[ISN] Secunia Weekly Summary - Issue: 2004-45

InfoSec News isn at c4i.org
Fri Nov 5 03:17:41 EST 2004


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2004-10-28 - 2004-11-04                        

                       This week : 75 advisories                       

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Monitor, Filter, and Manage Security Information
- Filtering and Management of Secunia advisories
- Overview, documentation, and detailed reports
- Alerting via email and SMS

Request Trial:
https://ca.secunia.com/?f=s

========================================================================
2) This Week in Brief:


ADVISORIES:

A new vulnerability has been discovered in Internet Explorer, which can
be exploited to compromise vulnerable systems.

Secunia issued a rare "Extremely Critical" Secunia advisory regarding
this, since working exploit code has been posted to several public
mailing lists.

The vulnerability does not affect users running Windows XP with Service
Pack 2 installed. 
 
However, for Windows XP Service Pack 1 and Windows 2000 users, there is
no solution available and users are advised to use an alternate
product.

References:
http://secunia.com/SA12959


VIRUS ALERTS:

During the last week, Secunia issued two MEDIUM RISK virus alerts.
Please refer to the grouped virus profiles below for more information:

Bagle.AR - MEDIUM RISK Virus Alert - 2004-10-29 19:49 GMT+1
http://secunia.com/virus_information/13040/bagle.ar/

Bagle.AQ - MEDIUM RISK Virus Alert - 2004-10-29 11:10 GMT+1
http://secunia.com/virus_information/13033/bagle.aq/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA12959] Internet Explorer IFRAME Buffer Overflow Vulnerability
2.  [SA12889] Microsoft Internet Explorer Two Vulnerabilities
3.  [SA13005] Quicktime Two Vulnerabilities
4.  [SA12712] Mozilla / Mozilla Firefox / Camino Tabbed Browsing
              Vulnerabilities
5.  [SA12820] Debian update for mpg123
6.  [SA12758] Microsoft Word Document Parsing Buffer Overflow
              Vulnerability
7.  [SA12304] Internet Explorer Address Bar Spoofing Vulnerability
8.  [SA13015] Internet Explorer/Outlook Express Restricted Zone Status
              Bar Spoofing
9.  [SA12713] Opera Tabbed Browsing Vulnerability
10. [SA13028] Shadow "passwd_check()" Security Bypass Vulnerability

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA13079] Helm Web Hosting Control Panel Two Vulnerabilities
[SA13078] Web Forum Server Directory Traversal and Clear Text User
Credentials
[SA13070] WinRAR "Repair Archive" Feature Vulnerability
[SA13066] Cisco Secure ACS EAP-TLS User Authentication Bypass
Vulnerability
[SA13063] ArGoSoft FTP Server Shortcut Upload Vulnerability
[SA13062] MailEnable Professional Unspecified Webmail Vulnerability
[SA13067] F-Secure Anti-Virus for Exchange Nested Password Protected
Archives Bypass Issue
[SA13024] Cyber Web Filter IP Address Restriction Security Bypass
[SA13015] Internet Explorer/Outlook Express Restricted Zone Status Bar
Spoofing

UNIX/Linux:
[SA13082] Debian update for xpdf
[SA13058] Gentoo update for Cherokee
[SA13057] Cherokee Format String Vulnerability
[SA13056] Mandrake update for gaim
[SA13053] Mandrake update for mpg123
[SA13046] Debian update for mpg123
[SA13044] Conectiva update for squid
[SA13043] Slackware update for libtiff
[SA13037] qwik-smtpd Format String Vulnerability
[SA13036] Sun Java System Web Proxy Server Unspecified Buffer Overflow
Vulnerabilities
[SA13027] OpenVMS Secure Web Server Multiple Vulnerabilities
[SA13020] Fedora update for kdegraphics
[SA13019] Fedora update for gpdf
[SA13014] Gentoo update for GPdf/KPDF/KOffice
[SA13092] Gentoo update for GD
[SA13080] Debian update for libxml
[SA13077] Gentoo update for MIME-tools
[SA13076] Gentoo update for libxml2
[SA13075] SGI IRIX OpenSSL and OpenSSH Vulnerabilities
[SA13064] Mandrake update for perl-MIME-tools
[SA13060] Debian update for abiword
[SA13055] Mandrake update for perl-Archive-Zip
[SA13040] Caudium HTTP Request Processing Denial of Service
[SA13039] Gentoo update for Archive::Zip
[SA13035] bogofilter "quoted-printable decoder" Denial of Service
Vulnerability
[SA13031] haserl Manipulation of Critical Environment Variables
Vulnerability
[SA13026] HP Tru64 Secure Web Server Multiple Vulnerabilities
[SA13025] HP-UX Apache Multiple Vulnerabilities
[SA13016] Fedora update for libxml2
[SA13061] Debian iptables Module Loading Security Issue
[SA13050] Mandrake update for mod_ssl/apache2-mod_ssl
[SA13048] Conectiva update for rsync
[SA13018] MIMEDefang Unspecified Vulnerabilities
[SA13017] Debian update for squid
[SA13087] Gentoo update for proxytunnel
[SA13081] proxytunnel "message()" Format String Vulnerability
[SA13059] HP OpenView Operations Unspecified Vulnerability
[SA13054] Mandrake update for MySQL
[SA13084] Debian update for lvm10
[SA13083] LVM "lvmcreate_initrd" Script Insecure Temporary File
Creation
[SA13069] Gentoo update for Speedtouch USB driver
[SA13068] Gentoo update for Apache
[SA13052] Mandrake update for netatalk
[SA13042] Slackware update for apache/mod_ssl
[SA13032] Debian update for postgresql
[SA13028] Shadow "passwd_check()" Security Bypass Vulnerability
[SA13022] Debian update for catdoc
[SA13021] catdoc "xlsview" Privilege Escalation Vulnerability
[SA13049] Gentoo update for ppp
[SA13047] Safari "Javascript Disabled" Status Bar Spoofing

Other:
[SA13065] NetGear FWAG114 Default SNMP Community Strings Security
Issue

Cross Platform:
[SA13013] Quake2 Engine Multiple Vulnerabilities
[SA13073] Gbook MX Multiple SQL Injection Vulnerabilities
[SA13072] Sun Java System Web and Application Server Certificate
Handling Denial of Service
[SA13071] Gallery Unspecified Script Insertion Vulnerability
[SA13051] MIME::tools Malware Detection Bypass Vulnerability
[SA13041] HTML::Merge "template" Directory Traversal Vulnerability
[SA13038] Archive::Zip Zip Archive Virus Detection Bypass
Vulnerability
[SA13034] Land Down Under SQL Injection Vulnerabilities
[SA13029] PuTTY IPv6 "SSH2_MSG_DEBUG" Packet Handling Buffer Overflow
[SA13033] Chesapeake TFTP Server Directory Traversal and Denial of
Service
[SA13074] FsPHPGallery Denial of Service and Disclosure of System
Information Vulnerabilities
[SA13045] Apache "Space Headers" Denial of Service Vulnerability
[SA13090] Sun Java System Application Server HTTP TRACE Response
Cross-Site Scripting
[SA13086] Mozilla / Thunderbird Valid Email Address Enumeration
Weakness
[SA13023] PHP CURL "open_basedir" Security Bypass Vulnerability

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA13079] Helm Web Hosting Control Panel Two Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2004-11-03

Behrang Fouladi has reported two vulnerabilities in Helm Web Hosting
Control Panel, which can be exploited by malicious people to conduct
SQL injection and script insertion attacks.

Full Advisory:
http://secunia.com/advisories/13079/

 --

[SA13078] Web Forum Server Directory Traversal and Clear Text User
Credentials

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2004-11-03

R00tCr4ck has discovered two vulnerabilities in Web Forum Server, which
can be exploited to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/13078/

 --

[SA13070] WinRAR "Repair Archive" Feature Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-11-03

Peter Winter-Smith of NGSSoftware has reported a vulnerability in
WinRAR, which can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/13070/

 --

[SA13066] Cisco Secure ACS EAP-TLS User Authentication Bypass
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-11-03

A vulnerability has been reported in Cisco Secure Access Control Server
and Cisco Secure ACS Solution Engine, which can be exploited by
malicious people to bypass the user authentication.

Full Advisory:
http://secunia.com/advisories/13066/

 --

[SA13063] ArGoSoft FTP Server Shortcut Upload Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown
Released:    2004-11-02

A vulnerability with an unknown impact has been reported in ArGoSoft
FTP Server.

Full Advisory:
http://secunia.com/advisories/13063/

 --

[SA13062] MailEnable Professional Unspecified Webmail Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown
Released:    2004-11-02

A vulnerability with an unknown impact has been reported in MailEnable
Professional.

Full Advisory:
http://secunia.com/advisories/13062/

 --

[SA13067] F-Secure Anti-Virus for Exchange Nested Password Protected
Archives Bypass Issue

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-11-03

A vulnerability has been discovered in F-Secure Anti-Virus for MS
Exchange, which may prevent detection of malware in certain archives.

Full Advisory:
http://secunia.com/advisories/13067/

 --

[SA13024] Cyber Web Filter IP Address Restriction Security Bypass

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass
Released:    2004-10-29

Ziv Kamir has discovered a vulnerability in Cyber Web Filter, which can
be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/13024/

 --

[SA13015] Internet Explorer/Outlook Express Restricted Zone Status Bar
Spoofing

Critical:    Not critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-10-29

Benjamin Tobias Franz has discovered a weakness in Internet Explorer,
which can be exploited by malicious people to trick users into visiting
a malicious website by obfuscating URLs.

Full Advisory:
http://secunia.com/advisories/13015/


UNIX/Linux:--

[SA13082] Debian update for xpdf

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-11-03

Debian has issued an update for xpdf. This fixes some vulnerabilities,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/13082/

 --

[SA13058] Gentoo update for Cherokee

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-11-02

Gentoo has issued an update for Cherokee. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/13058/

 --

[SA13057] Cherokee Format String Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-11-02

Florian Schilhabel has reported a vulnerability in Cherokee, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/13057/

 --

[SA13056] Mandrake update for gaim

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-11-02

MandrakeSoft has issued an update for gaim. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/13056/

 --

[SA13053] Mandrake update for mpg123

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-11-02

MandrakeSoft has issued an update for mpg123. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/13053/

 --

[SA13046] Debian update for mpg123

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-11-01

Debian has issued an update for mpg123. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/13046/

 --

[SA13044] Conectiva update for squid

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-11-03

Conectiva has issued an update for squid. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/13044/

 --

[SA13043] Slackware update for libtiff

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-11-01

Slackware has issued an update for libtiff. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/13043/

 --

[SA13037] qwik-smtpd Format String Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-11-01

Dark Eagle has reported a vulnerability in qwik-smtpd, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/13037/

 --

[SA13036] Sun Java System Web Proxy Server Unspecified Buffer Overflow
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-11-01

Pentest Limited has reported some vulnerabilities in Sun Java System
Web Proxy Server, which can be exploited by malicious people to cause a
DoS (Denial of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/13036/

 --

[SA13027] OpenVMS Secure Web Server Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Privilege escalation, DoS, System access
Released:    2004-10-29

HP has acknowledged some vulnerabilities in OpenVMS running Secure Web
Server (CSWS), which can be exploited to cause a DoS (Denial of
Service), bypass certain security functionality, gain escalated
privileges, or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/13027/

 --

[SA13020] Fedora update for kdegraphics

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-10-29

Fedora has issued an update for kdegraphics. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a user's system or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/13020/

 --

[SA13019] Fedora update for gpdf

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-10-29

Fedora has issued an update for gpdf. This fixes some vulnerabilities,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/13019/

 --

[SA13014] Gentoo update for GPdf/KPDF/KOffice

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-10-28

Gentoo has issued updates for GPdf, KPDF, and KOffice. These fix some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/13014/

 --

[SA13092] Gentoo update for GD

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-11-04

Gentoo has issued an update for gd. This fixes a vulnerability, which
potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/13092/

 --

[SA13080] Debian update for libxml

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-11-03

Debian has issued an update for libxml. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/13080/

 --

[SA13077] Gentoo update for MIME-tools

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-11-03

Gentoo has issued an update for MIME-tools. This fixes a vulnerability,
which can be exploited by malware to bypass certain scanning
functionality.

Full Advisory:
http://secunia.com/advisories/13077/

 --

[SA13076] Gentoo update for libxml2

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-11-03

Gentoo has issued an update for libxml2. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/13076/

 --

[SA13075] SGI IRIX OpenSSL and OpenSSH Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, DoS
Released:    2004-11-03

SGI has acknowledged some vulnerabilities in IRIX, which can be
exploited by malicious people to cause a DoS (Denial-of-Service) or
potentially overwrite arbitrary files.

Full Advisory:
http://secunia.com/advisories/13075/

 --

[SA13064] Mandrake update for perl-MIME-tools

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-11-02

MandrakeSoft has issued an update for perl-MIME-tools. This fixes a
vulnerability, which can be exploited by malware to bypass certain
scanning functionality.

Full Advisory:
http://secunia.com/advisories/13064/

 --

[SA13060] Debian update for abiword

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-11-02

Debian has issued an update for abiword. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/13060/

 --

[SA13055] Mandrake update for perl-Archive-Zip

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-11-02

MandrakeSoft has issued an update for perl-Archive-Zip. This fixes a
vulnerability, which can be exploited by malware to bypass certain
scanning functionality.

Full Advisory:
http://secunia.com/advisories/13055/

 --

[SA13040] Caudium HTTP Request Processing Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-11-01

A vulnerability has been reported in Caudium, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/13040/

 --

[SA13039] Gentoo update for Archive::Zip

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-11-01

Gentoo has issued an update for Archive::Zip. This fixes a
vulnerability, which can be exploited by malware to bypass certain
scanning functionality.

Full Advisory:
http://secunia.com/advisories/13039/

 --

[SA13035] bogofilter "quoted-printable decoder" Denial of Service
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-11-01

A vulnerability has been reported in bogofilter, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/13035/

 --

[SA13031] haserl Manipulation of Critical Environment Variables
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2004-11-01

A vulnerability has been reported in haserl, which can be exploited by
malicious people to manipulate critical environment variables.

Full Advisory:
http://secunia.com/advisories/13031/

 --

[SA13026] HP Tru64 Secure Web Server Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Privilege escalation, DoS, System access
Released:    2004-10-29

HP has acknowledged some vulnerabilities in Secure Web Server for HP
Tru64, which is included in HP Internet Express (IX). These can be
exploited to gain escalated privileges, cause a DoS (Denial of
Service), or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/13026/

 --

[SA13025] HP-UX Apache Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Privilege escalation, DoS, System access
Released:    2004-10-29

HP has confirmed some vulnerabilities in HP-UX Apache, which can be
exploited to cause a DoS (Denial of Service), bypass configured access
controls, gain escalated privileges, or potentially compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/13025/

 --

[SA13016] Fedora update for libxml2

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-10-29

Fedora has issued an update for libxml2. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/13016/

 --

[SA13061] Debian iptables Module Loading Security Issue

Critical:    Less critical
Where:       From remote
Impact:      
Released:    2004-11-02



Full Advisory:
http://secunia.com/advisories/13061/

 --

[SA13050] Mandrake update for mod_ssl/apache2-mod_ssl

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-11-02

MandrakeSoft has issued updates for mod_ssl/apache2-mod_ssl. This fixes
a security issue, which can be exploited by malicious people to bypass
certain security restrictions.

Full Advisory:
http://secunia.com/advisories/13050/

 --

[SA13048] Conectiva update for rsync

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data, Exposure of system
information, Exposure of sensitive information
Released:    2004-11-01

Conectiva has issued an update for rsync. This fixes two
vulnerabilities, which potentially can be exploited by malicious users
to read or write arbitrary files on a vulnerable system.

Full Advisory:
http://secunia.com/advisories/13048/

 --

[SA13018] MIMEDefang Unspecified Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Unknown
Released:    2004-10-29

Some vulnerabilities with unknown impacts have been reported in
MIMEDefang.

Full Advisory:
http://secunia.com/advisories/13018/

 --

[SA13017] Debian update for squid

Critical:    Less critical
Where:       From remote
Impact:      Spoofing, DoS
Released:    2004-10-29

Debian has issued an update for squid. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and use the system for port scanning other hosts.

Full Advisory:
http://secunia.com/advisories/13017/

 --

[SA13087] Gentoo update for proxytunnel

Critical:    Less critical
Where:       From local network
Impact:      System access
Released:    2004-11-03

Gentoo has issued an update for proxytunnel. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a vulnerable system.

Full Advisory:
http://secunia.com/advisories/13087/

 --

[SA13081] proxytunnel "message()" Format String Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      System access
Released:    2004-11-03

Florian Schilhabel has reported a vulnerability in proxytunnel, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/13081/

 --

[SA13059] HP OpenView Operations Unspecified Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      Privilege escalation
Released:    2004-11-02

A vulnerability has been reported in HP OpenView Operations (OVO),
which can be exploited by certain malicious people to gain escalated
privileges on a vulnerable system.

Full Advisory:
http://secunia.com/advisories/13059/

 --

[SA13054] Mandrake update for MySQL

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass, Privilege escalation, DoS, System access
Released:    2004-11-02

MandrakeSoft has issued an update for MySQL. This fixes some
vulnerabilities, which can be exploited to overwrite arbitrary files,
bypass certain security restrictions, cause a DoS (Denial of Service),
or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/13054/

 --

[SA13084] Debian update for lvm10

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-11-03

Debian has issued an update for lvm10. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/13084/

 --

[SA13083] LVM "lvmcreate_initrd" Script Insecure Temporary File
Creation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-11-03

A vulnerability has been reported in LVM, which can be exploited by
malicious, local users to perform certain actions on a vulnerable
system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/13083/

 --

[SA13069] Gentoo update for Speedtouch USB driver

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-11-02

Gentoo has issued an update for Speedtouch USB driver. This fixes a
vulnerability, which potentially can be exploited by malicious, local
users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/13069/

 --

[SA13068] Gentoo update for Apache

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-11-02

Gentoo has issued an update for apache. This fixes a vulnerability,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/13068/

 --

[SA13052] Mandrake update for netatalk

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-11-02

MandrakeSoft has issued an update for netatalk. This fixes a
vulnerability, which can be exploited by malicious, local users to
perform certain actions on a vulnerable system with escalated
privileges.

Full Advisory:
http://secunia.com/advisories/13052/

 --

[SA13042] Slackware update for apache/mod_ssl

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-11-01

Slackware has issued updates for apache and mod_ssl. These fix a
vulnerability, which can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/13042/

 --

[SA13032] Debian update for postgresql

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-10-29

Debian has issued an update for postgresql. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/13032/

 --

[SA13028] Shadow "passwd_check()" Security Bypass Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2004-10-29

Martin Schulze has reported a vulnerability in Shadow, which can be
exploited by malicious, local users to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/13028/

 --

[SA13022] Debian update for catdoc

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-10-29

Debian has issued an update for catdoc. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/13022/

 --

[SA13021] catdoc "xlsview" Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-10-29

Colin Phipps has reported a vulnerability in catdoc, which can be
exploited by malicious, local users to perform certain actions on a
vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/13021/

 --

[SA13049] Gentoo update for ppp

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2004-11-01

Gentoo has issued an update for ppp. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/13049/

 --

[SA13047] Safari "Javascript Disabled" Status Bar Spoofing

Critical:    Not critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-11-01

A weakness has been discovered in Safari, which can be exploited by
malicious people to trick users into visiting a malicious website by
obfuscating URLs.

Full Advisory:
http://secunia.com/advisories/13047/


Other:--

[SA13065] NetGear FWAG114 Default SNMP Community Strings Security
Issue

Critical:    Moderately critical
Where:       From local network
Impact:      Manipulation of data, Exposure of system information,
Exposure of sensitive information
Released:    2004-11-02

Lyndon Dubeau has reported a security issue in NetGear FWAG114 ProSafe
Dual Band Wireless VPN Firewall, which can be exploited by malicious
people to read or manipulate configuration information.

Full Advisory:
http://secunia.com/advisories/13065/


Cross Platform:--

[SA13013] Quake2 Engine Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Spoofing, Manipulation of data, Exposure of sensitive
information, DoS, System access
Released:    2004-10-28

Multiple vulnerabilities have been reported in Quake2 engine, which can
be exploited by malicious people to cause a DoS (Denial of Service),
potentially execute arbitrary code, disclose sensitive information,
conduct spoofing attacks, and corrupt server data for other clients.

Full Advisory:
http://secunia.com/advisories/13013/

 --

[SA13073] Gbook MX Multiple SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2004-11-03

Some vulnerabilities have been reported in Gbook MX, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/13073/

 --

[SA13072] Sun Java System Web and Application Server Certificate
Handling Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-11-03

Some vulnerabilities have been reported in Sun Java System Web Server
and Sun Java System Application Server, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/13072/

 --

[SA13071] Gallery Unspecified Script Insertion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2004-11-03

A vulnerability has been reported in Gallery, which can be exploited by
malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/13071/

 --

[SA13051] MIME::tools Malware Detection Bypass Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-11-02

Stephane Lentz and Julian Field has reported a vulnerability in
MIME::tools, which can be exploited by malware to bypass certain
scanning functionality.

Full Advisory:
http://secunia.com/advisories/13051/

 --

[SA13041] HTML::Merge "template" Directory Traversal Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2004-11-01

A vulnerability has been reported in HTML::Merge, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/13041/

 --

[SA13038] Archive::Zip Zip Archive Virus Detection Bypass
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-11-01

A vulnerability has been reported in the Archive::Zip Perl module,
which potentially can be exploited by malware to bypass certain
scanning functionality.

Full Advisory:
http://secunia.com/advisories/13038/

 --

[SA13034] Land Down Under SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2004-11-01

Positive Technologies has reported some vulnerabilities in Land Down
Under, which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/13034/

 --

[SA13029] PuTTY IPv6 "SSH2_MSG_DEBUG" Packet Handling Buffer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-10-29

A vulnerability has been reported in PuTTY IPv6, which can be exploited
by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/13029/

 --

[SA13033] Chesapeake TFTP Server Directory Traversal and Denial of
Service

Critical:    Moderately critical
Where:       From local network
Impact:      Exposure of sensitive information, DoS, System access
Released:    2004-11-01

Luigi Auriemma has reported two vulnerabilities in Chesapeake TFTP
Server, which can be exploited by malicious people to disclose
sensitive information, potentially compromise a vulnerable system, and
cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/13033/

 --

[SA13074] FsPHPGallery Denial of Service and Disclosure of System
Information Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Exposure of system information, DoS
Released:    2004-11-03

Two vulnerabilities have been reported in FsPHPGallery, which can be
exploited by malicious people to cause a DoS (Denial of Service) and
disclose system information.

Full Advisory:
http://secunia.com/advisories/13074/

 --

[SA13045] Apache "Space Headers" Denial of Service Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2004-11-03

Chintan Trivedi has discovered a vulnerability in Apache, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/13045/

 --

[SA13090] Sun Java System Application Server HTTP TRACE Response
Cross-Site Scripting

Critical:    Not critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-11-04

Sun has acknowledged a problem in Sun Java System Application Server,
which potentially can be exploited to conduct cross-site scripting
attacks against users.

Full Advisory:
http://secunia.com/advisories/13090/

 --

[SA13086] Mozilla / Thunderbird Valid Email Address Enumeration
Weakness

Critical:    Not critical
Where:       From remote
Impact:      Exposure of system information
Released:    2004-11-03

plonk has discovered a weakness in Mozilla and Thunderbird, which can
be exploited by malicious people to enumerate valid email addresses.

Full Advisory:
http://secunia.com/advisories/13086/

 --

[SA13023] PHP CURL "open_basedir" Security Bypass Vulnerability

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2004-10-29

FraMe has discovered a vulnerability in PHP, which can be exploited by
malicious, local users to access files outside the "open_basedir"
root.

Full Advisory:
http://secunia.com/advisories/13023/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support at secunia.com
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45

========================================================================





More information about the ISN mailing list