[ISN] Secunia Weekly Summary - Issue: 2004-26
InfoSec News
isn at c4i.org
Thu Jun 24 07:34:46 EDT 2004
========================================================================
The Secunia Weekly Advisory Summary
2004-06-17 - 2004-06-24
This week : 44 advisories
========================================================================
Table of Contents:
1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing
========================================================================
1) Word From Secunia:
New Features at Secunia.com
Secunia has implemented various statistical features at the websites
for both Secunia advisories and Virus Information.
Secunia Advisories Statistics:
http://secunia.com/advisory_statistics/
Examples of Specific Product Statistics:
http://secunia.com/product/11/ (Internet Explorer 6)
http://secunia.com/product/761/ (Opera 7.x)
http://secunia.com/product/1480/ (Mozilla 1.3)
Secunia Virus Information Statistics:
http://secunia.com/virus_statistics/
Furthermore, Secunia has made it possible for you to include all graphs
available at secunia.com on your own website.
This is described in detail at:
http://secunia.com/secunia_image_inclusion/
========================================================================
2) This Week in Brief:
ADVISORIES:
Luigi Auriemma has again found a vulnerability in the very popular
Unreal Engine, which can be exploited to compromise users' systems.
The Unreal Engine is used in many different First Person Shooter games.
A complete list of affected games was provided by Luigi Auriemma and is
also available in the Secunia advisory below.
Reference:
http://secunia.com/SA11900
--
Various Firewall products from Symantec have been proven vulnerable to
DNS cache poisoning.
This can be exploited to insert fake information in the DNS cache,
which can be used to direct users to malicious web sites or just
prevent them from accessing certain web sites.
Symantec has released hotfixes for the affected products.
Reference:
http://secunia.com/SA11888
VIRUS ALERTS:
During the last week, Secunia issued one MEDIUM RISK virus alert.
Please refer to the grouped virus profile below for more information:
Korgo.R - MEDIUM RISK Virus Alert - 2004-06-24 07:07 GMT+1
http://secunia.com/virus_information/10219/korgo.r/
========================================================================
3) This Weeks Top Ten Most Read Advisories:
1. [SA11793] Internet Explorer Local Resource Access and Cross-Zone
Scripting Vulnerabilities
2. [SA11900] Unreal Engine "secure" Query Buffer Overflow
Vulnerability
3. [SA11856] Mozilla Browser Address Bar Spoofing Weakness
4. [SA11901] Opera Address Bar Spoofing Security Issue
5. [SA11830] Internet Explorer Security Zone Bypass and Address Bar
Spoofing Vulnerability
6. [SA11888] Symantec Various Firewall Products DNS Proxy Cache
Poisoning Vulnerability
7. [SA11072] IBM Access Support ActiveX Controls Various Insecure
Methods
8. [SA10395] Internet Explorer URL Spoofing Vulnerability
9. [SA11877] IPsec-Tools Denial of Service and Certificate Validation
Vulnerabilities
10. [SA11914] Microsoft MN-500 Multiple Connections Denial of Service
========================================================================
4) Vulnerabilities Summary Listing
Windows:
[SA11895] Snitz Forums 2000 "register.asp" Email Field Script Insertion
Vulnerability
UNIX/Linux:
[SA11917] Gentoo update for apache
[SA11889] Gentoo update for squid
[SA11887] SuSE update for subversion
[SA11922] Gentoo update for IPsec-Tools
[SA11918] SqWebMail "print_header_uc()" Function Script Insertion
Vulnerability
[SA11933] Fedora update for dhcp
[SA11929] SuSE update for dhcp/dhcp-server
[SA11927] Mandrake update for dhcp
[SA11923] ISC DHCP Buffer Overflow Vulnerabilities
[SA11907] Debian update for rlpr
[SA11906] rlpr "msg()" Function Buffer Overflow and Format String
Vulnerabilities
[SA11904] Debian update for sup
[SA11898] SUP Logging Functionality Format String Vulnerabilities
[SA11910] IRCD-Hybrid / ircd-ratbox Socket Dequeuing Denial of Service
Vulnerability
[SA11909] Fedora update for libpng
[SA11908] Red Hat update for libpng
[SA11896] Gentoo update for usermin
[SA11890] Gentoo update for aspell
[SA11897] GNU Radius SNMP Invalid OID Denial of Service Vulnerability
[SA11932] Mandrake update for kernel
[SA11924] cplay Insecure Temporary File Creation Vulnerability
[SA11921] Conectiva update for kernel
[SA11916] EnGarde update for kernel
[SA11905] Debian update for super
[SA11903] Debian update for www-sql
[SA11902] WWW-SQL Include Command Buffer Overflow Vulnerability
[SA11899] super Unspecified Format String Vulnerability
[SA11893] HP-UX xfs Privilege Escalation Vulnerability
[SA11892] Red Hat update for kernel
[SA11891] Linux Kernel Various Drivers Userland Pointer Dereference
Vulnerabilities
[SA11930] Sun Solaris Basic Security Module Denial of Service
Vulnerability
[SA11926] rssh File Existence Information Disclosure Weakness
Other:
[SA11919] D-Link DI-614+ AirPlus DHCP Script Insertion Vulnerability
[SA11912] Infoblox DNS One Script Insertion Vulnerability
[SA11914] Microsoft MN-500 Multiple Connections Denial of Service
[SA11913] Netgear FVS318 Multiple Connections Denial of Service
[SA11911] Linksys BEFSR41 Connection Handling Denial of Service
[SA11915] nCipher netHSM Logfile Pass Phrase Disclosure
Cross Platform:
[SA11900] Unreal Engine "secure" Query Buffer Overflow Vulnerability
[SA11920] PHP-Nuke Multiple Vulnerabilities
[SA11894] phpMyChat Multiple Vulnerabilities
[SA11888] Symantec Various Firewall Products DNS Proxy Cache Poisoning
Vulnerability
[SA11901] Opera Address Bar Spoofing Security Issue
========================================================================
5) Vulnerabilities Content Listing
Windows:--
[SA11895] Snitz Forums 2000 "register.asp" Email Field Script Insertion
Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting
Released: 2004-06-21
Pete Foster has reported a vulnerability in Snitz Forums 2000, which
can be exploited by malicious people to conduct script insertion
attacks.
Full Advisory:
http://secunia.com/advisories/11895/
UNIX/Linux:--
[SA11917] Gentoo update for apache
Critical: Highly critical
Where: From remote
Impact: System access, DoS
Released: 2004-06-22
Gentoo has issued an update for apache. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/11917/
--
[SA11889] Gentoo update for squid
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-06-17
Gentoo has issued an update for squid. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.
Full Advisory:
http://secunia.com/advisories/11889/
--
[SA11887] SuSE update for subversion
Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2004-06-17
SuSE has issued an update for subversion. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/11887/
--
[SA11922] Gentoo update for IPsec-Tools
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2004-06-23
Gentoo has issued an update for ipsec-tools. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/11922/
--
[SA11918] SqWebMail "print_header_uc()" Function Script Insertion
Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting
Released: 2004-06-22
Luca Legato has reported a vulnerability in SqWebMail, which can be
exploited by malicious people to conduct script insertion attacks.
Full Advisory:
http://secunia.com/advisories/11918/
--
[SA11933] Fedora update for dhcp
Critical: Moderately critical
Where: From local network
Impact: System access, DoS
Released: 2004-06-24
Fedora has issued an update for dhcp. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of Service)
or potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/11933/
--
[SA11929] SuSE update for dhcp/dhcp-server
Critical: Moderately critical
Where: From local network
Impact: DoS, System access
Released: 2004-06-23
SuSE has issued an update for dhcp/dhcp-server. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to cause a Denial of Service or compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/11929/
--
[SA11927] Mandrake update for dhcp
Critical: Moderately critical
Where: From local network
Impact: DoS, System access
Released: 2004-06-23
MandrakeSoft has issued an update for dhcp. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/11927/
--
[SA11923] ISC DHCP Buffer Overflow Vulnerabilities
Critical: Moderately critical
Where: From local network
Impact: DoS, System access
Released: 2004-06-23
Two vulnerabilities have been reported in DHCP, which potentially can
be exploited by malicious people to cause a Denial of Service or
compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/11923/
--
[SA11907] Debian update for rlpr
Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-06-21
Debian has issued an update for rlpr. This fixes some vulnerabilities
in rlpr, which can be exploited by malicious people to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/11907/
--
[SA11906] rlpr "msg()" Function Buffer Overflow and Format String
Vulnerabilities
Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-06-21
Jaguar has reported some vulnerabilities in rlpr, which can be
exploited by malicious people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/11906/
--
[SA11904] Debian update for sup
Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-06-21
Debian has issued an update for sup. This fixes multiple
vulnerabilities, which potentially can be exploited by malicious people
to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/11904/
--
[SA11898] SUP Logging Functionality Format String Vulnerabilities
Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-06-21
Jaguar has reported a vulnerability in sup, which potentially can be
exploited by malicious people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/11898/
--
[SA11910] IRCD-Hybrid / ircd-ratbox Socket Dequeuing Denial of Service
Vulnerability
Critical: Less critical
Where: From remote
Impact: DoS
Released: 2004-06-22
Erik Sperling Johansen has reported a vulnerability in IRCD-Hybrid and
ircd-ratbox, which can be exploited by malicious people to cause a DoS
(Denial of Service).
Full Advisory:
http://secunia.com/advisories/11910/
--
[SA11909] Fedora update for libpng
Critical: Less critical
Where: From remote
Impact: DoS
Released: 2004-06-21
Full Advisory:
http://secunia.com/advisories/11909/
--
[SA11908] Red Hat update for libpng
Critical: Less critical
Where: From remote
Impact: DoS
Released: 2004-06-21
Full Advisory:
http://secunia.com/advisories/11908/
--
[SA11896] Gentoo update for usermin
Critical: Less critical
Where: From remote
Impact: Security Bypass, DoS
Released: 2004-06-21
Gentoo has issued an update for usermin. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or bypass certain security restrictions.
Full Advisory:
http://secunia.com/advisories/11896/
--
[SA11890] Gentoo update for aspell
Critical: Less critical
Where: From remote
Impact: System access
Released: 2004-06-18
Gentoo has issued an update for aspell. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.
Full Advisory:
http://secunia.com/advisories/11890/
--
[SA11897] GNU Radius SNMP Invalid OID Denial of Service Vulnerability
Critical: Less critical
Where: From local network
Impact: DoS
Released: 2004-06-22
A vulnerability has been reported in GNU Radius, which can be exploited
by malicious people to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/11897/
--
[SA11932] Mandrake update for kernel
Critical: Less critical
Where: Local system
Impact: Exposure of sensitive information, DoS
Released: 2004-06-24
MandrakeSoft has issued an update for the kernel. This fixes two
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service) or gain knowledge of sensitive
information.
Full Advisory:
http://secunia.com/advisories/11932/
--
[SA11924] cplay Insecure Temporary File Creation Vulnerability
Critical: Less critical
Where: Local system
Impact: Privilege escalation, DoS
Released: 2004-06-23
Martin Michlmayr has reported a vulnerability in cplay allowing
malicious, local users to perform certain actions with escalated
privileges.
Full Advisory:
http://secunia.com/advisories/11924/
--
[SA11921] Conectiva update for kernel
Critical: Less critical
Where: Local system
Impact: Exposure of sensitive information, Privilege escalation,
DoS
Released: 2004-06-23
Conectiva as issued an update for the kernel. This fixes two
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service), gain knowledge of sensitive
information, or gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/11921/
--
[SA11916] EnGarde update for kernel
Critical: Less critical
Where: Local system
Impact: Exposure of sensitive information, DoS
Released: 2004-06-22
Guardian Digital has issued an update for the kernel. This fixes two
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service) or gain knowledge of sensitive
information.
Full Advisory:
http://secunia.com/advisories/11916/
--
[SA11905] Debian update for super
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-06-21
Debian has issued an update for super. This fixes a vulnerability,
which can be exploited by certain local users to gain escalated
privileges.
Full Advisory:
http://secunia.com/advisories/11905/
--
[SA11903] Debian update for www-sql
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-06-21
Debian has issued an update for www-sql. This fixes a vulnerability,
which can be exploited by malicious, local users to gain escalated
privileges.
Full Advisory:
http://secunia.com/advisories/11903/
--
[SA11902] WWW-SQL Include Command Buffer Overflow Vulnerability
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-06-21
Ulf Härnhammar has reported a vulnerability in WWW-SQL, which can be
exploited by malicious, local users to gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/11902/
--
[SA11899] super Unspecified Format String Vulnerability
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-06-21
Max Vozeler has reported a vulnerability in super, which can be
exploited by certain local users to gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/11899/
--
[SA11893] HP-UX xfs Privilege Escalation Vulnerability
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-06-18
watercloud has reported a vulnerability in HP-UX, which can be
exploited by malicious, local users to gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/11893/
--
[SA11892] Red Hat update for kernel
Critical: Less critical
Where: Local system
Impact: Exposure of system information, Exposure of sensitive
information, Privilege escalation, DoS
Released: 2004-06-21
Red Hat has issued an update for the kernel. This fixes various
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service), disclose kernel memory, or gain
escalated privileges.
Full Advisory:
http://secunia.com/advisories/11892/
--
[SA11891] Linux Kernel Various Drivers Userland Pointer Dereference
Vulnerabilities
Critical: Less critical
Where: Local system
Impact: Exposure of system information, Exposure of sensitive
information, Privilege escalation
Released: 2004-06-21
Vulnerabilities have been discovered in various drivers for the Linux
kernel, which can be exploited by malicious, local users to disclose
kernel memory or gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/11891/
--
[SA11930] Sun Solaris Basic Security Module Denial of Service
Vulnerability
Critical: Not critical
Where: Local system
Impact: DoS
Released: 2004-06-23
A vulnerability has been discovered in Solaris, which can be exploited
by malicious, local users to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/11930/
--
[SA11926] rssh File Existence Information Disclosure Weakness
Critical: Not critical
Where: Local system
Impact: Security Bypass, Exposure of system information
Released: 2004-06-23
William F. McCaw has discovered a weakness in rssh, which can be
exploited by malicious users to bypass certain security restrictions.
Full Advisory:
http://secunia.com/advisories/11926/
Other:--
[SA11919] D-Link DI-614+ AirPlus DHCP Script Insertion Vulnerability
Critical: Moderately critical
Where: From local network
Impact: Cross Site Scripting
Released: 2004-06-22
Gregory Duchemin has reported a vulnerability in D-Link DI-614+
AirPlus, which can be exploited by malicious people to conduct script
insertion attacks.
Full Advisory:
http://secunia.com/advisories/11919/
--
[SA11912] Infoblox DNS One Script Insertion Vulnerability
Critical: Moderately critical
Where: From local network
Impact: Cross Site Scripting
Released: 2004-06-21
Gregory Duchemin has reported a vulnerability in DNS One, potentially
allowing malicious people to conduct script insertion attacks.
Full Advisory:
http://secunia.com/advisories/11912/
--
[SA11914] Microsoft MN-500 Multiple Connections Denial of Service
Critical: Less critical
Where: From local network
Impact: DoS
Released: 2004-06-21
Paul Kurczaba has reported a security issue in Microsoft MN-500, which
can be exploited by malicious people to cause a DoS (Denial of
Service).
Full Advisory:
http://secunia.com/advisories/11914/
--
[SA11913] Netgear FVS318 Multiple Connections Denial of Service
Critical: Less critical
Where: From local network
Impact: DoS
Released: 2004-06-21
Paul Kurczaba has reported a security issue in Netgear FVS318, which
can be exploited by malicious people to cause a DoS (Denial of
Service).
Full Advisory:
http://secunia.com/advisories/11913/
--
[SA11911] Linksys BEFSR41 Connection Handling Denial of Service
Critical: Less critical
Where: From local network
Impact: DoS
Released: 2004-06-21
Paul Kurczaba has reported a security issue in Linksys BEFSR41, which
can be exploited by malicious people to cause a DoS (Denial of
Service).
Full Advisory:
http://secunia.com/advisories/11911/
--
[SA11915] nCipher netHSM Logfile Pass Phrase Disclosure
Critical: Less critical
Where: Local system
Impact: Exposure of system information, Exposure of sensitive
information
Released: 2004-06-22
A security issue has been reported in nCipher netHSM, which may
disclose sensitive information to malicious, local users.
Full Advisory:
http://secunia.com/advisories/11915/
Cross Platform:--
[SA11900] Unreal Engine "secure" Query Buffer Overflow Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-06-22
Luigi Auriemma has reported a vulnerability in the Unreal Engine, which
can be exploited by malicious people to compromise a vulnerable
system.
Full Advisory:
http://secunia.com/advisories/11900/
--
[SA11920] PHP-Nuke Multiple Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: Security Bypass, Cross Site Scripting, Manipulation of
data, Exposure of sensitive information
Released: 2004-06-23
Janek Vind has reported some vulnerabilities in PHP-Nuke, potentially
allowing malicious people to reveal sensitive information, conduct
cross-site scripting, script insertion, and SQL injection attacks.
Full Advisory:
http://secunia.com/advisories/11920/
--
[SA11894] phpMyChat Multiple Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: Security Bypass, Cross Site Scripting, Exposure of system
information, Exposure of sensitive information
Released: 2004-06-18
HEX has reported a vulnerability in phpMyChat, which can be exploited
by malicious people to bypass authentication, conduct cross-site
scripting and SQL injection attacks.
Full Advisory:
http://secunia.com/advisories/11894/
--
[SA11888] Symantec Various Firewall Products DNS Proxy Cache Poisoning
Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Spoofing, Manipulation of data
Released: 2004-06-18
fryxar has discovered a vulnerability in various Symantec firewall
products, which can be exploited by malicious people to poison the DNS
cache.
Full Advisory:
http://secunia.com/advisories/11888/
--
[SA11901] Opera Address Bar Spoofing Security Issue
Critical: Less critical
Where: From remote
Impact: Spoofing
Released: 2004-06-22
bitlance winter has reported a security issue in the Opera browser,
which potentially can be exploited by malicious people to conduct
phishing attacks against a user.
Full Advisory:
http://secunia.com/advisories/11901/
========================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Subscribe:
http://secunia.com/secunia_weekly_summary/
Contact details:
Web : http://secunia.com/
E-mail : support at secunia.com
Tel : +45 70 20 51 44
Fax : +45 70 20 51 45
========================================================================
More information about the ISN
mailing list