[ISN] Secunia Weekly Summary - Issue: 2004-19

InfoSec News isn at c4i.org
Fri May 7 09:50:23 EDT 2004


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2004-04-29 - 2004-05-06                        

                       This week : 56 advisories                       

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Secunia has launched a new service called Secunia Virus Information.
Secunia Virus Information is based on information automatically
collected from seven different anti-virus vendors. The data will be
parsed and indexed, resulting in a chronological list, a searchable
index, and grouped profiles with information from the seven vendors.

Furthermore, when certain criteria are triggered virus alerts will be
issued. You can sign-up for the alerts here:

Sign-up for Secunia Virus Alerts:
http://secunia.com/secunia_virus_alerts/

Secunia Virus Information:
http://secunia.com/virus_information/


========================================================================
2) This Week in Brief:


ADVISORIES:

Check Point has reported a vulnerability in various VPN-1 Products,
which can be exploited to compromise a vulnerable system.

Check Point has a hotfix available for this vulnerability. Please
refer to referenced Secunia Advisory.

Reference:
http://secunia.com/SA11546

--

eEye Digital Security has found a vulnerability in Apple Quicktime,
which can be exploited to compromise a vulnerable user's system.

eEye Digital Security writes in their advisory: "It is difficult to
express just how textbook this vulnerability scenario really is".
Moreover stating that "exploitation of the vulnerability is
self-evident".

However, Apple claims that this vulnerability only can be exploited to
crash a vulnerable player.

Please also view the Secunia Advisory regarding the security update for
Mac OS X described below.

Reference:
http://secunia.com/SA11071

--

Apple has issued a security update, which fixes several vulnerabilities
in Mac OS X.

Special note from the Secunia Advisory:

-QUOTE-
NOTE: The severity has been set to "Highly critical" because the
unspecified issues are likely to be more severe than claimed by the
vendor.

This conclusion is based on the fact that Apple merely describes
vulnerability "3" as an attempt to "improve the handling of long
passwords". However, according to @stake, the vulnerability can in fact
be exploited to compromise a vulnerable system.
-END QUOTE-

All users of the Mac OS X are advised to download the updates available
from Apple.

Reference:
http://secunia.com/SA11539


VIRUS ALERTS:

During the last week, Secunia issued two MEDIUM RISK virus alerts and
one HIGH RISK virus alert for three new Sasser worms. Please refer to
the grouped virus profiles below for more information:

SASSER.C - MEDIUM RISK Virus Alert - 2004-05-03 12:58 GMT+1
http://secunia.com/virus_information/9155/sasser.c/

SASSER.B - HIGH RISK Virus Alert - 2004-05-03 08:51 GMT+1
http://secunia.com/virus_information/9147/sasser.b/

Sasser.a - MEDIUM RISK Virus Alert - 2004-05-01 13:28 GMT+1
http://secunia.com/virus_information/9142/sasser.a/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA11482] Windows Explorer / Internet Explorer Long Share Name
              Buffer Overflow
2.  [SA11539] Mac OS X Security Update Fixes Multiple Vulnerabilities
3.  [SA11064] Microsoft Windows 14 Vulnerabilities
4.  [SA10395] Internet Explorer URL Spoofing Vulnerability
5.  [SA11071] Apple QuickTime "QuickTime.qts" Heap Overflow
              Vulnerability
6.  [SA11510] LHA Multiple Vulnerabilities
7.  [SA11546] Check Point VPN-1 Products ISAKMP Buffer Overflow
              Vulnerability
8.  [SA10736] Internet Explorer File Download Extension Spoofing
9.  [SA11505] libpng Potential Denial of Service Vulnerability
10.  [SA11492] Siemens S55 SMS Send Prompt Bypass Weakness

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA11547] Titan FTP Server Aborted LIST Denial of Service
Vulnerability
[SA11542] Aweb Exposure of Sensitive Information
[SA11525] Web Wiz Forum SQL Injection and Security Bypass

UNIX/Linux:
[SA11539] Mac OS X Security Update Fixes Multiple Vulnerabilities
[SA11528] Pound "logmsg()" Format String Vulnerability
[SA11553] PHP-Nuke Multiple Vulnerabilities
[SA11548] OpenBSD update for cvs
[SA11544] Slackware update for LHA
[SA11538] Slackware update for xine-lib
[SA11527] ProFTPD CIDR Addressing ACL Security Issue
[SA11521] Red Hat update for OpenOffice
[SA11512] Red Hat update for xchat
[SA11510] LHA Multiple Vulnerabilities
[SA11500] MPlayer and xine-lib RTSP Handling Vulnerabilities
[SA11498] Debian update for eterm
[SA11552] FreeBSD update for kadmind
[SA11550] Heimdal kadmind Heap Overflow Vulnerability
[SA11545] Fedora update for mc
[SA11543] UnixWare / Open Unix update for Apache
[SA11540] Slackware update for libpng
[SA11537] Slackware update for rsync
[SA11531] SquirrelMail Folder Name Cross-Site Scripting Vulnerability
[SA11523] Debian update for rsync
[SA11520] Red Hat update for libpng
[SA11517] Debian update for libpng
[SA11515] Trustix update for rsync
[SA11514] rsync Allows Writing Files Outside the Intended Directory
[SA11509] OpenPKG update for png
[SA11507] Mandrake update for libpng
[SA11505] libpng Potential Denial of Service Vulnerability
[SA11551] FreeBSD update for heimdal
[SA11541] SuSE update for kernel
[SA11530] Debian update for flim
[SA11529] FLIM Insecure Temporary File Creation Vulnerability
[SA11526] ipmenu Insecure Temporary File Creation Vulnerability
[SA11522] Red Hat update for mc
[SA11519] Red Hat update for utempter
[SA11508] Debian update for mc
[SA11506] Mandrake update for mc
[SA11503] Gentoo update for samba
[SA11502] Midnight Commander Multiple Unspecified Vulnerabilities
[SA11501] Slackware update for kernel
[SA11518] PaX Denial of Service Vulnerability

Other:
[SA11499] Zonet ZSR1104WE Wireless Router NAT Implementation Weakness
[SA11516] Network Appliances Data ONTAP and NetCache Denial of Service
Vulnerability
[SA11504] 3Com NBX 100 Communications System Denial of Service

Cross Platform:
[SA11546] Check Point VPN-1 Products ISAKMP Buffer Overflow
Vulnerability
[SA11524] Coppermine Photo Gallery Multiple Vulnerabilities
[SA11554] PHPX Multiple Vulnerabilities
[SA11497] Sesame Unauthorised User Repository Access Vulnerability
[SA11536] HP Web Jetadmin Multiple Vulnerabilities
[SA11535] Moodle "help.php" Cross-Site Scripting Vulnerability
[SA11533] ReciPants Unspecified Input Validation Vulnerabilities
[SA11556] Verity Ultraseek Reserved DOS Device Name Path Disclosure

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA11547] Titan FTP Server Aborted LIST Denial of Service
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-05-05

STORM has reported a vulnerability in Titan FTP Server, which can be
exploited by malicious users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/11547/

 --

[SA11542] Aweb Exposure of Sensitive Information

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2004-05-05

Oliver Karow has reported some vulnerabilities in Aweb, allowing
malicious people to see sensitive information and arbitrary files.

Full Advisory:
http://secunia.com/advisories/11542/

 --

[SA11525] Web Wiz Forum SQL Injection and Security Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2004-05-03

Alexander has reported some vulnerabilities in Web Wiz Forum, allowing
malicious people to conduct SQL injection attacks and perform certain
administrative functions.

Full Advisory:
http://secunia.com/advisories/11525/


UNIX/Linux:--

[SA11539] Mac OS X Security Update Fixes Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Hijacking, Security Bypass, Manipulation of data,
Privilege escalation, DoS, System access
Released:    2004-05-04

Apple has issued a security update for Mac OS X, which fixes some
older, known vulnerabilities along with some new unspecified issues.

Full Advisory:
http://secunia.com/advisories/11539/

 --

[SA11528] Pound "logmsg()" Format String Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-05-03

Akira Higuchi has discovered a vulnerability in Pound, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11528/

 --

[SA11553] PHP-Nuke Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2004-05-06

Janek Vind has reported some vulnerabilities in PHP-Nuke, allowing
malicious people to conduct Cross Site Scripting and SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/11553/

 --

[SA11548] OpenBSD update for cvs

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2004-05-05

OpenBSD has issued patches for cvs. These fix two vulnerabilities,
which can be exploited by malicious servers to compromise clients and
by malicious users to retrieve arbitrary files from a vulnerable
server.

Full Advisory:
http://secunia.com/advisories/11548/

 --

[SA11544] Slackware update for LHA

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-05-05

Slackware has issued updates packages for LHA. These fix some
vulnerabilities, potentially allowing malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/11544/

 --

[SA11538] Slackware update for xine-lib

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-05-04

Slackware has issued updates for xine-lib. These fix a vulnerability,
which potentially can be exploited by malicious people to gain system
access.

Full Advisory:
http://secunia.com/advisories/11538/

 --

[SA11527] ProFTPD CIDR Addressing ACL Security Issue

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-05-03

Jindrich Makovicka has reported a security issue in ProFTPD,
potentially allowing malicious people to bypass ACLs.

Full Advisory:
http://secunia.com/advisories/11527/

 --

[SA11521] Red Hat update for OpenOffice

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-05-03

Red Hat has issued updated packages for OpenOffice. These fix a
vulnerability allowing malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/11521/

 --

[SA11512] Red Hat update for xchat

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-04-30

Red Hat has issued updated packages for xchat. These fix a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/11512/

 --

[SA11510] LHA Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-04-30

Ulf Harnhammar has reported some vulnerabilities in LHA, potentially
allowing malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11510/

 --

[SA11500] MPlayer and xine-lib RTSP Handling Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-04-30

Some vulnerabilities have been reported in MPlayer and xine-lib,
potentially allowing malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/11500/

 --

[SA11498] Debian update for eterm

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-04-29

Debian has issued updated packages for eterm. These fix a
vulnerability, which potentially can be exploited by malicious people
to manipulate actions taken by the system administrator and other users
on a system.

Full Advisory:
http://secunia.com/advisories/11498/

 --

[SA11552] FreeBSD update for kadmind

Critical:    Moderately critical
Where:       From local network
Impact:      System access, DoS
Released:    2004-05-06

FreeBSD has addressed a vulnerability in kadmind, which potentially can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11552/

 --

[SA11550] Heimdal kadmind Heap Overflow Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      System access, DoS
Released:    2004-05-06

Evgeny Demidov has discovered a vulnerability in Heimdal, which
potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/11550/

 --

[SA11545] Fedora update for mc

Critical:    Less critical
Where:       
Impact:      
Released:    2004-05-05

Fedora has issued updates for mc. These fix some vulnerabilities, which
can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/11545/

 --

[SA11543] UnixWare / Open Unix update for Apache

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information, Privilege escalation
Released:    2004-05-05

SCO has issued updated packages, which fix some older vulnerabilities
in Apache.

Full Advisory:
http://secunia.com/advisories/11543/

 --

[SA11540] Slackware update for libpng

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2004-05-04

Slackware has issued updates for libpng. These fix a vulnerability,
potentially allowing malicious people to cause a Denial of Service
against certain applications.

Full Advisory:
http://secunia.com/advisories/11540/

 --

[SA11537] Slackware update for rsync

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data, Security Bypass
Released:    2004-05-04

Slackware has issued updated packages for rsync. These fix a
vulnerability, potentially allowing malicious people to write files
outside the intended directory.

Full Advisory:
http://secunia.com/advisories/11537/

 --

[SA11531] SquirrelMail Folder Name Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-05-03

Alvin Alex has reported a vulnerability in SquirrelMail, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/11531/

 --

[SA11523] Debian update for rsync

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data, Security Bypass
Released:    2004-05-03

Debian has issued updated packages for rsync. These fix a
vulnerability, potentially allowing malicious people to write files
outside the intended directory.

Full Advisory:
http://secunia.com/advisories/11523/

 --

[SA11520] Red Hat update for libpng

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2004-05-03

Red Hat has issued updates for libpng. These fix a vulnerability,
potentially allowing malicious people to cause a Denial of Service
against certain applications.

Full Advisory:
http://secunia.com/advisories/11520/

 --

[SA11517] Debian update for libpng

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2004-04-30

Debian has issued updates for libpng. These fix a vulnerability,
potentially allowing malicious people to cause a Denial of Service
against certain applications.

Full Advisory:
http://secunia.com/advisories/11517/

 --

[SA11515] Trustix update for rsync

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2004-04-30

Trustix has issued updated packages for rsync. These fix a
vulnerability, potentially allowing malicious people to write files
outside the intended directory.

Full Advisory:
http://secunia.com/advisories/11515/

 --

[SA11514] rsync Allows Writing Files Outside the Intended Directory

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2004-04-30

A vulnerability has been reported in rsync, allowing malicious people
to write files outside the intended directory.

Full Advisory:
http://secunia.com/advisories/11514/

 --

[SA11509] OpenPKG update for png

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2004-04-30

OpenPKG has issued updates for png (libpng). These fix a vulnerability,
potentially allowing malicious people to cause a Denial of Service
against certain applications.

Full Advisory:
http://secunia.com/advisories/11509/

 --

[SA11507] Mandrake update for libpng

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2004-04-30

MandrakeSoft has issued updates for libpng. These fix a vulnerability,
potentially allowing malicious people to cause a Denial of Service
against certain applications.

Full Advisory:
http://secunia.com/advisories/11507/

 --

[SA11505] libpng Potential Denial of Service Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2004-04-30

Steve Grubb has reported a vulnerability in libpng, potentially
allowing malicious people to cause a Denial of Service against
applications and services using libpng.

Full Advisory:
http://secunia.com/advisories/11505/

 --

[SA11551] FreeBSD update for heimdal

Critical:    Less critical
Where:       From local network
Impact:      ID Spoofing
Released:    2004-05-06

FreeBSD has addressed an older vulnerability in heimdal, which can
allow certain people to impersonate others.

Full Advisory:
http://secunia.com/advisories/11551/

 --

[SA11541] SuSE update for kernel

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass, Exposure of system information, Exposure
of sensitive information, Privilege escalation, DoS
Released:    2004-05-04

SuSE has issued updated packages for the kernel. These fix some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges, gain knowledge of sensitive information, or
cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/11541/

 --

[SA11530] Debian update for flim

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-05-03

Debian has issued updated packages for flim. These fix a vulnerability,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/11530/

 --

[SA11529] FLIM Insecure Temporary File Creation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-05-03

Tatsuya Kinoshita has reported a vulnerability in FLIM, which can be
exploited by malicious, local users to take certain actions on a
vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/11529/

 --

[SA11526] ipmenu Insecure Temporary File Creation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-05-04

Akira Yoshiyama has discovered a vulnerability in ipmenu, which can be
exploited by malicious, local users to perform certain actions on a
system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/11526/

 --

[SA11522] Red Hat update for mc

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-05-03

Red Hat has issued updates for mc. These fix some vulnerabilities,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/11522/

 --

[SA11519] Red Hat update for utempter

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-05-03

Red Hat has issued updated packages for utempter. These fix a security
issue, which potentially can be exploited by malicious, local users to
perform certain actions with higher privileges on a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11519/

 --

[SA11508] Debian update for mc

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-04-30

Debian has issued updates for mc. These fix some vulnerabilities, which
can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/11508/

 --

[SA11506] Mandrake update for mc

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-04-30

MandrakeSoft has issued updates for mc. These fix some vulnerabilities,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/11506/

 --

[SA11503] Gentoo update for samba

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-04-30

Gentoo has issued updated packages for Samba. These fix a
vulnerability, which can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/11503/

 --

[SA11502] Midnight Commander Multiple Unspecified Vulnerabilities

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-04-30

Jacub Jelinek has reported some vulnerabilities in GNU Midnight
Commander, allowing malicious users to escalate their privileges.

Full Advisory:
http://secunia.com/advisories/11502/

 --

[SA11501] Slackware update for kernel

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation, Exposure of sensitive information,
Exposure of system information
Released:    2004-04-30

Slackware has issued updated packages for the kernel. These fix some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges, or gain knowledge of sensitive information.

Full Advisory:
http://secunia.com/advisories/11501/

 --

[SA11518] PaX Denial of Service Vulnerability

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2004-05-04

borg has discovered a vulnerability in PaX, which can be exploited by
malicious, local users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/11518/


Other:--

[SA11499] Zonet ZSR1104WE Wireless Router NAT Implementation Weakness

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-04-29

Jason Wachtel has reported a weakness in the Zonet ZSR1104WE wireless
router, which may prevent identification of remote attackers.

Full Advisory:
http://secunia.com/advisories/11499/

 --

[SA11516] Network Appliances Data ONTAP and NetCache Denial of Service
Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2004-04-30

An unspecified vulnerability has been reported in Data ONTAP and
NetCache, allowing malicious people to cause a Denial of Service
against vulnerable devices.

Full Advisory:
http://secunia.com/advisories/11516/

 --

[SA11504] 3Com NBX 100 Communications System Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2004-04-30

Michael Scheidell has reported a vulnerability in 3Com NBX 100
Communications System, which can be exploited by malicious people to
cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/11504/


Cross Platform:--

[SA11546] Check Point VPN-1 Products ISAKMP Buffer Overflow
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-05-05

A vulnerability has been discovered in various Check Point VPN-1
products, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/11546/

 --

[SA11524] Coppermine Photo Gallery Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of sensitive information,
System access
Released:    2004-05-03

Janek Vind has reported multiple vulnerabilities in Coppermine Photo
Gallery, allowing malicious people to compromise a vulnerable system or
conduct Cross Site Scripting attacks.

Full Advisory:
http://secunia.com/advisories/11524/

 --

[SA11554] PHPX Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting
Released:    2004-05-06

JeiAr has reported some vulnerabilities in PHPX, allowing malicious
people to conduct Cross Site Scripting, SQL injection and potentially
execute administrative functions.

Full Advisory:
http://secunia.com/advisories/11554/

 --

[SA11497] Sesame Unauthorised User Repository Access Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of system information, Exposure
of sensitive information
Released:    2004-04-29

A vulnerability has been discovered in Sesame, which can be exploited
by malicious, anonymous users to access other user's repositories.

Full Advisory:
http://secunia.com/advisories/11497/

 --

[SA11536] HP Web Jetadmin Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      Security Bypass, Exposure of system information, Exposure
of sensitive information, DoS, System access
Released:    2004-05-04

FX has reported multiple vulnerabilities in HP Web Jetadmin, where the
most serious issues can be combined to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11536/

 --

[SA11535] Moodle "help.php" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-05-03

Bartek Nowotarski has discovered a vulnerability in Moodle, which can
be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/11535/

 --

[SA11533] ReciPants Unspecified Input Validation Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2004-05-04

Jon McClintock has reported some vulnerabilities in ReciPants,
potentially allowing malicious people to conduct Cross-Site Scripting
and SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/11533/

 --

[SA11556] Verity Ultraseek Reserved DOS Device Name Path Disclosure

Critical:    Not critical
Where:       From remote
Impact:      Exposure of system information
Released:    2004-05-06

Martin O'Neal of Corsaire has discovered a security issue in Verity
Ultraseek, which can be exploited by malicious people to disclose path
information.

Full Advisory:
http://secunia.com/advisories/11556/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support at secunia.com
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45

========================================================================





More information about the ISN mailing list