Information Security News mailing list archives
Secunia Weekly Summary - Issue: 2007-8
From: InfoSec News <alerts () infosecnews org>
Date: Fri, 23 Feb 2007 03:24:27 -0600 (CST)
========================================================================
The Secunia Weekly Advisory Summary
2007-02-15 - 2007-02-22
This week: 62 advisories
========================================================================
Table of Contents:
1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing
========================================================================
1) Word From Secunia:
Secunia blog entry about the "availability" of the latest Apple
QuickTime security update.
The update is ready, yet users are still only able to download the
vulnerable version from Apple.com - without any indication or guidance
about why or how to secure it:
http://secunia.com/blog/7/
Exploitation appears to be straight forward and the QuickTime player
is installed on more than 50% of all computers!
Use the Secunia Software Inspector for verification and real guidance
on how to secure your QuickTime player:
http://secunia.com/software_Inspector/
--
Should you be interesting in a career within Secunia, the current job
openings are available right now:
Security Sales Engineer:
http://corporate.secunia.com/about_secunia/54/
German Key Account Manager:
http://corporate.secunia.com/about_secunia/55/
International Account Manager - Enterprise Sales:
http://corporate.secunia.com/about_secunia/52/
International Sales Manager - IT Security Partner:
http://corporate.secunia.com/about_secunia/51/
Danish: Disassembling og Reversing
http://secunia.com/Disassembling_og_Reversing/
========================================================================
2) This Week in Brief:
Several vulnerabilities in various Trend Micro products were disclosed
this week, bringing the advisory count for Trend Micro to six this
year, and five so far for February alone.
The first advisory discussed two vulnerabilities caused by boundary
errors within the OfficeScan Corp Edition Web-Deployment SetupINI
ActiveX control (OfficeScanSetupINI.dll) on an OfficeScan client. This
could be exploited by passing overly long properties, for example when
a user visits a malicious web site.
Successful exploitation allows execution of arbitrary code, but
requires that the OfficeScan client was installed using web
deployment.
The vulnerabilities reportedly affect the following products:
* OfficeScan versions 7.3, 7.0, 6.5, and 5.58.
* Client Server Messaging Security versions 3.5, 3.0, and 2.0.
As of this writing, fixes only for Officescan versions 7.0 and 7.3,
and Client Server Messaging Security version 3.0 have been released.
For more information, refer to:
http://secunia.com/advisories/24193/
--
Four vulnerabilities were discovered in Trend Micro ServerProtect,
which could potentially allow a malicious person to compromise a
system on the local network.
All four vulnerabilities are boundary errors in various functions in
two library files, and could be exploited to cause stack-based buffer
overflows via specially crafted RPC requests.
Successful exploitation of the vulnerabilities allows execution of
arbitrary code with SYSTEM privileges.
The vulnerabilities are reported in the following versions:
* ServerProtect for Windows 5.58
* ServerProtect for EMC 5.58
* ServerProtect for Network Appliance Filer 5.61
* ServerProtect for Network Appliance Filer 5.62
A patch has been released for ServerProtect for Windows 5.58 in
English.
For more information, refer to:
http://secunia.com/advisories/24243/
--
A vulnerability in Trend Micro ServerProtect for Linux was also
disclosed, this time regarding a design error in the management web
interface. The error could be exploited to bypass user authentication
by requesting any page while supplying a "splx_2376_info" cookie with
an arbitrary value.
Successful exploitation, allows, for example, editing and disabling
anti-virus features on the server.
The vulnerability is reported in versions 1.3 and 2.5. Patches are
available for this vulnerability.
For more information, refer to:
http://secunia.com/advisories/24264/
--
VIRUS ALERTS:
During the past week Secunia collected 140 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.
========================================================================
3) This Weeks Top Ten Most Read Advisories:
1. [SA24122] Microsoft Word Unspecified Memory Corruption
Vulnerability
2. [SA24156] Internet Explorer Multiple Vulnerabilities
3. [SA24175] Mozilla Firefox "locations.hostname" DOM Property
Handling Vulnerability
4. [SA24198] Mac OS X Security Update Fixes Multiple Vulnerabilities
5. [SA24008] Microsoft Office Two Code Execution Vulnerabilities
6. [SA24153] Mozilla Firefox "_blank" Phishing Weakness
7. [SA24193] Trend Micro OfficeScan Client ActiveX Control Buffer
Overflows
8. [SA24160] Cisco PIX and ASA Privilege Escalation and Denial of
Service
9. [SA24197] SpamAssassin Long URI Denial of Service
10. [SA24187] ClamAV MIME Header Handling and CAB File Processing
Vulnerabilities
========================================================================
4) Vulnerabilities Summary Listing
Windows:
[SA24216] News Rover NZB File Processing Buffer Overflow
[SA24199] EasyMail Objects IMAP4 Component "Connect" Buffer Overflow
[SA24193] Trend Micro OfficeScan Client ActiveX Control Buffer
Overflows
[SA24261] NewsBin Pro NBI Configuration File Processing Buffer
Overflow
[SA24237] News File Grabber NZB File Processing Code Execution
[SA24209] Turuncu Portal "id" SQL Injection Vulnerability
[SA24208] Online Web Building "art_id" SQL Injection Vulnerability
[SA24243] Trend Micro ServerProtect Buffer Overflow Vulnerabilities
[SA24258] Cisco Secure Services Client Multiple Vulnerabilities
UNIX/Linux:
[SA24219] Ultimate Fun Book "gbpfad" File Inclusion Vulnerability
[SA24218] Red Hat update for koffice
[SA24202] Gentoo update for sun-jdk and sun-jre-bin
[SA24198] Mac OS X Security Update Fixes Multiple Vulnerabilities
[SA24189] Gentoo update for emul-linux-x86-java
[SA24182] VS-Gstebuch "gb_pfad" File Inclusion Vulnerability
[SA24271] Ubuntu update for ekiga and gnomemeeting
[SA24250] Red Hat update for spamassassin
[SA24248] Red Hat update for php
[SA24241] Fedora update for php
[SA24229] Mandriva update for ekiga
[SA24228] Fedora update for ekiga
[SA24224] PHP-Nuke HTTP "referer" SQL Injection Vulnerability
[SA24217] Ubuntu update for php
[SA24200] Fedora update for spamassassin
[SA24197] SpamAssassin Long URI Denial of Service
[SA24196] Ubuntu update for imagemagick
[SA24195] Red Hat update for php
[SA24194] Ekiga Format String Vulnerability
[SA24192] Mandriva update for clamav
[SA24186] Red Hat update for ImageMagick
[SA24185] Red Hat update for gnomemeeting
[SA24184] Gentoo update for fail2ban
[SA24264] Trend Micro ServerProtect for Linux Web Interface
Authentication Bypass
[SA24244] Ubuntu update for moinmoin
[SA24206] Avaya Products Kernel Multiple Vulnerabilities
[SA24204] SUSE update for poppler
[SA24203] Gentoo update for bind
[SA24188] Red Hat update for samba
[SA24247] Avaya CMS xfs / X Render and DBE Extensions Vulnerabilities
[SA24215] Linux Kernel NFSACL "ACCESS" Denial of Service
[SA24231] Nortel Net Direct Client for Linux Privilege Escalation
[SA24226] Mandriva update for gnucash
[SA24225] GnuCash Insecure Temporary Files
[SA24213] IBM DB2 DB2DIAG.LOG Insecure File Creation
[SA24210] Avaya Products XFree86 "DBE" and "Render" Extensions
Vulnerabilities
[SA24259] Mandriva update for kernel
Other:
[SA24240] Nortel Threat Protection System DCE/RPC Preprocessor Buffer
Overflow
[SA24239] Nortel Threat Protection System DCE/RPC Preprocessor Buffer
Overflow
[SA24235] Sourcefire Intrusion Sensor DCE/RPC Preprocessor Buffer
Overflow
[SA24262] Cisco Unified IP Conference Station / IP Phone Default
Accounts
Cross Platform:
[SA24230] phpMyFAQ Unspecified File Upload Vulnerability
[SA24220] VS-News-System "newsordner" File Inclusion Vulnerabilities
[SA24214] Htaccess Passwort Generator "ht_pfad" File Inclusion
Vulnerability
[SA24212] Interspire SendStudio "ROOTDIR" File Inclusion
Vulnerabilities
[SA24190] Snort DCE/RPC Preprocessor Buffer Overflow
[SA24260] deV!L'z Clanportal Local File Disclosure Vulnerability
[SA24242] phpTrafficA "file" and "lang" Local File Inclusion
[SA24191] webSPELL "showonly" SQL Injection Vulnerability
[SA24187] ClamAV MIME Header Handling and CAB File Processing
Vulnerabilities
[SA24222] MyCalendar Multiple Cross-Site Scripting Vulnerabilities
[SA24211] MediaWiki AJAX UTF-7 Cross-Site Scripting
[SA24181] libevent DNS Response Denial of Service
========================================================================
5) Vulnerabilities Content Listing
Windows:--
[SA24216] News Rover NZB File Processing Buffer Overflow
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2007-02-20
Marsu Pilami has discovered a vulnerability in News Rover, which can be
exploited by malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/24216/
--
[SA24199] EasyMail Objects IMAP4 Component "Connect" Buffer Overflow
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2007-02-16
Paul Graig has reported a vulnerability in EasyMail Objects, which can
be exploited by malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/24199/
--
[SA24193] Trend Micro OfficeScan Client ActiveX Control Buffer
Overflows
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2007-02-16
Some vulnerabilities have been discovered in Trend Micro OfficeScan,
which can be exploited by malicious people to compromise a user's
system.
Full Advisory:
http://secunia.com/advisories/24193/
--
[SA24261] NewsBin Pro NBI Configuration File Processing Buffer
Overflow
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2007-02-22
Marsu Pilami has discovered a vulnerability in NewsBin Pro, which can
be exploited by malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/24261/
--
[SA24237] News File Grabber NZB File Processing Code Execution
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2007-02-20
Marsu Pilami has discovered a vulnerability in News File Grabber, which
potentially can be exploited by malicious people to compromise a user's
system.
Full Advisory:
http://secunia.com/advisories/24237/
--
[SA24209] Turuncu Portal "id" SQL Injection Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Manipulation of data
Released: 2007-02-19
chernobiLe has discovered a vulnerability in Turuncu Portal, which can
be exploited by malicious people to conduct SQL injection attacks.
Full Advisory:
http://secunia.com/advisories/24209/
--
[SA24208] Online Web Building "art_id" SQL Injection Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Manipulation of data, Exposure of sensitive information
Released: 2007-02-21
xoron has reported a vulnerability in Online Web Building, which can be
exploited by malicious people to conduct SQL injection attacks.
Full Advisory:
http://secunia.com/advisories/24208/
--
[SA24243] Trend Micro ServerProtect Buffer Overflow Vulnerabilities
Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2007-02-21
TippingPoint Security Research Team has reported some vulnerabilities
in Trend Micro ServerProtect, which can be exploited by malicious
people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/24243/
--
[SA24258] Cisco Secure Services Client Multiple Vulnerabilities
Critical: Less critical
Where: Local system
Impact: Exposure of sensitive information, Privilege escalation
Released: 2007-02-22
Some vulnerabilities have been reported in Cisco Secure Services
Client, which can be exploited by malicious, local users to gain
knowledge of sensitive information or gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/24258/
UNIX/Linux:--
[SA24219] Ultimate Fun Book "gbpfad" File Inclusion Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2007-02-21
kezzap66345 has discovered a vulnerability in Ultimate Fun Book, which
can be exploited by malicious people to compromise a vulnerable
system.
Full Advisory:
http://secunia.com/advisories/24219/
--
[SA24218] Red Hat update for koffice
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2007-02-21
Red Hat has issued an update for koffice. This fixes a vulnerability,
which can be exploited by malicious people to potentially compromise a
user's system.
Full Advisory:
http://secunia.com/advisories/24218/
--
[SA24202] Gentoo update for sun-jdk and sun-jre-bin
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2007-02-19
Gentoo has issued an update for sun-jdk and sun-jre-bin. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a vulnerable system.
Full Advisory:
http://secunia.com/advisories/24202/
--
[SA24198] Mac OS X Security Update Fixes Multiple Vulnerabilities
Critical: Highly critical
Where: From remote
Impact: Privilege escalation, DoS, System access
Released: 2007-02-16
Apple has issued a security update for Mac OS X, which fixes multiple
vulnerabilities.
Full Advisory:
http://secunia.com/advisories/24198/
--
[SA24189] Gentoo update for emul-linux-x86-java
Critical: Highly critical
Where: From remote
Impact: Security Bypass, Privilege escalation, System access
Released: 2007-02-19
Gentoo has issued an update for emul-linux-x86-java. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions or compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/24189/
--
[SA24182] VS-Gstebuch "gb_pfad" File Inclusion Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2007-02-19
ajann has discovered a vulnerability in VS-Gstebuch, which can be
exploited by malicious people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/24182/
--
[SA24271] Ubuntu update for ekiga and gnomemeeting
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2007-02-22
Ubuntu has issued an update for ekiga and gnomemeeting. This fixes a
vulnerability, which can be exploited by malicious people to
potentially compromise a user's system.
Full Advisory:
http://secunia.com/advisories/24271/
--
[SA24250] Red Hat update for spamassassin
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2007-02-22
Red Hat has issued an update for spamassassin. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/24250/
--
[SA24248] Red Hat update for php
Critical: Moderately critical
Where: From remote
Impact: Security Bypass, Exposure of sensitive information, DoS,
System access
Released: 2007-02-21
Red Hat has issued an update for php. This fixes some vulnerabilities
and a weakness, which can be exploited by malicious people to disclose
potentially sensitive information, bypass certain security
restrictions, cause a DoS (Denial of Service) and potentially
compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/24248/
--
[SA24241] Fedora update for php
Critical: Moderately critical
Where: From remote
Impact: Security Bypass, Exposure of sensitive information, DoS,
System access
Released: 2007-02-22
Fedora has issued an update for php. This fixes some vulnerabilities,
which can be exploited by malicious people to disclose potentially
sensitive information, bypass certain security restrictions, cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.
Full Advisory:
http://secunia.com/advisories/24241/
--
[SA24229] Mandriva update for ekiga
Critical: Moderately critical
Where: From remote
Impact: System access, DoS
Released: 2007-02-22
Mandriva has issued an update for ekiga. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/24229/
--
[SA24228] Fedora update for ekiga
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2007-02-22
Fedora has issued an update for ekiga. This fixes a vulnerability,
which can be exploited by malicious people to potentially compromise a
user's system.
Full Advisory:
http://secunia.com/advisories/24228/
--
[SA24224] PHP-Nuke HTTP "referer" SQL Injection Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Manipulation of data
Released: 2007-02-21
Maciej "krasza" Kukla has discovered a vulnerability in PHP-Nuke, which
can be exploited by malicious people to conduct SQL injection attacks.
Full Advisory:
http://secunia.com/advisories/24224/
--
[SA24217] Ubuntu update for php
Critical: Moderately critical
Where: From remote
Impact: Exposure of sensitive information, DoS, System access
Released: 2007-02-22
Ubuntu has issued an update for php. This fixes some vulnerabilities
and a weakness, which can be exploited by malicious people to disclose
potentially sensitive information, cause a DoS (Denial of Service) and
potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/24217/
--
[SA24200] Fedora update for spamassassin
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2007-02-16
Fedora has issued an update for spamassassin. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/24200/
--
[SA24197] SpamAssassin Long URI Denial of Service
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2007-02-16
A vulnerability has been reported in SpamAssassin, which can be
exploited by malicious people to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/24197/
--
[SA24196] Ubuntu update for imagemagick
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2007-02-16
Ubuntu has issued an update for imagemagick. This fixes a
vulnerability, which can be exploited by malicious people to
potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/24196/
--
[SA24195] Red Hat update for php
Critical: Moderately critical
Where: From remote
Impact: Security Bypass, Exposure of sensitive information, DoS,
System access
Released: 2007-02-20
Red Hat has issued an update for php. This fixes some vulnerabilities
and a weakness, which can be exploited by malicious people to disclose
potentially sensitive information, bypass certain security
restrictions, cause a DoS (Denial of Service) and potentially
compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/24195/
--
[SA24194] Ekiga Format String Vulnerability
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2007-02-19
A vulnerability has been reported in Ekiga, which potentially can be
exploited by malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/24194/
--
[SA24192] Mandriva update for clamav
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2007-02-20
Mandriva has issued an update for clamav. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/24192/
--
[SA24186] Red Hat update for ImageMagick
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2007-02-16
Red Hat has issued an update for ImageMagick. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.
Full Advisory:
http://secunia.com/advisories/24186/
--
[SA24185] Red Hat update for gnomemeeting
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2007-02-20
Red Hat has issued an update for gnomemeeting. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/24185/
--
[SA24184] Gentoo update for fail2ban
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2007-02-16
Gentoo has issued an update for fail2ban. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
Full Advisory:
http://secunia.com/advisories/24184/
--
[SA24264] Trend Micro ServerProtect for Linux Web Interface
Authentication Bypass
Critical: Moderately critical
Where: From local network
Impact: Security Bypass
Released: 2007-02-22
A vulnerability has been reported in Trend Micro ServerProtect for
Linux, which can be exploited by malicious people to bypass certain
security restrictions.
Full Advisory:
http://secunia.com/advisories/24264/
--
[SA24244] Ubuntu update for moinmoin
Critical: Less critical
Where: From remote
Impact: Cross Site Scripting
Released: 2007-02-21
Ubuntu has issued an update for moinmoin. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting attacks.
Full Advisory:
http://secunia.com/advisories/24244/
--
[SA24206] Avaya Products Kernel Multiple Vulnerabilities
Critical: Less critical
Where: From remote
Impact: Exposure of sensitive information, Privilege escalation,
DoS
Released: 2007-02-19
Avaya has acknowledged some vulnerabilities in various Avaya products,
which can be exploited by malicious, local users to disclose
potentially sensitive information, gain escalated privileges, or cause
a DoS (Denial of Service), and by malicious people to cause a DoS.
Full Advisory:
http://secunia.com/advisories/24206/
--
[SA24204] SUSE update for poppler
Critical: Less critical
Where: From remote
Impact: DoS
Released: 2007-02-20
SUSE has issued an update for poppler. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
Full Advisory:
http://secunia.com/advisories/24204/
--
[SA24203] Gentoo update for bind
Critical: Less critical
Where: From remote
Impact: DoS
Released: 2007-02-19
Gentoo has issued an update for bind. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
Full Advisory:
http://secunia.com/advisories/24203/
--
[SA24188] Red Hat update for samba
Critical: Less critical
Where: From remote
Impact: DoS
Released: 2007-02-16
Red Hat has issued an update for samba. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
Full Advisory:
http://secunia.com/advisories/24188/
--
[SA24247] Avaya CMS xfs / X Render and DBE Extensions Vulnerabilities
Critical: Less critical
Where: From local network
Impact: Privilege escalation, System access
Released: 2007-02-22
Avaya has acknowledged some vulnerabilities in Avaya CMS (Call
Management System), which can be exploited by malicious, local users to
gain escalated privileges or by malicious users to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/24247/
--
[SA24215] Linux Kernel NFSACL "ACCESS" Denial of Service
Critical: Less critical
Where: From local network
Impact: DoS
Released: 2007-02-20
A vulnerability has been reported in the Linux Kernel, which can be
exploited by malicious people to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/24215/
--
[SA24231] Nortel Net Direct Client for Linux Privilege Escalation
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2007-02-21
Jon Hart has reported a vulnerability in Net Direct Client for Linux,
which can be exploited by malicious, local users to gain escalated
privileges.
Full Advisory:
http://secunia.com/advisories/24231/
--
[SA24226] Mandriva update for gnucash
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2007-02-22
Mandriva has issued an update for gnucash. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions with escalated privileges.
Full Advisory:
http://secunia.com/advisories/24226/
--
[SA24225] GnuCash Insecure Temporary Files
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2007-02-19
A vulnerability has been reported in GnuCash, which can be exploited by
malicious, local users to perform certain actions with escalated
privileges.
Full Advisory:
http://secunia.com/advisories/24225/
--
[SA24213] IBM DB2 DB2DIAG.LOG Insecure File Creation
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2007-02-19
A vulnerability has been reported in IBM DB2, which can be exploited by
malicious, local users to perform certain actions with escalated
privileges.
Full Advisory:
http://secunia.com/advisories/24213/
--
[SA24210] Avaya Products XFree86 "DBE" and "Render" Extensions
Vulnerabilities
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2007-02-21
Avaya has acknowledged some vulnerabilities in various Avaya products,
which can be exploited by malicious, local users to gain escalated
privileges.
Full Advisory:
http://secunia.com/advisories/24210/
--
[SA24259] Mandriva update for kernel
Critical: Not critical
Where: Local system
Impact: DoS
Released: 2007-02-22
Mandriva has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/24259/
Other:--
[SA24240] Nortel Threat Protection System DCE/RPC Preprocessor Buffer
Overflow
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2007-02-21
A vulnerability has been reported in Nortel Threat Protection System
products, which can be exploited by malicious people to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/24240/
--
[SA24239] Nortel Threat Protection System DCE/RPC Preprocessor Buffer
Overflow
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2007-02-21
A vulnerability has been reported in Nortel Threat Protection System
products, which can be exploited by malicious people to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/24239/
--
[SA24235] Sourcefire Intrusion Sensor DCE/RPC Preprocessor Buffer
Overflow
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2007-02-20
Neel Mehta has reported a vulnerability in Sourcefire Intrusion Sensor,
which can be exploited by malicious people to compromise a vulnerable
system.
Full Advisory:
http://secunia.com/advisories/24235/
--
[SA24262] Cisco Unified IP Conference Station / IP Phone Default
Accounts
Critical: Moderately critical
Where: From local network
Impact: Security Bypass
Released: 2007-02-22
Some security issues have been reported in Cisco Unified IP Conference
Station and IP Phones, which can be exploited by malicious people to
access a vulnerable device.
Full Advisory:
http://secunia.com/advisories/24262/
Cross Platform:--
[SA24230] phpMyFAQ Unspecified File Upload Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2007-02-19
A vulnerability has been reported in phpMyFAQ, which can be exploited
by malicious people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/24230/
--
[SA24220] VS-News-System "newsordner" File Inclusion Vulnerabilities
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2007-02-19
Some vulnerabilities have been reported in VS-News-System, which can be
exploited by malicious people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/24220/
--
[SA24214] Htaccess Passwort Generator "ht_pfad" File Inclusion
Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2007-02-19
kezzap66345 has discovered a vulnerability in Htaccess Passwort
Generator, which can be exploited by malicious people to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/24214/
--
[SA24212] Interspire SendStudio "ROOTDIR" File Inclusion
Vulnerabilities
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2007-02-21
M.Hasran Addahroni has reported two vulnerabilities in Interspire
SendStudio, which can be exploited by malicious people to compromise
vulnerable systems.
Full Advisory:
http://secunia.com/advisories/24212/
--
[SA24190] Snort DCE/RPC Preprocessor Buffer Overflow
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2007-02-20
Neel Mehta has reported a vulnerability in Snort, which can be
exploited by malicious people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/24190/
--
[SA24260] deV!L'z Clanportal Local File Disclosure Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2007-02-22
A vulnerability has been reported in deV!L'z Clanportal, which can be
exploited by malicious people to disclose potentially sensitive
information.
Full Advisory:
http://secunia.com/advisories/24260/
--
[SA24242] phpTrafficA "file" and "lang" Local File Inclusion
Critical: Moderately critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2007-02-22
Hamid Ebadi has discovered some vulnerabilities in phpTrafficA, which
can be exploited by malicious people to disclose potentially sensitive
information.
Full Advisory:
http://secunia.com/advisories/24242/
--
[SA24191] webSPELL "showonly" SQL Injection Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Manipulation of data, Exposure of sensitive information
Released: 2007-02-19
DNX has discovered a vulnerability in webSPELL, which can be exploited
by malicious people to conduct SQL injection attacks.
Full Advisory:
http://secunia.com/advisories/24191/
--
[SA24187] ClamAV MIME Header Handling and CAB File Processing
Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2007-02-16
Two vulnerabilities have been reported in ClamAV, which can be
exploited by malicious people to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/24187/
--
[SA24222] MyCalendar Multiple Cross-Site Scripting Vulnerabilities
Critical: Less critical
Where: From remote
Impact: Cross Site Scripting
Released: 2007-02-21
sn0oPy has reported some vulnerabilities in AbleDesign MyCalendar,
which can be exploited by malicious people to conduct cross-site
scripting attacks.
Full Advisory:
http://secunia.com/advisories/24222/
--
[SA24211] MediaWiki AJAX UTF-7 Cross-Site Scripting
Critical: Less critical
Where: From remote
Impact: Cross Site Scripting
Released: 2007-02-21
Moshe BA has reported a vulnerability in MediaWiki, which can be
exploited by malicious people to conduct cross-site scripting attacks.
Full Advisory:
http://secunia.com/advisories/24211/
--
[SA24181] libevent DNS Response Denial of Service
Critical: Less critical
Where: From remote
Impact: DoS
Released: 2007-02-19
Jon Oberheide has reported a vulnerability in libevent, which can be
exploited by malicious people to cause a DoS (Denial of Service) of
applications using the library.
Full Advisory:
http://secunia.com/advisories/24181/
========================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Subscribe:
http://secunia.com/secunia_weekly_summary/
Contact details:
Web : http://secunia.com/
E-mail : support () secunia com
Tel : +45 70 20 51 44
Fax : +45 70 20 51 45
______________________________________
Subscribe to the InfoSec News RSS Feed
http://www.infosecnews.org/isn.rss
Current thread:
- Secunia Weekly Summary - Issue: 2007-8 InfoSec News (Feb 23)
