[ISN] Secunia Weekly Summary - Issue: 2005-17

InfoSec News isn at c4i.org
Fri Apr 29 05:23:22 EDT 2005


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2005-04-21 - 2005-04-28                        

                       This week : 98 advisories                       

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Want a new IT Security job?

Vacant positions at Secunia:
http://secunia.com/secunia_vacancies/

========================================================================
2) This Week in Brief:

Microsoft Windows XP is vulnerable to a DoS (Denial of Service)
vulnerability, which can be exploited when e.g. a vulnerable user
visits a malicious web site using Internet Explorer.

Successful exploitation would cause the system to crash.

Currently, no solution is available from the vendor.

Reference:
http://secunia.com/SA15064

--

A vulnerability has been reported in KDE, which can be exploited by
malicious people to compromise a user's system.

The vendor has released patches, which can be found in referenced
Secunia advisory below.

References:
http://secunia.com/SA15060


VIRUS ALERTS:

Secunia has not issued any virus alerts during the week.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA15023] Realplayer/RealOne RAM File Processing Buffer Overflow
              Vulnerability
2.  [SA14820] Mozilla Firefox JavaScript Engine Information Disclosure
              Vulnerability
3.  [SA15103] Netscape GIF Image Netscape Extension 2 Buffer Overflow
4.  [SA15064] Microsoft Windows Image Rendering Denial of Service
              Vulnerability
5.  [SA15017] Microsoft Windows Explorer Web View Script Insertion
              Vulnerability
6.  [SA14938] Mozilla Firefox Multiple Vulnerabilities
7.  [SA14654] Mozilla Firefox Three Vulnerabilities
8.  [SA12758] Microsoft Word Document Parsing Buffer Overflow
              Vulnerabilities
9.  [SA12889] Microsoft Internet Explorer Multiple Vulnerabilities
10. [SA14821] Mozilla Suite JavaScript Engine Information Disclosure
              Vulnerability

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA15103] Netscape GIF Image Netscape Extension 2 Buffer Overflow
[SA15068] MailEnable Unspecified IMAP and SMTP Vulnerabilities
[SA15062] MailEnable HTTPMail Connector Authorization Header Buffer
Overflow
[SA15140] NetTerm NetFtpd "USER" Command Buffer Overflow Vulnerability
[SA15137] MetaCart e-Shop Two SQL Injection Vulnerabilities
[SA15136] MetaBid Three SQL Injection Vulnerabilities
[SA15134] MetaCart Multiple SQL Injection Vulnerabilities
[SA15108] Citrix Program Neighborhood Agent Two Vulnerabilities
[SA15105] ACS Blog Login Check Security Bypass Vulnerability
[SA15104] OneWorldStore "idOrder" Disclosure of Sensitive Information
[SA15101] nProtect Netizen Arbitrary File Placement Vulnerability
[SA15100] Argosoft Mail Server Cross-Site Scripting and Script
Insertion
[SA15087] Musicmatch Jukebox Two Vulnerabilities
[SA15072] BK Forum SQL Injection Vulnerabilities
[SA15071] StorePortal SQL Injection Vulnerabilities
[SA15066] Asp Nuke Cross-Site Scripting and SQL Injection
Vulnerabilities
[SA15057] OneWorldStore "chksettings.asp" Denial of Service
Vulnerability
[SA15055] CartWIZ Cross-Site Scripting and SQL Injection
Vulnerabilities
[SA15052] Yawcam Web Server Directory Traversal Vulnerability
[SA15106] ACS Blog Unspecified Cross-Site Scripting Vulnerability
[SA15064] Microsoft Windows Image Rendering Denial of Service
Vulnerability
[SA15085] Novell NSure Audit ASN.1 Message Parsing Denial of Service
[SA15118] dBpowerAMP Music Converter Privilege Escalation
Vulnerability
[SA15076] BitDefender Insecure Program Execution Vulnerability

UNIX/Linux:
[SA15148] Debian update for lsh-utils
[SA15146] Debian update for kdelibs
[SA15139] Red Hat update for mozilla
[SA15129] Gentoo update for xine-lib
[SA15122] HP-UX Mozilla Multiple Vulnerabilities
[SA15113] Sun Solaris Multiple libtiff Vulnerabilities
[SA15111] Red Hat update for openoffice
[SA15096] Gentoo update for kdelibs
[SA15095] Gentoo update for realplayer/helixplayer
[SA15069] Slackware update for mozilla
[SA15065] xine-lib RTSP and MMS Streams Buffer Overflow
Vulnerabilities
[SA15162] Fedora update for cyrus-imapd
[SA15131] Gentoo update for Convert-UUlib
[SA15126] Debian CVS Password Protection Bypass and Denial of Service
[SA15123] HP-UX Unspecified TCP/IP Denial of Service Vulnerability
[SA15117] Astaro update for kernel
[SA15114] Gentoo update for egroupware
[SA15112] Red Hat update for cvs
[SA15102] NetIQ Security Manager Directory Traversal Security Bypass
[SA15099] SafeStone DetectIT Directory Traversal Security Bypass
[SA15097] Gentoo update for kdewebdev
[SA15094] PowerLock NetworkSecurity Directory Traversal Security
Bypass
[SA15092] Red Hat update for kernel
[SA15091] Bsafe/Global Security for iSeries Directory Traversal
Security Bypass
[SA15090] FreeBSD update for cvs
[SA15088] Castlehill Computer Services SECURE/NET Directory Traversal
Security Bypass
[SA15070] Slackware update for python
[SA15063] RazLee Firewall+++ Directory Traversal Security Bypass
[SA15061] Slackware update for cvs
[SA15060] KDE Kommander Arbitrary Code Execution Vulnerability
[SA15056] Trustix update for cvs
[SA15053] Debian update for junkbuster
[SA15120] Snmppd Logging Functionality Format String Vulnerability
[SA15157] Conectiva update for squid
[SA15144] Ethereal RSVP Protocol Decoding Denial of Service
Vulnerability
[SA15125] tcpdump Multiple Denial of Service Vulnerabilities
[SA15119] SqWebMail "redirect" HTTP Response Splitting Vulnerability
[SA15082] Forwards Parent Frame Page Title Cross-Site Scripting
Vulnerability
[SA15081] Accounts Parent Frame Page Title Cross-Site Scripting
Vulnerability
[SA15080] Kronolith Parent Frame Page Title Cross-Site Scripting
Vulnerability
[SA15079] Nag Parent Frame Page Title Cross-Site Scripting
Vulnerability
[SA15078] Mnemo Parent Frame Page Title Cross-Site Scripting
Vulnerability
[SA15077] Horde IMP Parent Frame Page Title Cross-Site Scripting
Vulnerability
[SA15075] Passwd Parent Frame Page Title Cross-Site Scripting
Vulnerability
[SA15074] Turba Parent Frame Page Title Cross-Site Scripting
Vulnerability
[SA15073] Vacation Parent Frame Page Title Cross-Site Scripting
Vulnerability
[SA15115] Trustix update for postgresql
[SA15098] BIG-IP / 3-DNS Radius Authentication "login_radius" Security
Bypass
[SA15132] Gentoo update for rkhunter
[SA15127] Rootkit Hunter Insecure Temporary File Creation
[SA15086] Affix "affix_sock_register()" Privilege Escalation
Vulnerability
[SA15051] Gentoo update for openmosixview
[SA15163] Conectiva update for gaim
[SA15151] Fedora update for imagemagick
[SA15149] Debian update for gaim
[SA15124] ImageMagick PNM Image Decoding Buffer Overflow Vulnerability
[SA15059] Slackware update for gaim
[SA15138] Red Hat update for sharutils

Other:


Cross Platform:
[SA15133] GrayCMS "path_prefix" File Inclusion Vulnerability
[SA15107] yappa-ng Cross-Site Scripting and File Inclusion
Vulnerabilities
[SA15054] WebAPP E-Cart Module Shell Command Injection Vulnerability
[SA15147] PHPCart Price Manipulation Vulnerability
[SA15145] Serendipity Multiple Vulnerabilities
[SA15141] phpMyVisites "mylang" Local File Inclusion Vulnerability
[SA15130] Perl Convert::UUlib Module Buffer Overflow Vulnerability
[SA15116] PHP-Calendar SQL Injection Vulnerability
[SA15109] MaxDB Web Administration Service Buffer Overflow
Vulnerabilities
[SA15121] Confixx "change user" SQL Injection Vulnerability
[SA15110] VooDoo cIRCle BOTNET Buffer Overflow Vulnerability
[SA15084] phpMyVisites Cross-Site Scripting Vulnerabilities
[SA15083] Chora Parent Frame Page Title Cross-Site Scripting
Vulnerability
[SA15067] IBM WebSphere Application Server Cross-Site Scripting
Vulnerability
[SA15058] Woltlab Burning Board Two Cross-Site Scripting
Vulnerabilities
[SA15050] Macromedia ColdFusion Error Page Cross-Site Scripting

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA15103] Netscape GIF Image Netscape Extension 2 Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-04-26

A vulnerability has been reported in Netscape, which potentially can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/15103/

 --

[SA15068] MailEnable Unspecified IMAP and SMTP Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-04-26

Some vulnerabilities have been reported in MailEnable Professional and
MailEnable Enterprise, which potentially can be exploited by malicious
people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/15068/

 --

[SA15062] MailEnable HTTPMail Connector Authorization Header Buffer
Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-04-22

CorryL has reported a vulnerability in MailEnable, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/15062/

 --

[SA15140] NetTerm NetFtpd "USER" Command Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From local network
Impact:      System access
Released:    2005-04-27

Sergio Alvarez has reported a vulnerability in NetTerm, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/15140/

 --

[SA15137] MetaCart e-Shop Two SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2005-04-27

Diabolic Crab has reported two vulnerabilities in MetaCart e-Shop,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/15137/

 --

[SA15136] MetaBid Three SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2005-04-27

Diabolic Crab has reported some vulnerabilities in MetaBid, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/15136/

 --

[SA15134] MetaCart Multiple SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2005-04-27

Diabolic Crab has reported some vulnerabilities in MetaCart for SQL
Server, MetaCart for PayPal and MetaCart for PayFlow Link, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/15134/

 --

[SA15108] Citrix Program Neighborhood Agent Two Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-04-26

Patrik Karlsson has reported two vulnerabilities in Citrix Program
Neighborhood Agent, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/15108/

 --

[SA15105] ACS Blog Login Check Security Bypass Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2005-04-25

farhad koosha has reported a vulnerability in ACS Blog, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/15105/

 --

[SA15104] OneWorldStore "idOrder" Disclosure of Sensitive Information

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2005-04-25

Lostmon has reported a vulnerability in OneWorldStore, which can be
exploited by malicious people to disclose some sensitive information.

Full Advisory:
http://secunia.com/advisories/15104/

 --

[SA15101] nProtect Netizen Arbitrary File Placement Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2005-04-25

Keigo Yamazaki has reported a vulnerability in nProtect Netizen, which
can be exploited by malicious people to place arbitrary files on a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/15101/

 --

[SA15100] Argosoft Mail Server Cross-Site Scripting and Script
Insertion

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-04-26

ShineShadow has discovered two vulnerabilities in Argosoft Mail Server,
which can be exploited by malicious people to conduct cross-site
scripting and script insertion attacks.

Full Advisory:
http://secunia.com/advisories/15100/

 --

[SA15087] Musicmatch Jukebox Two Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, Manipulation of data
Released:    2005-04-25

Two vulnerabilities have been reported in Musicmatch Jukebox, where one
has an unknown impact, and the other can be exploited by malicious
people to create or overwrite arbitrary files.

Full Advisory:
http://secunia.com/advisories/15087/

 --

[SA15072] BK Forum SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2005-04-25

Diabolic Crab has reported some vulnerabilities in BK Forum, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/15072/

 --

[SA15071] StorePortal SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2005-04-25

Diabolic Crab has reported some vulnerabilities in StorePortal, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/15071/

 --

[SA15066] Asp Nuke Cross-Site Scripting and SQL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2005-04-25

Diabolic Crab has reported some vulnerabilities in Asp Nuke, which can
be exploited by malicious people to conduct cross-site scripting and
SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/15066/

 --

[SA15057] OneWorldStore "chksettings.asp" Denial of Service
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2005-04-22

Lostmon has reported a vulnerability in OneWorldStore, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/15057/

 --

[SA15055] CartWIZ Cross-Site Scripting and SQL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
system information
Released:    2005-04-25

Diabolic Crab has reported some vulnerabilities in CartWIZ, which can
be exploited by malicious people to conduct cross-site scripting and
SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/15055/

 --

[SA15052] Yawcam Web Server Directory Traversal Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2005-04-22

Donato Ferrante has reported a vulnerability in Yawcam, which can be
exploited by malicious people to gain knowledge of sensitive
information.

Full Advisory:
http://secunia.com/advisories/15052/

 --

[SA15106] ACS Blog Unspecified Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-04-25

A vulnerability has been reported in ACS Blog, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/15106/

 --

[SA15064] Microsoft Windows Image Rendering Denial of Service
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2005-04-22

Andrew has discovered a vulnerability in Windows, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/15064/

 --

[SA15085] Novell NSure Audit ASN.1 Message Parsing Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2005-04-25

Dennis Rand has reported a vulnerability in Novell NSure Audit, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/15085/

 --

[SA15118] dBpowerAMP Music Converter Privilege Escalation
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-04-26

fRoGGz has discovered a vulnerability in dBpowerAMP Music Converter,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/15118/

 --

[SA15076] BitDefender Insecure Program Execution Vulnerability

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation, DoS
Released:    2005-04-26

fRoGGz has reported a vulnerability in BitDefender, which can be
exploited by malicious, local users to disable the virus protection or
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/15076/


UNIX/Linux:--

[SA15148] Debian update for lsh-utils

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2005-04-27

Debian has issued an update for lsh-utils. This fixes two
vulnerabilities, which potentially can be exploited by malicious people
to cause a DoS (Denial of Service) and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/15148/

 --

[SA15146] Debian update for kdelibs

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-04-27

Debian has issued an update for kdelibs. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/15146/

 --

[SA15139] Red Hat update for mozilla

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Exposure of system
information, Exposure of sensitive information, System access
Released:    2005-04-27

Red Hat has issued an update for mozilla. This fixes some
vulnerabilities, which can be exploited by malicious people to gain
knowledge of potentially sensitive information, conduct cross-site
scripting attacks, bypass certain security restrictions, and compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/15139/

 --

[SA15129] Gentoo update for xine-lib

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-04-27

Gentoo has issued an update for xine-lib. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/15129/

 --

[SA15122] HP-UX Mozilla Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Exposure of system information, Exposure
of sensitive information, DoS, System access
Released:    2005-04-26

HP has acknowledged multiple vulnerabilities in Mozilla for HP-UX,
which can be exploited by malicious people to cause a DoS (Denial of
Service), gain knowledge of potentially sensitive information, bypass
certain security restrictions, and compromise a user's system.

Full Advisory:
http://secunia.com/advisories/15122/

 --

[SA15113] Sun Solaris Multiple libtiff Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2005-04-26

Sun has acknowledged some vulnerabilities in Solaris, which potentially
can be exploited by malicious people to cause a DoS (Denial of Service)
or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/15113/

 --

[SA15111] Red Hat update for openoffice

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-04-26

Red Hat has issued an update for openoffice. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/15111/

 --

[SA15096] Gentoo update for kdelibs

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-04-25

Gentoo has issued an update for kdelibs. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/15096/

 --

[SA15095] Gentoo update for realplayer/helixplayer

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-04-25

Gentoo has issued updates for realplayer and helixplayer. These fix a
vulnerability, which can be exploited by malicious people to compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/15095/

 --

[SA15069] Slackware update for mozilla

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Exposure of system
information, Exposure of sensitive information, System access
Released:    2005-04-22

Slackware has issued an update for mozilla. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting attacks, bypass certain security restrictions,
gain knowledge of potentially sensitive information, and compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/15069/

 --

[SA15065] xine-lib RTSP and MMS Streams Buffer Overflow
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-04-22

Some vulnerabilities have been reported in xine-lib, which potentially
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/15065/

 --

[SA15162] Fedora update for cyrus-imapd

Critical:    Moderately critical
Where:       From remote
Impact:      System access, DoS
Released:    2005-04-28

Fedora has issued an update for cyrus-imapd. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/15162/

 --

[SA15131] Gentoo update for Convert-UUlib

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-04-27

Gentoo has issued an update for Convert-UUlib. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/15131/

 --

[SA15126] Debian CVS Password Protection Bypass and Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, Security Bypass
Released:    2005-04-27

Debian has issued an update for cvs. This fixes two vulnerabilities,
which can be exploited by malicious people to bypass password
protection or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/15126/

 --

[SA15123] HP-UX Unspecified TCP/IP Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2005-04-26

A vulnerability has been reported in HP-UX, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/15123/

 --

[SA15117] Astaro update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2005-04-26

Astaro has issued an update for the kernel. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/15117/

 --

[SA15114] Gentoo update for egroupware

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2005-04-26

Gentoo has issued an update for egroupware. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting and SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/15114/

 --

[SA15112] Red Hat update for cvs

Critical:    Moderately critical
Where:       From remote
Impact:      System access, DoS, Unknown
Released:    2005-04-26

Red Hat has issued an update for cvs. This fixes some vulnerabilities,
which potentially can be exploited by malicious people to cause a DoS
(Denial of Service) and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/15112/

 --

[SA15102] NetIQ Security Manager Directory Traversal Security Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2005-04-25

NOTE: Based on information from the vendor, this is NOT a security
issue in the mentioned product and the advisory has therefore been
revoked.

Full Advisory:
http://secunia.com/advisories/15102/

 --

[SA15099] SafeStone DetectIT Directory Traversal Security Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2005-04-25

Shalom Carmel has reported a security issue in SafeStone DetectIT,
which can be exploited by malicious users to bypass certain
restrictions.

Full Advisory:
http://secunia.com/advisories/15099/

 --

[SA15097] Gentoo update for kdewebdev

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-04-25

Gentoo has issued an update for kdewebdev. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/15097/

 --

[SA15094] PowerLock NetworkSecurity Directory Traversal Security
Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2005-04-25

Shalom Carmel has reported a security issue in PowerLock
NetworkSecurity, which can be exploited by malicious users to bypass
certain restrictions.

Full Advisory:
http://secunia.com/advisories/15094/

 --

[SA15092] Red Hat update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, Privilege escalation,
DoS
Released:    2005-04-25

Red Hat has issued an update for the kernel. This fixes multiple
vulnerabilities, which can be exploited to gain knowledge of
potentially sensitive information, cause a DoS (Denial of Service), or
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/15092/

 --

[SA15091] Bsafe/Global Security for iSeries Directory Traversal
Security Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2005-04-25

Shalom Carmel has reported a security issue in Bsafe/Global Security
for iSeries, which can be exploited by malicious users to bypass
certain restrictions.

Full Advisory:
http://secunia.com/advisories/15091/

 --

[SA15090] FreeBSD update for cvs

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, DoS, System access
Released:    2005-04-25

FreeBSD has issued an update for cvs. This fixes some vulnerabilities,
which potentially can be exploited by malicious people to cause a DoS
(Denial of Service) and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/15090/

 --

[SA15088] Castlehill Computer Services SECURE/NET Directory Traversal
Security Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2005-04-25

Shalom Carmel has reported a security issue in Castlehill Computer
Services SECURE/NET, which can be exploited by malicious users to
bypass certain restrictions.

Full Advisory:
http://secunia.com/advisories/15088/

 --

[SA15070] Slackware update for python

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data, Exposure of
sensitive information, System access
Released:    2005-04-22

Slackware has issued an update for python. This fixes a vulnerability,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/15070/

 --

[SA15063] RazLee Firewall+++ Directory Traversal Security Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2005-04-25

Shalom Carmel has reported a security issue in RazLee Firewall+++,
which can be exploited by malicious users to bypass certain
restrictions.

Full Advisory:
http://secunia.com/advisories/15063/

 --

[SA15061] Slackware update for cvs

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, DoS, System access
Released:    2005-04-22

Slackware has issued an update for cvs. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to cause a DoS (Denial of Service) and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/15061/

 --

[SA15060] KDE Kommander Arbitrary Code Execution Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-04-22

Eckhart Wörner has reported a vulnerability in KDE, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/15060/

 --

[SA15056] Trustix update for cvs

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, DoS, System access
Released:    2005-04-22

Trustix has issued an update for cvs. This fixes some vulnerabilities,
which potentially can be exploited by malicious people to cause a DoS
(Denial of Service) and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/15056/

 --

[SA15053] Debian update for junkbuster

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, DoS, System access
Released:    2005-04-22

Debian has issued an update for junkbuster. This fixes two
vulnerabilities, which can be exploited by malicious people to
manipulate certain information, cause a DoS (Denial of Service) and
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/15053/

 --

[SA15120] Snmppd Logging Functionality Format String Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2005-04-26

dong-houn you has reported a vulnerability in Snmppd, which potentially
can be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/15120/

 --

[SA15157] Conectiva update for squid

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2005-04-28

Conectiva has issued an update for squid. This fixes a security issue,
which may disclose sensitive information to malicious people.

Full Advisory:
http://secunia.com/advisories/15157/

 --

[SA15144] Ethereal RSVP Protocol Decoding Denial of Service
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2005-04-27

Vade79 has reported a vulnerability in Ethereal, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/15144/

 --

[SA15125] tcpdump Multiple Denial of Service Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2005-04-27

Vade79 has reported some vulnerabilities in tcpdump, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/15125/

 --

[SA15119] SqWebMail "redirect" HTTP Response Splitting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-04-26

Zinho has reported a vulnerability in SqWebMail, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/15119/

 --

[SA15082] Forwards Parent Frame Page Title Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-04-25

A vulnerability has been reported in Forwards, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/15082/

 --

[SA15081] Accounts Parent Frame Page Title Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-04-25

A vulnerability has been reported in Accounts, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/15081/

 --

[SA15080] Kronolith Parent Frame Page Title Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-04-25

A vulnerability has been reported in Kronolith, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/15080/

 --

[SA15079] Nag Parent Frame Page Title Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-04-25

A vulnerability has been reported in Nag, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/15079/

 --

[SA15078] Mnemo Parent Frame Page Title Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-04-25

A vulnerability has been reported in Mnemo, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/15078/

 --

[SA15077] Horde IMP Parent Frame Page Title Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-04-25

A vulnerability has been reported in Horde IMP, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/15077/

 --

[SA15075] Passwd Parent Frame Page Title Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-04-25

A vulnerability has been reported in Passwd, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/15075/

 --

[SA15074] Turba Parent Frame Page Title Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-04-25

A vulnerability has been reported in Turba, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/15074/

 --

[SA15073] Vacation Parent Frame Page Title Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-04-25

A vulnerability has been reported in Vacation, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/15073/

 --

[SA15115] Trustix update for postgresql

Critical:    Less critical
Where:       From local network
Impact:      Privilege escalation
Released:    2005-04-26

Trustix has issued an update for postgresql. This fixes some
vulnerabilities, which can be exploited by malicious users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/15115/

 --

[SA15098] BIG-IP / 3-DNS Radius Authentication "login_radius" Security
Bypass

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass
Released:    2005-04-25

The vendor has acknowledged a vulnerability in BIG-IP and 3-DNS, which
can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/15098/

 --

[SA15132] Gentoo update for rkhunter

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-04-27

Gentoo has issued an update for rkhunter. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
perform certain actions on a vulnerable system with escalated
privileges.

Full Advisory:
http://secunia.com/advisories/15132/

 --

[SA15127] Rootkit Hunter Insecure Temporary File Creation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-04-27

Sune Kloppenborg Jeppesen and Tavis Ormandy has reported some
vulnerabilities in Rootkit Hunter, which potentially can be exploited
by malicious, local users to perform certain actions on a vulnerable
system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/15127/

 --

[SA15086] Affix "affix_sock_register()" Privilege Escalation
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-04-25

Kevin Finisterre has reported a vulnerability in Affix, which may be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/15086/

 --

[SA15051] Gentoo update for openmosixview

Critical:    Less critical
Where:       Local system
Impact:      Manipulation of data, Privilege escalation
Released:    2005-04-22

Gentoo has issued an update for openmosixview. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
perform certain actions on a vulnerable system with escalated
privileges.

Full Advisory:
http://secunia.com/advisories/15051/

 --

[SA15163] Conectiva update for gaim

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2005-04-28

Conectiva has issued an update for gaim. This fixes some weaknesses,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/15163/

 --

[SA15151] Fedora update for imagemagick

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2005-04-28

Fedora has issued an update for imagemagick. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/15151/

 --

[SA15149] Debian update for gaim

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2005-04-27

Debian has issued an update for gaim. This fixes a weakness, which can
be exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/15149/

 --

[SA15124] ImageMagick PNM Image Decoding Buffer Overflow Vulnerability

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2005-04-27

Damian Put has reported a vulnerability in ImageMagick, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/15124/

 --

[SA15059] Slackware update for gaim

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2005-04-22

Slackware has issued an update for gaim. This fixes some weaknesses,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/15059/

 --

[SA15138] Red Hat update for sharutils

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2005-04-27

Red Hat has issued an update for sharutils. This fixes a vulnerability,
which potentially can be exploited by malicious, local users to conduct
certain actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/15138/


Other:


Cross Platform:--

[SA15133] GrayCMS "path_prefix" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-04-27

Kold has reported a vulnerability in GrayCMS, which can be exploited by
malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/15133/

 --

[SA15107] yappa-ng Cross-Site Scripting and File Inclusion
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, System access
Released:    2005-04-26

James Bercegay has reported some vulnerabilities in yappa-ng, which can
be exploited by malicious people to conduct cross-site scripting attacks
and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/15107/

 --

[SA15054] WebAPP E-Cart Module Shell Command Injection Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2005-04-22

SoulBlack has reported a vulnerability in the E-Cart module for WebAPP,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/15054/

 --

[SA15147] PHPCart Price Manipulation Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2005-04-27

Lostmon has reported a vulnerability in PHPCart, which can be exploited
by malicious people to manipulate orders.

Full Advisory:
http://secunia.com/advisories/15147/

 --

[SA15145] Serendipity Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, Cross Site Scripting, Manipulation of data
Released:    2005-04-27

Some vulnerabilities have been reported in Serendipity, where some have
unknown impacts and others, which potentially can be exploited by
malicious people to conduct cross-site scripting and SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/15145/

 --

[SA15141] phpMyVisites "mylang" Local File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2005-04-27

Max Cerny has reported a vulnerability in phpMyVisites, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/15141/

 --

[SA15130] Perl Convert::UUlib Module Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2005-04-27

A vulnerability has been reported in the Convert::UUlib module for
Perl, which potentially can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/15130/

 --

[SA15116] PHP-Calendar SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2005-04-27

A vulnerability has been reported in PHP-Calendar, which potentially
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/15116/

 --

[SA15109] MaxDB Web Administration Service Buffer Overflow
Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2005-04-26

Three vulnerabilities have been reported in MaxDB, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/15109/

 --

[SA15121] Confixx "change user" SQL Injection Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2005-04-26

Erich Klaus has reported a vulnerability in Confixx, which can be
exploited by malicious users to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/15121/

 --

[SA15110] VooDoo cIRCle BOTNET Buffer Overflow Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2005-04-26

A vulnerability has been reported in VooDoo cIRCle, which can be
exploited by malicious users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/15110/

 --

[SA15084] phpMyVisites Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-04-25

benjilenoob has reported some vulnerabilities in phpMyVisites, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/15084/

 --

[SA15083] Chora Parent Frame Page Title Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-04-25

A vulnerability has been reported in Chora, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/15083/

 --

[SA15067] IBM WebSphere Application Server Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-04-25

Dr_insane has reported a vulnerability in IBM WebSphere Application
Server, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/15067/

 --

[SA15058] Woltlab Burning Board Two Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-04-25

Two vulnerabilities have been reported in Woltlab Burning Board, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/15058/

 --

[SA15050] Macromedia ColdFusion Error Page Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2005-04-26

Dr_insane has discovered a vulnerability in Macromedia ColdFusion,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/15050/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support at secunia.com
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45





More information about the ISN mailing list