AOH :: IS1474.HTM

Secunia Weekly Summary - Issue: 2008-50




Secunia Weekly Summary - Issue: 2008-50
Secunia Weekly Summary - Issue: 2008-50



=======================================================================
                  The Secunia Weekly Advisory Summary                  
                        2008-12-04 - 2008-12-11                        

                       This week: 96 advisories                        

=======================================================================Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

=======================================================================1) Word From Secunia:

1.91% of all PCs are fully patched! 

Almost one year ago, we posted statistics from the Secunia PSI about
the state of programs installed on PCs.

We think the timing is just right for a follow up on the previous
numbers - as you might have noticed, Tuesday last week (25th Nov)
version 1.0 of the Secunia PSI was released. The Secunia PSI 1.0 is out
after being in beta for the past 17 months - a huge thanks goes out to
all 793,478 users that helped us test and improve the Secunia PSI
during this period.

Read more:
http://secunia.com/blog/37/ 

 --

Monthly Binary Analysis Update (November)

Last month, we were extremely busy and cranked out 28 analyses, but
this month it was fairly quiet on the Binary Analysis front. We issued
only 15 analyses in total, which is probably (without checking) the
most quiet month we've had ever since the service launch about two
years ago.

However, that does not mean that I caught a lucky break and can stop
writing after only three paragraphs and go back to finding a new
vulnerability; there were still plenty of interesting vulnerabilities
to analyse this month and thus blog about.

Read more:
http://secunia.com/blog/36/ 

=======================================================================2) This Week in Brief:

A vulnerability has been discovered in Internet Explorer, which can be
exploited by malicious people to compromise a user's system.

Successful exploitation allows execution of arbitrary code.

NOTE: Reportedly, the vulnerability is currently being actively
exploited.

No patch is currently available from the vendor.

For more information, refer to:
http://secunia.com/advisories/33089/ 

 --

Microsoft has released their security bulletins for December.

For more information, refer to:
http://secunia.com/advisories/31498/ 
http://secunia.com/advisories/33035/ 
http://secunia.com/advisories/33020/ 
http://secunia.com/advisories/31593/ 
http://secunia.com/advisories/33063/ 
http://secunia.com/advisories/33053/ 
http://secunia.com/advisories/30285/ 
http://secunia.com/advisories/26534/ 
http://secunia.com/advisories/33058/ 

=======================================================================3) This Weeks Top Ten Most Read Advisories:

1.  [SA32991] Sun Java JDK / JRE Multiple Vulnerabilities
2.  [SA32270] Adobe Flash Player Multiple Security Issues and
              Vulnerabilities
3.  [SA33089] Internet Explorer Data Binding Memory Corruption
              Vulnerability
4.  [SA32942] VLC Media Player Real Demuxer Integer Overflow
              Vulnerability
5.  [SA29773] Adobe Acrobat/Reader Multiple Vulnerabilities
6.  [SA31821] Apple QuickTime Multiple Vulnerabilities
7.  [SA33035] Microsoft Internet Explorer Multiple Vulnerabilities
8.  [SA32997] Microsoft Windows WordPad Text Converter Vulnerability
9.  [SA30285] Microsoft Office Word Multiple Vulnerabilities
10. [SA33001] Trillian Multiple Vulnerabilities

=======================================================================4) Vulnerabilities Summary Listing

Windows:
[SA33089] Internet Explorer Data Binding Memory Corruption
Vulnerability
[SA33035] Microsoft Internet Explorer Multiple Vulnerabilities
[SA33020] Microsoft Windows GDI Image Parsing Vulnerabilities
[SA33080] CF Shopkart SQL Injection and Database Disclosure
[SA33074] CF_Calendar "calid" SQL Injection Vulnerability
[SA33070] CFMBlog "categorynbr" SQL Injection Vulnerability
[SA33067] PostEcards "cid" SQL Injection and Database Disclosure
[SA33064] CF_Forum "categorynbr" SQL Injection Vulnerability
[SA33063] Microsoft Office SharePoint Server Security Bypass
Vulnerability
[SA33053] Microsoft Windows Explorer Search Handling Vulnerabilities
[SA33044] Poll Pro "Password" SQL Injection Vulnerability
[SA33030] Professional Download Assistant SQL Injections and Database
Disclosure
[SA33029] Ikon AdManager "ikonBAnner_AdManager.mdb" Database
Disclosure
[SA33018] Educate Server "db.mdb" Database Disclosure Security Issue
[SA33012] RankEm "txtusername" and "txtpassword" SQL Injection
Vulnerabilities
[SA33011] NightFall Personal Diary Database Disclosure and Cross-Site
Scripting
[SA33009] Teamworx Server SQL Injection and Database Disclosure
[SA33008] QMail Mailing List Manager Database Disclosure
[SA33004] ASP Auto Dealer "ID" SQL Injection Vulnerability
[SA33060] 3CX Phone System "fName" and "fPassword" Cross-Site
Scripting
[SA33034] Microsoft SQL Server 2000 "sp_replwritetovarbin()" Buffer
Overflow
[SA33017] Orb Networks Orb HTTP Processing Denial of Service

UNIX/Linux:
[SA33058] Microsoft Windows Media Products Two Vulnerabilities
[SA33056] Fedora update for java-1.6.0-openjdk
[SA33054] Fedora update for squirrelmail 
[SA33040] TWiki Cross-Site Scripting and Command Injection
Vulnerabilities
[SA33015] Red Hat update for java-1.5.0-sun / java-1.6.0-sun
[SA33120]  Sun Java System Portal Server File Disclosure Vulnerability
[SA33108] Sun Ray Server Software Two Vulnerabilities
[SA33104] HP-UX DCE Unspecified Denial of Service Vulnerability
[SA33094] SUSE update for pdns
[SA33093] SUSE update for squirrelmail
[SA33091] SUSE update for gnutls
[SA33087] SUSE Update for Multiple Packages
[SA33082] Ubuntu update for vinagre
[SA33071] Debian update for squirrelmail
[SA33066] Debian update for lcms
[SA33061] Debian update for streamripper
[SA33052] Red Hat update for tomcat
[SA33050] Sun Solaris OpenSSL PKCS#11 Denial of Service Vulnerability
[SA33046] Fedora update for vinagre
[SA33041] Vinagre "vinagre_utils_show_error()" Format String
Vulnerability
[SA33016] Debian update for clamav
[SA33013] Red Hat update for ruby
[SA33010] SUSE update for kernel
[SA33111] Gentoo update for cups
[SA33085] Avaya Messaging Storage Server CUPS Multiple Vulnerabilities
[SA33116] Gentoo update for Archive-Tar
[SA33115] Gentoo update for opensc
[SA33121] Sun Solaris SSH CBC Mode Plaintext Recovery Vulnerability
[SA33095] Avaya Products Net-snmp GETBULK Denial of Service
[SA33092] SUSE update for samba
[SA33006] Ubuntu update for nfs-utils
[SA33119] Sun Ray Windows Connector Information Disclosure
Vulnerability
[SA33055] Fedora update for dbus 
[SA33051] Gentoo update for mgetty
[SA33047] D-Bus Default Configuration Security Bypass
[SA33005] Avaya Products ed "strip_escapes()" Buffer Overflow Security
Issue
[SA33083] rPath update for kernel
[SA33081] Ubuntu update for compiz-fusion-plugins-main
[SA33078] Linux Kernel MIPS Syscall Denial of Service
[SA33077] Compiz Fusion Expo Plugin Security Bypass

Other:
[SA33032] Linksys WVC54GC Information Disclosure and ActiveX Control
Buffer Overflow
[SA33057] Aruba Mobility Controller EAP Frame Denial of Service
[SA33028] HP DECnet-Plus for OpenVMS Security Bypass

Cross Platform:
[SA33043] DesignWorks Professional ".cct" Buffer Overflow
Vulnerability
[SA33007] Tizag Countdown Creator File Upload Vulnerability
[SA33112] Drupal Cross-Site Request Forgery and Script Insertion
[SA33106] Max's Guestbook "name" and "email" Script Insertion
[SA33097] eZ Publish Insufficient User ID Validation Vulnerability
[SA33096] Webmaster Marketplace "u" SQL Injection Vulnerability
[SA33088] Pro Chat Rooms Cross-Site Scripting and Script Insertion
[SA33086] Butterfly Organizer "id" and "mytable" SQL Injection
Vulnerabilities
[SA33084] Atlassian JIRA Dynamic URL Transformation Vulnerability
[SA33073] Peel "rubid" SQL Injection vulnerability
[SA33065] PHP Multiple Newsletters File Inclusion and Cross-Site
Scripting
[SA33048] XOOPS Script Insertion and Local File Inclusion
[SA33039] IPN Pro 3 "settings.php" Security Bypass Vulnerability
[SA33038] DL PayCart "settings.php" Security Bypass Vulnerability
[SA33037] Bonza Cart "ad_settings.php" Security Bypass Vulnerability
[SA33033] w3blabor CMS Multiple Vulnerabilities
[SA33031] phpBB Tag Board Module "id" SQL Injection Vulnerability
[SA33027] phpAddEdit "editform" Local File Inclusion Vulnerability
[SA33024] BPowerHouse Multiple Products "page" and "admin" Local File
Inclusion
[SA33021] Tribiq CMS "cID" SQL Injection Vulnerability
[SA33019] Multiple Membership Script "id" SQL Injection Vulnerability
[SA33014] phpPgAdmin "_language" Local File Inclusion  Vulnerability
[SA33049] BMC PATROL Version Logging Format String Vulnerability
[SA33079] Moodle Unspecified Cross-Site Scripting Vulnerability
[SA33076] phpMyAdmin Cross-Site Request Forgery Vulnerability
[SA33069] PhPepperShop Webshop Multiple Cross-Site Scripting
Vulnerabilities
[SA33023] ImpressCMS "rank_title" Script Insertion Vulnerability
[SA33022] IBM WebSphere Application Server Multiple Vulnerabilities
[SA33062] Google Gears Cross-Site Scripting Weakness
[SA33059] PunBB Cross-Site Scripting and SQL Injection Vulnerabilities
[SA33025] Tor Two Weaknesses

=======================================================================5) Vulnerabilities Content Listing

Windows:--

[SA33089] Internet Explorer Data Binding Memory Corruption
Vulnerability

Critical:    Extremely critical
Where:       From remote
Impact:      System access
Released:    2008-12-10

A vulnerability has been discovered in Internet Explorer, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/33089/ 

 --

[SA33035] Microsoft Internet Explorer Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-12-09

Some vulnerabilities have been reported in Microsoft Internet Explorer,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/33035/ 

 --

[SA33020] Microsoft Windows GDI Image Parsing Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-12-09

Some vulnerabilities have been reported in Microsoft Windows, which can
be exploited by malicious people to potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/33020/ 

 --

[SA33080] CF Shopkart SQL Injection and Database Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-12-11

AlpHaNiX has reported a vulnerability and a security issue in CF
Shopkart, which can be exploited by malicious people to conduct SQL
injection attacks and disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/33080/ 

 --

[SA33074] CF_Calendar "calid" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-11

AlpHaNiX has reported a vulnerability in CF_Calendar, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33074/ 

 --

[SA33070] CFMBlog "categorynbr" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-11

AlpHaNiX has reported a vulnerability in CFMBlog, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33070/ 

 --

[SA33067] PostEcards "cid" SQL Injection and Database Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data, Exposure of
sensitive information
Released:    2008-12-10

AlpHaNiX has reported a vulnerability and a security issue in
PostEcards, which can be exploited by malicious people to conduct SQL
injection attacks and disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/33067/ 

 --

[SA33064] CF_Forum "categorynbr" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-11

AlpHaNiX has reported a vulnerability in CF_Forum, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33064/ 

 --

[SA33063] Microsoft Office SharePoint Server Security Bypass
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-12-09

A vulnerability has been reported in Microsoft Office SharePoint
Server, which can be exploited by malicious people to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/33063/ 

 --

[SA33053] Microsoft Windows Explorer Search Handling Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2008-12-09

Some vulnerabilities have been reported in Microsoft Windows, which can
be exploited by malicious people to potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/33053/ 

 --

[SA33044] Poll Pro "Password" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-09

A vulnerability has been reported in Poll Pro, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33044/ 

 --

[SA33030] Professional Download Assistant SQL Injections and Database
Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-12-09

A security issue and some vulnerabilities have been discovered in
Professional Download Assistant, which can be exploited by malicious
people to disclose sensitive information and conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/33030/ 

 --

[SA33029] Ikon AdManager "ikonBAnner_AdManager.mdb" Database
Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2008-12-08

Ghost Hacker has discovered a security issue in Ikon AdManager, which
can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/33029/ 

 --

[SA33018] Educate Server "db.mdb" Database Disclosure Security Issue

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2008-12-08

ZoRLu has reported a security issue in Educate Server, which can be
exploited by malicious people to  disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/33018/ 

 --

[SA33012] RankEm "txtusername" and "txtpassword" SQL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2008-12-08

OffensiveTrack has discovered some vulnerabilities in RankEm, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33012/ 

 --

[SA33011] NightFall Personal Diary Database Disclosure and Cross-Site
Scripting

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of sensitive information
Released:    2008-12-08

OffensiveTrack has discovered a vulnerability and a security issue in
Nightfall Personal Diary, which can be exploited by malicious people to
conduct cross-site scripting attacks and disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/33011/ 

 --

[SA33009] Teamworx Server SQL Injection and Database Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-12-08

ZoRLu has reported a vulnerability and a security issue in Teamworx
Server, which can be exploited by malicious people to conduct SQL
injection attacks and disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/33009/ 

 --

[SA33008] QMail Mailing List Manager Database Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2008-12-09

A security issue has been discovered in QMail Mailing List Manager,
which can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/33008/ 

 --

[SA33004] ASP Auto Dealer "ID" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-08

OffensiveTrack has reported a vulnerability in ASP Auto Dealer, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33004/ 

 --

[SA33060] 3CX Phone System "fName" and "fPassword" Cross-Site
Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-09

Chris Castaldo has discovered some vulnerabilities in 3CX Phone System,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/33060/ 

 --

[SA33034] Microsoft SQL Server 2000 "sp_replwritetovarbin()" Buffer
Overflow

Critical:    Less critical
Where:       From local network
Impact:      Privilege escalation
Released:    2008-12-09

Bernhard Mueller has discovered a vulnerability in Microsoft SQL Server
2000, which can be exploited by malicious users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/33034/ 

 --

[SA33017] Orb Networks Orb HTTP Processing Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2008-12-08

A vulnerability has been reported in Orb Networks Orb, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/33017/ 


UNIX/Linux:--

[SA33058] Microsoft Windows Media Products Two Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information, System
access
Released:    2008-12-09

Two vulnerabilities have been reported in several Microsoft Windows
Media products, which can be exploited by malicious people to bypass
certain security restrictions or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/33058/ 

 --

[SA33056] Fedora update for java-1.6.0-openjdk

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Exposure of system information, Exposure
of sensitive information, DoS, System access
Released:    2008-12-08

Fedora has issued an update for java-1.6.0-openjdk. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, disclose sensitive information, cause a
DoS (Denial of service), or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/33056/ 

 --

[SA33054] Fedora update for squirrelmail 

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, System access
Released:    2008-12-08

Fedora has issued an update for squirrelmail. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system and conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/33054/ 

 --

[SA33040] TWiki Cross-Site Scripting and Command Injection
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, System access
Released:    2008-12-08

Some vulnerabilities have been reported in TWiki, which can be
exploited by malicious people to conduct cross-site scripting attacks
or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/33040/ 

 --

[SA33015] Red Hat update for java-1.5.0-sun / java-1.6.0-sun

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Exposure of system information, Exposure
of sensitive information, DoS, System access
Released:    2008-12-05

Red Hat has issued an update for java-1.5.0-sun and java-1.6.0-sun.
This fixes some vulnerabilities, which can be exploited by malicious
people to bypass certain security restrictions, disclose sensitive
information, cause a DoS (Denial of service), or compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/33015/ 

 --

[SA33120]  Sun Java System Portal Server File Disclosure Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2008-12-11

Sun has acknowledged a vulnerability in Sun Java System Portal Server,
which can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/33120/ 

 --

[SA33108] Sun Ray Server Software Two Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2008-12-11

Sun has acknowledged two vulnerabilities in Sun Ray Server Software,
which can be exploited by malicious, local users or by malicious people
to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/33108/ 

 --

[SA33104] HP-UX DCE Unspecified Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2008-12-11

A vulnerability has been reported in HP-UX, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/33104/ 

 --

[SA33094] SUSE update for pdns

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2008-12-10

SUSE has issued an update for pdns. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/33094/ 

 --

[SA33093] SUSE update for squirrelmail

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-10

SUSE has issued an update for squirrelmail. This fixes a vulnerability,
which can be exploited by malicious people to conduct script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/33093/ 

 --

[SA33091] SUSE update for gnutls

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Spoofing
Released:    2008-12-10

SUSE has issued an update for gnutls. This fixes a vulnerability, which
can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/33091/ 

 --

[SA33087] SUSE Update for Multiple Packages

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data, DoS
Released:    2008-12-10

SUSE has issued an update for multiple packages. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service) and bypass certain security
restrictions, and malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33087/ 

 --

[SA33082] Ubuntu update for vinagre

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2008-12-10

Ubuntu has issued an update for vinagre. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/33082/ 

 --

[SA33071] Debian update for squirrelmail

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-09

Debian has issued an update for squirrelmail. This fixes a
vulnerability, which can be exploited by malicious people to conduct
script insertion attacks.

Full Advisory:
http://secunia.com/advisories/33071/ 

 --

[SA33066] Debian update for lcms

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2008-12-10

Debian has issued an update for lcms. This fixes some vulnerabilities,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/33066/ 

 --

[SA33061] Debian update for streamripper

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2008-12-09

Debian has issued an update for streamripper. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/33061/ 

 --

[SA33052] Red Hat update for tomcat

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Exposure of system
information, Exposure of sensitive information
Released:    2008-12-08

Red Hat has issued an update for tomcat. This fixes a security issue
and some vulnerabilities, which can be exploited by malicious people to
conduct cross-site scripting attacks, bypass certain security
restrictions, or disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/33052/ 

 --

[SA33050] Sun Solaris OpenSSL PKCS#11 Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2008-12-08

A vulnerability has been reported in Sun Solaris, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/33050/ 

 --

[SA33046] Fedora update for vinagre

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2008-12-08

Fedora has issued an update for vinagre. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/33046/ 

 --

[SA33041] Vinagre "vinagre_utils_show_error()" Format String
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2008-12-08

A vulnerability has been discovered in Vinagre, which can be exploited
by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/33041/ 

 --

[SA33016] Debian update for clamav

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-12-05

Debian has issued an update for clamav. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/33016/ 

 --

[SA33013] Red Hat update for ruby

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2008-12-05

Red Hat has issued an update for ruby. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/33013/ 

 --

[SA33010] SUSE update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      Privilege escalation, DoS, System access
Released:    2008-12-05

SUSE has issued an update for the kernel. This fixes a security issue
and some vulnerabilities, which can be exploited by malicious, local
users to gain escalated privileges and cause a DoS (Denial of Service)
and malicious people to cause a DoS or potentially compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/33010/ 

 --

[SA33111] Gentoo update for cups

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2008-12-11

Gentoo has issued an update for cups. This fixes some vulnerabilities,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/33111/ 

 --

[SA33085] Avaya Messaging Storage Server CUPS Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2008-12-10

Avaya has acknowledged some vulnerabilities in Messaging Storage
Server, which potentially can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/33085/ 

 --

[SA33116] Gentoo update for Archive-Tar

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2008-12-11

Gentoo has issued an update for Archive-Tar. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/33116/ 

 --

[SA33115] Gentoo update for opensc

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-12-11

Gentoo has issued an update for opensc. This fixes a security issue,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/33115/ 

 --

[SA33121] Sun Solaris SSH CBC Mode Plaintext Recovery Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      Exposure of sensitive information
Released:    2008-12-11

Sun has acknowledged a vulnerability in Solaris, which potentially can
be exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/33121/ 

 --

[SA33095] Avaya Products Net-snmp GETBULK Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2008-12-10

Avaya has acknowledged a vulnerability in various Avaya products, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/33095/ 

 --

[SA33092] SUSE update for samba

Critical:    Less critical
Where:       From local network
Impact:      Exposure of sensitive information
Released:    2008-12-10

SUSE has issued an update for samba. This fixes a vulnerability, which
potentially can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/33092/ 

 --

[SA33006] Ubuntu update for nfs-utils

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass
Released:    2008-12-05

Ubuntu has issued an update for nfs-utils. This fixes a vulnerability,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/33006/ 

 --

[SA33119] Sun Ray Windows Connector Information Disclosure
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2008-12-11

Sun has acknowledged a vulnerability in Sun Ray Windows Connector,
which can be exploited by malicious, local users to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/33119/ 

 --

[SA33055] Fedora update for dbus 

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2008-12-08

Fedora has issued an update for dbus. This fixes a security issue,
which can be exploited by malicious, local users to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/33055/ 

 --

[SA33051] Gentoo update for mgetty

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2008-12-08

Gentoo has issued an update for mgetty. This fixes a security issue,
which can be exploited by malicious, local users to perform certain
actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/33051/ 

 --

[SA33047] D-Bus Default Configuration Security Bypass

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2008-12-08

A security issue has been reported in D-Bus, which can be exploited by
malicious, local users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/33047/ 

 --

[SA33005] Avaya Products ed "strip_escapes()" Buffer Overflow Security
Issue

Critical:    Not critical
Where:       From remote
Impact:      System access
Released:    2008-12-05

Avaya has acknowledged a security issue in various Avaya products,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/33005/ 

 --

[SA33083] rPath update for kernel

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2008-12-10

rPath has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/33083/ 

 --

[SA33081] Ubuntu update for compiz-fusion-plugins-main

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2008-12-09

Ubuntu has issued an update for compiz-fusion-plugins-main. This fixes
a security issue, which can be exploited by malicious people with
physical access to a system to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/33081/ 

 --

[SA33078] Linux Kernel MIPS Syscall Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2008-12-09

A vulnerability has been reported in the Linux Kernel, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/33078/ 

 --

[SA33077] Compiz Fusion Expo Plugin Security Bypass

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2008-12-09

A security issue has been reported in Compiz Fusion, which can be
exploited by malicious people with physical access to a system to
bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/33077/ 


Other:--

[SA33032] Linksys WVC54GC Information Disclosure and ActiveX Control
Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2008-12-08

A security issue and a vulnerability have been reported in Linksys
WVC54GC, which can be exploited by malicious people to disclose system
and sensitive information and to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/33032/ 

 --

[SA33057] Aruba Mobility Controller EAP Frame Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2008-12-09

A vulnerability has been reported in Aruba Mobility Controller, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/33057/ 

 --

[SA33028] HP DECnet-Plus for OpenVMS Security Bypass

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2008-12-09

A weakness has been reported in HP DECnet-Plus for OpenVMS, which can
be exploited by malicious, local users to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/33028/ 


Cross Platform:--

[SA33043] DesignWorks Professional ".cct" Buffer Overflow
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-12-08

Cn4phux has discovered a vulnerability in DesignWorks Professional,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/33043/ 

 --

[SA33007] Tizag Countdown Creator File Upload Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-12-08

ahmadbady has discovered a vulnerability in Tizag Countdown Creator,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/33007/ 

 --

[SA33112] Drupal Cross-Site Request Forgery and Script Insertion

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-11

Some vulnerabilities have been reported in Drupal, which can be
exploited by malicious people to conduct cross-site request forgery and
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/33112/ 

 --

[SA33106] Max's Guestbook "name" and "email" Script Insertion

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-11

GTADarkDude has discovered some vulnerabilities in Max's Guestbook,
which can be exploited by malicious people to conduct script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/33106/ 

 --

[SA33097] eZ Publish Insufficient User ID Validation Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-12-11

A vulnerability has been reported in eZ Publish, which can be exploited
by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/33097/ 

 --

[SA33096] Webmaster Marketplace "u" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-11

Hussin X has reported a vulnerability in Webmaster Marketplace, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33096/ 

 --

[SA33088] Pro Chat Rooms Cross-Site Scripting and Script Insertion

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-11

ZynbER has reported some vulnerabilities in Pro Chat Rooms, which can
be exploited by malicious people to conduct cross-site scripting and
script insertion attacks.

Full Advisory:
http://secunia.com/advisories/33088/ 

 --

[SA33086] Butterfly Organizer "id" and "mytable" SQL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-11

Osirys has discovered some vulnerabilities in Butterfly Organizer,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/33086/ 

 --

[SA33084] Atlassian JIRA Dynamic URL Transformation Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-12-10

A vulnerability has been reported in Atlassian JIRA, which can be
exploited by malicious users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/33084/ 

 --

[SA33073] Peel "rubid" SQL Injection vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-10

SuB-ZeRo has reported a vulnerability in Peel, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33073/ 

 --

[SA33065] PHP Multiple Newsletters File Inclusion and Cross-Site
Scripting

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of system information,
Exposure of sensitive information
Released:    2008-12-10

Ahmadbady has discovered some vulnerabilities in PHP Multiple
Newsletters, which can be exploited by malicious people to conduct
cross-site scripting attacks and disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/33065/ 

 --

[SA33048] XOOPS Script Insertion and Local File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of sensitive information
Released:    2008-12-08

Some vulnerabilities have been reported in XOOPS, which can be
exploited by malicious users to conduct script insertion attacks and
malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/33048/ 

 --

[SA33039] IPN Pro 3 "settings.php" Security Bypass Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-12-10

G4N0K has reported a vulnerability in IPN Pro 3, which can be exploited
by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/33039/ 

 --

[SA33038] DL PayCart "settings.php" Security Bypass Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-12-10

G4N0K has reported a vulnerability in DL PayCart, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/33038/ 

 --

[SA33037] Bonza Cart "ad_settings.php" Security Bypass Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-12-10

G4N0K has reported a vulnerability in Bonza Cart, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/33037/ 

 --

[SA33033] w3blabor CMS Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of system information, Exposure
of sensitive information
Released:    2008-12-09

DNX has discovered a vulnerability and a security issue in w3blabor
CMS, which can be exploited by malicious people to compromise a
vulnerable system and disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/33033/ 

 --

[SA33031] phpBB Tag Board Module "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-09

Athos has discovered a vulnerability in the Tag Board module for phpBB,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/33031/ 

 --

[SA33027] phpAddEdit "editform" Local File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2008-12-11

Nuclear has discovered a vulnerability in phpAddEdit, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/33027/ 

 --

[SA33024] BPowerHouse Multiple Products "page" and "admin" Local File
Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2008-12-08

cOndemned has discovered some vulnerabilities in multiple BPowerHouse
products, which can be exploited by malicious people to disclose
sensitive information.

Full Advisory:
http://secunia.com/advisories/33024/ 

 --

[SA33021] Tribiq CMS "cID" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-05

M4ck-h@cK has discovered a vulnerability in Tribiq CMS, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/33021/ 

 --

[SA33019] Multiple Membership Script "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-12-08

ViRuS_HaCkErS has reported a vulnerability in Multiple Membership
Script, which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/33019/ 

 --

[SA33014] phpPgAdmin "_language" Local File Inclusion  Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2008-12-08

Dun has discovered a vulnerability in phpPgAdmin, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/33014/ 

 --

[SA33049] BMC PATROL Version Logging Format String Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2008-12-09

A vulnerability has been reported in BMC PATROL, which can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/33049/ 

 --

[SA33079] Moodle Unspecified Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-11

A vulnerability has been reported in Moodle, which can be exploited by
malicious users to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/33079/ 

 --

[SA33076] phpMyAdmin Cross-Site Request Forgery Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-10

A vulnerability has been reported in phpMyAdmin, which can be exploited
by malicious people to conduct cross-site request forgery attacks.

Full Advisory:
http://secunia.com/advisories/33076/ 

 --

[SA33069] PhPepperShop Webshop Multiple Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-09

Some vulnerabilities have been reported in PhPepperShop Webshop, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/33069/ 

 --

[SA33023] ImpressCMS "rank_title" Script Insertion Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-05

Muhaimin Dzulfakar has discovered a vulnerability in ImpressCMS, which
can be exploited by malicious people to conduct script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/33023/ 

 --

[SA33022] IBM WebSphere Application Server Multiple Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Unknown, Exposure of sensitive information
Released:    2008-12-08

Some vulnerabilities have been reported in IBM WebSphere Application
Server, where some have an unknown impact and others can be exploited
by malicious people to disclose potentially sensitive information.

Full Advisory:
http://secunia.com/advisories/33022/ 

 --

[SA33062] Google Gears Cross-Site Scripting Weakness

Critical:    Not critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-12-09

Yair Amit has reported a weakness in Google Gears, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/33062/ 

 --

[SA33059] PunBB Cross-Site Scripting and SQL Injection Vulnerabilities

Critical:    Not critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2008-12-09

Some vulnerabilities have been reported in PunBB, which can be
exploited by malicious people to conduct cross-site scripting and SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/33059/ 

 --

[SA33025] Tor Two Weaknesses

Critical:    Not critical
Where:       From remote
Impact:      Security Bypass, Privilege escalation
Released:    2008-12-05

Two weaknesses have been reported in Tor, which can be exploited by
malicious, local users to potentially perform certain actions with
escalated privileges or by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/33025/ 



=======================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/ 

Subscribe:
http://secunia.com/advisories/weekly_summary/ 

Contact details:
Web	: http://secunia.com/ 
E-mail	: support@secunia.com 
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_______________________________________________      
Help InfoSecNews.org with a donation!
http://www.infosecnews.org/donate.html 

Site design & layout copyright © 1986-2014 CodeGods