[SA28116] Ganglia Web Interface Multiple Cross-Site Scripting
Vulnerabilities
[SA28106] Flyspray Two Cross-Site Scripting Vulnerabilities
[SA28118] syslog-ng Timestamps Denial of Service Vulnerability

=======================================================================5) Vulnerabilities Content Listing

Windows:--

[SA28144] Rosoft Media Player File Processing Buffer Overflow
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-19

Juan Pablo Lopez Yacubian has discovered a vulnerability in Rosoft
Media Player, which can be exploited by malicious people to compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/28144/ 

 --

[SA28134] iMesh IMWebControl Class ActiveX Control Code Execution

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-18

rgod has discovered a vulnerability in iMesh, which can be exploited by
malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/28134/ 

 --

[SA28120] PeerCast "handshakeHTTP()" Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-18

Luigi Auriemma has reported a vulnerability in PeerCast, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
potentially to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28120/ 

 --

[SA28160] WFTPD Explorer LIST Reply Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-12-19

r4x has reported a vulnerability in WFTPD Explorer, which potentially
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/28160/ 

 --

[SA28143] RaidenHTTPD "ulang" Local File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-12-18

rgod has discovered a vulnerability in RaidenHTTPD, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/28143/ 

 --

[SA28111] phPay Local File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-12-17

Michael Brooks has discovered a vulnerability in phPay, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/28111/ 

 --

[SA28131] St. Bernard Open File Manager Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-12-18

A vulnerability has been reported in St. Bernard Open File Manager,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/28131/ 

 --

[SA28177] HP Software Update ContentCollection Class ActiveX Control
Insecure Method

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-12-20

porkythepig has reported a vulnerability in HP Software Update, which
can be exploited by malicious people to overwrite arbitrary files on a
user's system.

Full Advisory:
http://secunia.com/advisories/28177/ 

 --

[SA28150] Citrix Web Interface Unspecified Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-19

A vulnerability has been reported in Citrix Web Interface, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/28150/ 

 --

[SA28142] SurgeMail Webmail "Host" Header Processing Denial of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-12-18

rgod has discovered a vulnerability in SurgeMail, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/28142/ 


UNIX/Linux:--

[SA28157] Red Hat update for flash-plugin

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
sensitive information, Privilege escalation, DoS, System access
Released:    2007-12-19

Red Hat has issued an update for flash-plugin. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges and by malicious people to conduct cross-site
scripting and HTTP request splitting attacks, disclose sensitive
information, cause a Denial of Service (DoS), or to potentially
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/28157/ 

 --

[SA28136] Apple Mac OS X Security Update Fixes Multiple
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Hijacking, Security Bypass, Cross Site Scripting, Exposure
of system information, Exposure of sensitive information, Privilege
escalation, DoS, System access
Released:    2007-12-18

Apple has issued a security update for Mac OS X, which fixes multiple
vulnerabilities.

Full Advisory:
http://secunia.com/advisories/28136/ 

 --

[SA28135] Sun Solaris Firefox / Thunderbird Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Spoofing, Exposure of sensitive
information, DoS, System access
Released:    2007-12-19

Sun has acknowledged some vulnerabilities in Sun Solaris, which can be
exploited by malicious people to conduct spoofing and cross-site
scripting attacks, to disclose sensitive information, and potentially
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/28135/ 

 --

[SA28115] Mac OS X Java Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Privilege escalation, DoS, System access
Released:    2007-12-17

Some vulnerabilities have been reported and acknowledged  in Mac OS X,
which can be exploited by malicious people to bypass certain security
restrictions, conduct cross-site scripting attacks, to cause a DoS
(Denial of Service), or to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/28115/ 

 --

[SA28112] Centreon "fileOreonConf" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-18

Michael Brooks has reported some vulnerabilities in Centreon, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28112/ 

 --

[SA28084] HP-UX update for OpenSSL

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-14

HP has issued an update for OpenSSL. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of Service)
and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28084/ 

 --

[SA28170] Ubuntu update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-12-20

Ubuntu has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users and
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/28170/ 

 --

[SA28167] IBM AIX Perl Regular Expressions Unicode Data Buffer
Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-19

IBM has acknowledged a vulnerability in AIX, which potentially can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28167/ 

 --

[SA28147] Ubuntu update for libgd2

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-19

Ubuntu has issued an update for libgd2. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise an application using
the library.

Full Advisory:
http://secunia.com/advisories/28147/ 

 --

[SA28132] Exiv2 EXIF Parsing Integer Overflow Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-18

A vulnerability has been reported in Exiv2, which can be exploited by
malicious people to cause a DoS (Denial of Service) or to potentially
compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/28132/ 

 --

[SA28114] Sun Solaris Gimp Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-12-18

Sun has acknowledged some vulnerabilities in Gimp, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/28114/ 

 --

[SA28113] Gentoo update for cups

Critical:    Moderately critical
Where:       From remote
Impact:      Privilege escalation, DoS, System access
Released:    2007-12-19

Gentoo has issued an update for cups. This fixes a security issue and
some vulnerabilities, which can be exploited by malicious, local users
to perform certain actions with escalated privileges and by malicious
people to cause a DoS (Denial of Service) or potentially compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/28113/ 

 --

[SA28109] Red Hat update for squid

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-12-19

Red Hat has issued an update for squid. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/28109/ 

 --

[SA28103] Debian update for centericq

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-17

Debian has issued an update for centericq. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/28103/ 

 --

[SA28101] Debian update for link-grammar

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-12-18

Debian has issued an update for link-grammar. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/28101/ 

 --

[SA28091] Fedora update for squid

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-12-17

Fedora has issued an update for squid. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/28091/ 

 --

[SA28090] Gentoo update for ircservices

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-12-14

Gentoo has issued an update for ircservices. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/28090/ 

 --

[SA28086] Debian update for mydns

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-12-17

Debian has issued an update for mydns. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/28086/ 

 --

[SA28151] Sun Management Center Default Account Security Issue

Critical:    Moderately critical
Where:       From local network
Impact:      Security Bypass
Released:    2007-12-19

A security issue has been reported in Sun Management Center, which can
be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/28151/ 

 --

[SA28129] CUPS SNMP Backend "asn1_get_string()" Signedness
Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2007-12-18

A vulnerability has been reported in CUPS, which can be exploited by
malicious people to cause a DoS (Denial of Service) or potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28129/ 

 --

[SA28089] Avaya Products Samba "send_mailslot()" Buffer Overflow

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-12-14

Avaya has acknowledged a vulnerability in various Avaya products, which
can be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28089/ 

 --

[SA28087] HP-UX DCE swagentd Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2007-12-14

A vulnerability has been reported in HP-UX, which can be exploited by
malicious people to cause a DoS (Denial of Service) or compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/28087/ 

 --

[SA28162] Red Hat update for kernel

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-12-20

Red Hat has issued an update for the kernel. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/28162/ 

 --

[SA28107] rPath update for tetex

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information,
DoS, System access
Released:    2007-12-18

rPath has issued an update for tetex. This fixes some vulnerabilities,
which can be exploited by malicious, local users to disclose and
manipulate sensitive information and by malicious people to potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28107/ 

 --

[SA28148] Sun Ray Device Manager Daemon Data Manipulation and DoS

Critical:    Less critical
Where:       From local network
Impact:      Manipulation of data, DoS
Released:    2007-12-19

Some vulnerabilities have been reported in Sun Ray Server Software,
which can be exploited by malicious, local users or malicious people to
manipulate certain data or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/28148/ 

 --

[SA28108] Slackware update for mysql

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass, Manipulation of data, DoS
Released:    2007-12-17

Slackware has issued an update for mysql. This fixes a security issue
and some vulnerabilities, which can be exploited by malicious, local
users to manipulate certain data and by malicious users to bypass
certain security restrictions and cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/28108/ 

 --

[SA28099] Red Hat update for mysql

Critical:    Less critical
Where:       From local network
Impact:      Manipulation of data, DoS
Released:    2007-12-19

Red Hat has issued an update for mysql. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
manipulate certain data and by malicious users to cause a DoS (Denial
of Service).

Full Advisory:
http://secunia.com/advisories/28099/ 

 --

[SA28139] Alternate pdftops Filter for CUPS Insecure Temporary Files

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-12-18

A security issue has been reported in the Alternate pdftops Filter for
CUPS, which can be exploited by malicious, local users to perform
certain actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/28139/ 

 --

[SA28123] scponly Command Passthrough Security Bypass

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2007-12-17

A security issue has been reported in scponly, which can be exploited
by malicious, local users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/28123/ 

 --

[SA28105] Linux Kernel "hrtimer_start()" Integer Overflow
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Unknown
Released:    2007-12-17

A vulnerability with an unknown impact has been reported in the Linux
Kernel.

Full Advisory:
http://secunia.com/advisories/28105/ 

 --

[SA28097] Fedora update for autofs

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-12-17

Fedora has issued an update for autofs. This fixes a vulnerability,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/28097/ 

 --

[SA28094] Gentoo Portage "etc-update" Information Disclosure

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2007-12-14

Gentoo has acknowledged a security issue in Portage, which can be
exploited by malicious, local users to disclose potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/28094/ 

 --

[SA28088] rPath update for kernel

Critical:    Less critical
Where:       Local system
Impact:      Unknown
Released:    2007-12-19

rPath has issued an update for the kernel. This fixes a vulnerability
with an unknown impact.

Full Advisory:
http://secunia.com/advisories/28088/ 

 --

[SA28181] rPath update for kdebase

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-12-20

rPath has issued an update for kdebase. This fixes a weakness, which
can be exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/28181/ 

 --

[SA28104] KDE KDM Local Denial of Service Weakness

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-12-20

A weakness has been reported in KDE, which can be exploited by
malicious, local users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/28104/ 


Other:--

[SA28175] Cisco Firewall Services Module Denial of Service
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-12-20

A vulnerability has been reported in the Cisco Firewall Services Module
(FWSM), which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/28175/ 

 --

[SA28100] Juniper JUNOS BGP UPDATE Message Processing Denial of
Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-12-17

A vulnerability has been reported in Juniper JUNOS, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/28100/ 

 --

[SA28096] Sun Solaris 10 NFS "netgroups" Security Bypass Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-12-14

Sun has acknowledged a vulnerability in Solaris, which can be exploited
by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/28096/ 

 --

[SA28093] NeoOffice Unspecified OpenOffice.org Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown
Released:    2007-12-14

A vulnerability with an unknown impact has been reported in NeoOffice.

Full Advisory:
http://secunia.com/advisories/28093/ 


Cross Platform:--

[SA28169] Opera Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information, System
access
Released:    2007-12-19

Some vulnerabilities have been reported in Opera, which can be
exploited by malicious people to bypass certain security restrictions,
disclose sensitive information, and compromise a user's system.

Full Advisory:
http://secunia.com/advisories/28169/ 

 --

[SA28161] Adobe Flash Player Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Unknown, Security Bypass, Cross Site Scripting,
Manipulation of data, Exposure of sensitive information, Privilege
escalation, DoS, System access
Released:    2007-12-19

Some vulnerabilities have been reported in Adobe Flash Player, where
one vulnerability has an unknown impact and others can be exploited by
malicious, local users to gain escalated privileges and by malicious
people to bypass certain security restrictions, conduct cross-site
scripting and HTTP request splitting attacks, disclose sensitive
information, cause a Denial of Service (DoS), or to potentially
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/28161/ 

 --

[SA28117] ClamAV "cli_scanpe()" MEW Handling Integer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-19

A vulnerability has been reported in ClamAV, which can be exploited by
malicious people to cause a DoS (Denial of Service) or compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/28117/ 

 --

[SA28095] SquirrelMail Package Compromise

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-14

A package compromise has been reported in SquirrelMail, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28095/ 

 --

[SA28092] Apple QuickTime Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-14

Some vulnerabilities have been reported in Apple QuickTime, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/28092/ 

 --

[SA28155] phpMyRealty Two SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-12-19

Koller has reported two vulnerabilities in phpMyRealty (PMR), which can
be exploited by malicious people and malicious users to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/28155/ 

 --

[SA28154] Dokeos "My productions" Multiple Extensions File Upload
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-12-19

A vulnerability has been discovered in Dokeos, which can be exploited
by malicious users to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28154/ 

 --

[SA28138] PunBB Automatic Image Upload with Thumbnails Module File
Upload

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, System access
Released:    2007-12-18

Peter sterberg has discovered a vulnerability in the Automatic Image
Upload with Thumbnails module for PunBB, which can be exploited by
malicious users to conduct cross-site scripting attacks and to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28138/ 

 --

[SA28137] LineShout Two Script Insertion Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-18

David Sopas has reported two vulnerabilities in LineShout, which can be
exploited by malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/28137/ 

 --

[SA28126] FreeWebshop.org Admin Credentials Information Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information
Released:    2007-12-17

k1tk4t has discovered a vulnerability in FreeWebshop.org, which can be
exploited by malicious people to bypass certain security restrictions
and to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/28126/ 

 --

[SA28124] Hammer of Thyrion "HuffDecode()" Buffer Overflow
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-17

A vulnerability has been reported in Hammer of Thyrion, which can be
exploited by malicious people to cause a DoS (Denial of Service) or to
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28124/ 

 --

[SA28119] PHP Real Estate Classifieds "id" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-12-18

t0pP8uZz & xprog have reported a vulnerability in PHP Real Estate
Classifieds, which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/28119/ 

 --

[SA28110] exiftags Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-17

Some vulnerabilities have been reported in exiftags, which potentially
can be exploited by malicious people to cause a DoS (Denial of Service)
or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28110/ 

 --

[SA28098] CourseMill Learning Management System "user" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-12-14

sasquatch has reported a vulnerability in CourseMill Learning
Management System, which can be exploited by malicious people to
conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/28098/ 

 --

[SA28164] GF-3XPLORER Cross-Site Scripting and Information Disclosure

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-19

MhZ91 has discovered a vulnerability and a security issue in
GF-3XPLORER, which can be exploited by malicious people to conduct
cross-site scripting attacks or to disclose system information.

Full Advisory:
http://secunia.com/advisories/28164/ 

 --

[SA28149] Asterisk Registration Database Security Bypass

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-12-19

A security issue has been reported in Asterisk, which can be exploited
by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/28149/ 

 --

[SA28133] Mambo Two Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-19

Beenu Arora has discovered two vulnerabilities in Mambo, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/28133/ 

 --

[SA28130] WordPress Draft Information Disclosure

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information
Released:    2007-12-19

Michael Brooks has discovered a vulnerability in WordPress, which can
be exploited by malicious people to bypass certain security
restrictions and to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/28130/ 

 --

[SA28122] Google Web Toolkit Benchmark Reporting System Cross-Site
Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-18

A vulnerability has been reported in Google Web Toolkit, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/28122/ 

 --

[SA28116] Ganglia Web Interface Multiple Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-17

Some vulnerabilities have been reported in Ganglia, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/28116/ 

 --

[SA28106] Flyspray Two Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-17

Two vulnerabilities have been reported in Flyspray, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/28106/ 

 --

[SA28118] syslog-ng Timestamps Denial of Service Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2007-12-18

A vulnerability has been reported in syslog-ng, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/28118/ 



=======================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/ 

Subscribe:
http://secunia.com/secunia_weekly_summary/ 

Contact details:
Web	: http://secunia.com/ 
E-mail	: support@secunia.com 
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


__________________________________________________________________      
Visit InfoSec News
http://www.infosecnews.org/ 

Site design & layout copyright © 1986-2014 CodeGods