[ISN] Secunia Weekly Summary - Issue: 2005-4
InfoSec News
isn at c4i.org
Mon Jan 31 04:07:50 EST 2005
========================================================================
The Secunia Weekly Advisory Summary
2005-01-20 - 2005-01-27
This week : 100 advisories
========================================================================
Table of Contents:
1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing
========================================================================
1) Word From Secunia:
The Secunia staff is spending hours every day to assure you the best
and most reliable source for vulnerability information. Every single
vulnerability report is being validated and verified before a Secunia
advisory is written.
Secunia validates and verifies vulnerability reports in many different
ways e.g. by downloading the software and performing comprehensive
tests, by reviewing source code, or by validating the credibility of
the source from which the vulnerability report was issued.
As a result, Secunia's database is the most correct and complete source
for recent vulnerability information available on the Internet.
Secunia Online Vulnerability Database:
http://secunia.com/
========================================================================
2) This Week in Brief:
ADVISORIES:
Two vulnerabilities have been reported in Sun Java Plug-in, which can
be exploited by malicious people to bypass certain security
restrictions or compromise a user's system.
The vendor has issued updated versions.
References:
http://secunia.com/SA13918/
--
Apple has issued a security update for Mac OS X, which fixes various
vulnerabilities.
In addition, a vulnerability was reported in iSync mRouter for Mac OS
X, which can be exploited by local users to escalate their privileges.
More information can be found in Secunia advisories below.
References:
http://secunia.com/SA13965/
http://secunia.com/SA14005/
VIRUS ALERTS:
During the last week, Secunia issued 1 MEDIUM RISK virus alert.
Please refer to the grouped virus profile below for more information:
Bagle.bj - MEDIUM RISK Virus Alert - 2005-01-27 11:16 GMT+1
http://secunia.com/virus_information/14877/bagle.bj/
========================================================================
3) This Weeks Top Ten Most Read Advisories:
1. [SA12889] Microsoft Internet Explorer Multiple Vulnerabilities
2. [SA13482] Internet Explorer DHTML Edit ActiveX Control Cross-Site
Scripting
3. [SA14005] Mac OS X Security Update Fixes Multiple Vulnerabilities
4. [SA13918] Sun Java Plug-In Two Vulnerabilities
5. [SA13129] Mozilla / Mozilla Firefox Window Injection Vulnerability
6. [SA13599] Mozilla / Mozilla Firefox Download Dialog Source Spoofing
7. [SA13862] Oracle Products 23 Vulnerabilities
8. [SA12758] Microsoft Word Document Parsing Buffer Overflow
Vulnerability
9. [SA13861] BlackBerry Enterprise Server Mobile Data Service Denial
of Service
10. [SA13251] Microsoft Internet Explorer Window Injection
Vulnerability
========================================================================
4) Vulnerabilities Summary Listing
Windows:
[SA13986] W32Dasm Import/Export Functions Buffer Overflow
[SA13969] DivX Player ".dps" Skin File Directory Traversal
Vulnerability
[SA13966] Golden FTP Server Pro "RNTO" Command Buffer Overflow
[SA13964] Comersus Cart Multiple Vulnerabilities
[SA13985] Spectrum Cash Receipting System Weak Password Encryption
UNIX/Linux:
[SA14043] Gentoo update for graphicsmagick
[SA14028] Red Hat update for xpdf
[SA14021] Fedora update for koffice
[SA14020] Fedora update for kdegraphics
[SA14019] Fedora update for kdelibs
[SA14018] Debian update for xine-lib
[SA14014] Conectiva update for xpdf
[SA14011] Avaya Products Multiple Vulnerabilities
[SA14007] Gentoo update for awstats
[SA14005] Mac OS X Security Update Fixes Multiple Vulnerabilities
[SA14004] Mandrake update for tetex
[SA14003] Mandrake update for kdegraphics
[SA13998] Mandrake update for koffice
[SA13997] Mandrake update for gpdf
[SA13996] Mandrake update for xpdf
[SA13994] SUSE realplayer Multiple Vulnerabilities
[SA13991] Fedora update for tetex
[SA13974] Gentoo update for tetex/cstetex/ptex
[SA13963] SGI Advanced Linux Environment Multiple Updates
[SA13960] GraphicsMagick PSD Image Decoding Buffer Overflow
[SA13958] Gentoo update for koffice/kdegraphics
[SA13957] teTeX Multiple Vulnerabilities
[SA13949] Gentoo update for xpdf/gpdf
[SA13945] Fedora update for xpdf
[SA13941] Debian update for sword
[SA13939] Conectiva update for libtiff3
[SA13934] KOffice "Decrypt::makeFileKey2()" Buffer Overflow
[SA14048] Fedora update for enscript
[SA14038] Openswan XAUTH/PAM Buffer Overflow Vulnerability
[SA14036] Mandrake update for bind
[SA14026] BNC IRC proxy FD_SET Overflow Vulnerability
[SA14023] Conectiva update for squid
[SA14022] Fedora update for ethereal
[SA14009] BIND "q_usedns" Array Buffer Overflow Vulnerability
[SA14008] BIND Validator Denial of Service Vulnerability
[SA14002] Mandrake update for kernel
[SA13990] Gentoo update for evolution
[SA13989] Gentoo update for konversation
[SA13983] Mandrake update for squid
[SA13979] Mandrake update for ethereal
[SA13975] Debian update for enscript
[SA13973] Ubuntu update for enscript
[SA13968] GNU Enscript Multiple Vulnerabilities
[SA13967] Ubuntu update for evolution
[SA13955] Debian update for ethereal
[SA13954] Gentoo update for ethereal
[SA13953] Ubuntu update for squid
[SA13952] UnixWare update for OpenSSL
[SA13951] Debian update for unarj
[SA13946] Ethereal Multiple Unspecified Packet Dissector
Vulnerabilities
[SA13943] Debian update for squid
[SA13999] Mandrake update for cups
[SA13956] Gentoo update for cups
[SA13940] Fedora update for cups
[SA14013] SCO OpenServer update for wu-ftpd
[SA13978] Mandrake update for mailman
[SA13950] Gentoo update for mailman
[SA14050] Debian update for libdbi-perl
[SA14044] Gentoo update for perl/dbi
[SA14040] Astaro update for kernel
[SA14015] Perl DBI ProxyServer.pm Insecure Temporary File Creation
[SA14012] SCO OpenServer scosession Privilege Escalation Vulnerability
[SA13995] Debian update for vdr
[SA13992] Sun Solaris DHCP Administration Utilities Vulnerability
[SA13987] Debian update for zhcon
[SA13982] Mandrake update for zhcon
[SA13977] zhcon Arbitrary File Content Disclosure
[SA13972] Red Hat update for kernel
[SA13970] FireHOL Insecure Temporary File Creation Vulnerabilities
[SA13965] Mac OS X iSync mRouter Buffer Overflow Vulnerability
[SA13961] SUSE update for kernel
[SA13959] Gentoo update for mysql
[SA13944] Ubuntu update for php4
[SA13938] Debian xtrlock Security Bypass Vulnerability
[SA13933] Ghostscript Various Scripts Insecure Temporary File Creation
[SA13932] Ubuntu update for apache-utils
[SA13947] SCO OpenServer update for bind
[SA14037] Sun Solaris UDP End Point Handling Denial of Service
Other:
[SA14049] Juniper JUNOS Unspecified Packet Processing Denial of
Service
[SA14032] Cisco IOS IPv6 Packet Processing Denial of Service
[SA13942] OfficeConnect Wireless 11g Access Point Information
Disclosure
[SA14034] Cisco IOS BGP Protocol Processing Denial of Service
[SA14031] Cisco IOS MPLS Packet Processing Denial of Service
[SA13971] Xerox WorkCentre Pro PostScript Directory Traversal
Cross Platform:
[SA13948] TikiWiki "temp" Arbitrary Script Execution Vulnerability
[SA14027] Citadel/UX FD_SET Overflow Vulnerability
[SA14001] MoinMoin Unspecified Search ACL Security Bypass
Vulnerability
[SA13980] IDA Pro Import Library Name Handling Buffer Overflow
[SA13976] BRIBBLE webadmin Authentication Bypass Vulnerability
[SA13962] SquirrelMail Three Vulnerabilities
[SA13935] Help Desk Reloaded Unspecified Login Vulnerability
[SA14000] phpEventCalendar Events Script Insertion Vulnerability
[SA13988] Exponent CMS "module" Parameter Cross-Site Scripting
Vulnerability
[SA14010] iChain Mutual Authentication Unauthorised Resource Access
[SA13936] OpenH323 Gatekeeper Multiple Sockets Buffer Overflow
========================================================================
5) Vulnerabilities Content Listing
Windows:--
[SA13986] W32Dasm Import/Export Functions Buffer Overflow
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-01-25
Luigi Auriemma has reported a vulnerability in W32Dasm, which
potentially can be exploited by malicious people to compromise a user's
system.
Full Advisory:
http://secunia.com/advisories/13986/
--
[SA13969] DivX Player ".dps" Skin File Directory Traversal
Vulnerability
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-01-25
Luigi Auriemma has discovered a vulnerability in DivX Player, which can
be exploited by malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/13969/
--
[SA13966] Golden FTP Server Pro "RNTO" Command Buffer Overflow
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-01-24
barabas mutsonline has reported a vulnerability in Golden FTP Server
Pro, which can be exploited by malicious users to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/13966/
--
[SA13964] Comersus Cart Multiple Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: Security Bypass, Cross Site Scripting, Manipulation of
data
Released: 2005-01-25
raf somers has reported some vulnerabilities in Comersus Cart, which
can be exploited by malicious people to bypass certain security
restrictions, and conduct SQL injection and cross-site scripting
attacks.
Full Advisory:
http://secunia.com/advisories/13964/
--
[SA13985] Spectrum Cash Receipting System Weak Password Encryption
Critical: Not critical
Where: Local system
Impact: Brute force, Exposure of sensitive information
Released: 2005-01-26
Paul J Docherty has reported a security issue in Spectrum Cash
Receipting System, which potentially can be exploited by malicious,
local users to disclose user credentials.
Full Advisory:
http://secunia.com/advisories/13985/
UNIX/Linux:--
[SA14043] Gentoo update for graphicsmagick
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-27
Gentoo has issued an update for graphicsmagick. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/14043/
--
[SA14028] Red Hat update for xpdf
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-27
Red Hat has issued an update for xpdf. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.
Full Advisory:
http://secunia.com/advisories/14028/
--
[SA14021] Fedora update for koffice
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-26
Fedora has issued an update for koffice. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.
Full Advisory:
http://secunia.com/advisories/14021/
--
[SA14020] Fedora update for kdegraphics
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-26
Fedora has issued an update for kdegraphics. This fixes two
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.
Full Advisory:
http://secunia.com/advisories/14020/
--
[SA14019] Fedora update for kdelibs
Critical: Highly critical
Where: From remote
Impact: Manipulation of data, System access
Released: 2005-01-26
Fedora has issued an update for kdelibs. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
FTP command injection attacks and compromise a user's system.
Full Advisory:
http://secunia.com/advisories/14019/
--
[SA14018] Debian update for xine-lib
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-26
Debian has issued an update for xine-lib. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.
Full Advisory:
http://secunia.com/advisories/14018/
--
[SA14014] Conectiva update for xpdf
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-26
Conectiva has issued an update for xpdf. This fixes two
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.
Full Advisory:
http://secunia.com/advisories/14014/
--
[SA14011] Avaya Products Multiple Vulnerabilities
Critical: Highly critical
Where: From remote
Impact: Privilege escalation, DoS, System access
Released: 2005-01-26
Avaya has acknowledged multiple vulnerabilities in various products,
which potentially can be exploited to cause a DoS (Denial of Service),
gain escalated privileges, or compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/14011/
--
[SA14007] Gentoo update for awstats
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-26
Gentoo has issued an update for awstats. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.
Full Advisory:
http://secunia.com/advisories/14007/
--
[SA14005] Mac OS X Security Update Fixes Multiple Vulnerabilities
Critical: Highly critical
Where: From remote
Impact: Security Bypass, Cross Site Scripting, Spoofing, Exposure
of system information, Exposure of sensitive information, Privilege
escalation, System access
Released: 2005-01-26
Apple has issued a security update for Mac OS X, which fixes various
vulnerabilities.
Full Advisory:
http://secunia.com/advisories/14005/
--
[SA14004] Mandrake update for tetex
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-26
MandrakeSoft has issued an update for tetex. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a user's system.
Full Advisory:
http://secunia.com/advisories/14004/
--
[SA14003] Mandrake update for kdegraphics
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-26
MandrakeSoft has issued an update for kdegraphics. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a user's system.
Full Advisory:
http://secunia.com/advisories/14003/
--
[SA13998] Mandrake update for koffice
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-26
MandrakeSoft has issued an update for koffice. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a user's system.
Full Advisory:
http://secunia.com/advisories/13998/
--
[SA13997] Mandrake update for gpdf
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-26
MandrakeSoft has issued an update for gpdf. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.
Full Advisory:
http://secunia.com/advisories/13997/
--
[SA13996] Mandrake update for xpdf
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-26
MandrakeSoft has issued an update for xpdf. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.
Full Advisory:
http://secunia.com/advisories/13996/
--
[SA13994] SUSE realplayer Multiple Vulnerabilities
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-25
SUSE has acknowledged some vulnerabilities in realplayer, which can be
exploited by malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/13994/
--
[SA13991] Fedora update for tetex
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-25
Fedora has issued an update for tetex. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.
Full Advisory:
http://secunia.com/advisories/13991/
--
[SA13974] Gentoo update for tetex/cstetex/ptex
Critical: Highly critical
Where: From remote
Impact: Privilege escalation, System access
Released: 2005-01-24
Gentoo has issued updates for tetex, cstetex and ptex. These fix some
vulnerabilities, which can be exploited by malicious people to
compromise a user's system and by malicious, local users to perform
certain actions on a vulnerable system with escalated privileges.
Full Advisory:
http://secunia.com/advisories/13974/
--
[SA13963] SGI Advanced Linux Environment Multiple Updates
Critical: Highly critical
Where: From remote
Impact: Manipulation of data, DoS, System access
Released: 2005-01-24
SGI has issued a patch for SGI Advanced Linux Environment. This fixes
multiple vulnerabilities, which can be exploited to cause a DoS (Denial
of Service), manipulate certain files, or potentially compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/13963/
--
[SA13960] GraphicsMagick PSD Image Decoding Buffer Overflow
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-24
A vulnerability has been reported in GraphicsMagick, which potentially
can be exploited by malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/13960/
--
[SA13958] Gentoo update for koffice/kdegraphics
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-24
Gentoo has issued updates for koffice and kdegraphics. These fix a
vulnerability, which can be exploited by malicious people to compromise
a user's system.
Full Advisory:
http://secunia.com/advisories/13958/
--
[SA13957] teTeX Multiple Vulnerabilities
Critical: Highly critical
Where: From remote
Impact: Privilege escalation, System access
Released: 2005-01-24
Some vulnerabilities has been reported in teTeX, which potentially can
be exploited by malicious people to compromise a user's system and by
malicious, local users to perform certain actions on a vulnerable
system with escalated privileges.
Full Advisory:
http://secunia.com/advisories/13957/
--
[SA13949] Gentoo update for xpdf/gpdf
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-24
Gentoo has issued updates for xpdf and gpdf. These fix a vulnerability,
which can be exploited by malicious people to compromise a user's
system.
Full Advisory:
http://secunia.com/advisories/13949/
--
[SA13945] Fedora update for xpdf
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-20
Fedora has issued an update for xpdf. This fixes a vulnerability, which
can be exploited by malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/13945/
--
[SA13941] Debian update for sword
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-21
Debian has issued an update for sword. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.
Full Advisory:
http://secunia.com/advisories/13941/
--
[SA13939] Conectiva update for libtiff3
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-20
Conectiva has issued an update for libtiff3. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/13939/
--
[SA13934] KOffice "Decrypt::makeFileKey2()" Buffer Overflow
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-21
A vulnerability has been reported in KOffice, which can be exploited by
malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/13934/
--
[SA14048] Fedora update for enscript
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-01-27
Fedora has issued an update for enscript. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/14048/
--
[SA14038] Openswan XAUTH/PAM Buffer Overflow Vulnerability
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-01-27
A vulnerability has been reported in Openswan, which can be exploited
by malicious users to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/14038/
--
[SA14036] Mandrake update for bind
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2005-01-27
MandrakeSoft has issued an update for bind. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
Full Advisory:
http://secunia.com/advisories/14036/
--
[SA14026] BNC IRC proxy FD_SET Overflow Vulnerability
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2005-01-26
3APA3A has reported a vulnerability in BNC IRC proxy, which can be
exploited by malicious people to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/14026/
--
[SA14023] Conectiva update for squid
Critical: Moderately critical
Where: From remote
Impact: Security Bypass, DoS, System access
Released: 2005-01-27
Conectiva has issued an update for squid. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service), bypass certain security restrictions and
potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/14023/
--
[SA14022] Fedora update for ethereal
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2005-01-26
Fedora has issued an update for ethereal. This fixes multiple
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/14022/
--
[SA14009] BIND "q_usedns" Array Buffer Overflow Vulnerability
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2005-01-26
A vulnerability has been reported in BIND, which can be exploited by
malicious people to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/14009/
--
[SA14008] BIND Validator Denial of Service Vulnerability
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2005-01-26
A vulnerability has been reported in BIND, which can be exploited by
malicious people to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/14008/
--
[SA14002] Mandrake update for kernel
Critical: Moderately critical
Where: From remote
Impact: Security Bypass, Exposure of sensitive information,
Privilege escalation, DoS
Released: 2005-01-26
MandrakeSoft has issued an update for the kernel. This fixes multiple
vulnerabilities, which can be exploited to gain knowledge of sensitive
information, cause a DoS (Denial of Service), bypass certain security
restrictions, or gain escalated privileges on a vulnerable system.
Full Advisory:
http://secunia.com/advisories/14002/
--
[SA13990] Gentoo update for evolution
Critical: Moderately critical
Where: From remote
Impact: System access, Privilege escalation
Released: 2005-01-25
Gentoo has issued an update for evolution. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system or by malicious, local users to gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/13990/
--
[SA13989] Gentoo update for konversation
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-01-25
Gentoo has issued an update for konversation. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/13989/
--
[SA13983] Mandrake update for squid
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2005-01-25
MandrakeSoft has issued an update for squid. This fixes two
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/13983/
--
[SA13979] Mandrake update for ethereal
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2005-01-25
MandrakeSoft has issued an update for ethereal. This fixes multiple
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/13979/
--
[SA13975] Debian update for enscript
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-01-25
Debian has issued an update for enscript. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/13975/
--
[SA13973] Ubuntu update for enscript
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-01-25
Ubuntu has issued an update for enscript. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/13973/
--
[SA13968] GNU Enscript Multiple Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-01-25
Erik Sjölund has reported some vulnerabilities in GNU Enscript, which
potentially can be exploited by malicious people to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/13968/
--
[SA13967] Ubuntu update for evolution
Critical: Moderately critical
Where: From remote
Impact: System access, Privilege escalation
Released: 2005-01-25
Ubuntu has issued an update for evolution. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system, or by malicious, local users to gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/13967/
--
[SA13955] Debian update for ethereal
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2005-01-21
Debian has issued an update for ethereal. This fixes multiple
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/13955/
--
[SA13954] Gentoo update for ethereal
Critical: Moderately critical
Where: From remote
Impact: System access, DoS
Released: 2005-01-21
Gentoo has issued an update for ethereal. This fixes multiple
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/13954/
--
[SA13953] Ubuntu update for squid
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2005-01-21
Ubuntu has issued an update for squid. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/13953/
--
[SA13952] UnixWare update for OpenSSL
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2005-01-21
SCO has issued updates for OpenSSL. These fix three vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
Full Advisory:
http://secunia.com/advisories/13952/
--
[SA13951] Debian update for unarj
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-01-21
Debian has issued an update for unarj. This fixes two vulnerabilities,
which potentially can be exploited by malicious people to overwrite
files or compromise a user's system.
Full Advisory:
http://secunia.com/advisories/13951/
--
[SA13946] Ethereal Multiple Unspecified Packet Dissector
Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2005-01-21
Multiple vulnerabilities have been reported in Ethereal, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/13946/
--
[SA13943] Debian update for squid
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2005-01-20
Debian has issued an update for squid. This fixes two vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/13943/
--
[SA13999] Mandrake update for cups
Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2005-01-26
MandrakeSoft has issued an update for cups. This fixes a vulnerability,
which potentially can be exploited by malicious users to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/13999/
--
[SA13956] Gentoo update for cups
Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2005-01-24
Gentoo has issued an update for cups. This fixes a vulnerability, which
potentially can be exploited by malicious users to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/13956/
--
[SA13940] Fedora update for cups
Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2005-01-20
Fedora has issued an update for cups. This fixes a vulnerability, which
potentially can be exploited by malicious users to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/13940/
--
[SA14013] SCO OpenServer update for wu-ftpd
Critical: Less critical
Where: From remote
Impact: Security Bypass
Released: 2005-01-26
SCO has issued an update for wu-ftpd. This fixes a vulnerability, which
can be exploited by malicious, authenticated users to circumvent certain
restrictions.
Full Advisory:
http://secunia.com/advisories/14013/
--
[SA13978] Mandrake update for mailman
Critical: Less critical
Where: From remote
Impact: Cross Site Scripting
Released: 2005-01-25
MandrakeSoft has issued an update for mailman. This fixes a
vulnerability, which can be exploited by malicious people to conduct
cross-site scripting attacks.
Full Advisory:
http://secunia.com/advisories/13978/
--
[SA13950] Gentoo update for mailman
Critical: Less critical
Where: From remote
Impact: Cross Site Scripting
Released: 2005-01-24
Gentoo has issued an update for mailman. This fixes a vulnerability,
which can be exploited by malicious people to conduct cross-site
scripting attacks.
Full Advisory:
http://secunia.com/advisories/13950/
--
[SA14050] Debian update for libdbi-perl
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-01-27
Debian has issued an update for libdbi-perl. This fixes a
vulnerability, which can be exploited by malicious, local users to
perform certain actions on a vulnerable system with escalated
privileges.
Full Advisory:
http://secunia.com/advisories/14050/
--
[SA14044] Gentoo update for perl/dbi
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-01-27
Gentoo has issued updates for perl and DBI. These fix some
vulnerabilities, which can be exploited by malicious, local users to
perform certain actions on a vulnerable system with escalated
privileges.
Full Advisory:
http://secunia.com/advisories/14044/
--
[SA14040] Astaro update for kernel
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-01-27
Astaro has issued an update for the kernel. This fixes a vulnerability,
which can be exploited by malicious, local users to gain escalated
privileges.
Full Advisory:
http://secunia.com/advisories/14040/
--
[SA14015] Perl DBI ProxyServer.pm Insecure Temporary File Creation
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-01-27
Javier Fernández-Sanguino Peña has reported a vulnerability in Perl
DBI, which can be exploited by malicious, local users to perform
certain actions on a vulnerable system with escalated privileges.
Full Advisory:
http://secunia.com/advisories/14015/
--
[SA14012] SCO OpenServer scosession Privilege Escalation Vulnerability
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-01-26
A vulnerability has been reported in scosession in OpenServer, which
can be exploited by malicious, local users to gain escalated
privileges.
Full Advisory:
http://secunia.com/advisories/14012/
--
[SA13995] Debian update for vdr
Critical: Less critical
Where: Local system
Impact: Manipulation of data
Released: 2005-01-25
Debian has issued an update for vdr. This fixes a vulnerability, which
can be exploited by malicious, local users to manipulate sensitive
information.
Full Advisory:
http://secunia.com/advisories/13995/
--
[SA13992] Sun Solaris DHCP Administration Utilities Vulnerability
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-01-25
A vulnerability has been reported in Sun Solaris, which can be
exploited by malicious, local users to gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/13992/
--
[SA13987] Debian update for zhcon
Critical: Less critical
Where: Local system
Impact: Exposure of sensitive information
Released: 2005-01-25
Debian has issued an update for zhcon. This fixes a vulnerability,
which can be exploited by malicious, local users to disclose the
contents of arbitrary files.
Full Advisory:
http://secunia.com/advisories/13987/
--
[SA13982] Mandrake update for zhcon
Critical: Less critical
Where: Local system
Impact: Exposure of sensitive information
Released: 2005-01-25
MandrakeSoft has issued an update for zhcon. This fixes a
vulnerability, which can be exploited by malicious, local users to
disclose the contents of arbitrary files.
Full Advisory:
http://secunia.com/advisories/13982/
--
[SA13977] zhcon Arbitrary File Content Disclosure
Critical: Less critical
Where: Local system
Impact: Exposure of sensitive information
Released: 2005-01-25
Erik Sjölund has reported a vulnerability in zhcon, which can be
exploited by malicious, local users to disclose sensitive information.
Full Advisory:
http://secunia.com/advisories/13977/
--
[SA13972] Red Hat update for kernel
Critical: Less critical
Where: Local system
Impact: Unknown, Privilege escalation, DoS
Released: 2005-01-24
Red Hat has issued an update for the kernel. This fixes multiple
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service) or gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/13972/
--
[SA13970] FireHOL Insecure Temporary File Creation Vulnerabilities
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-01-24
Sam Couter has reported some vulnerabilities in FireHOL, which can be
exploited by malicious, local users to perform certain actions on a
vulnerable system with escalated privileges.
Full Advisory:
http://secunia.com/advisories/13970/
--
[SA13965] Mac OS X iSync mRouter Buffer Overflow Vulnerability
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-01-26
Braden Thomas has reported a vulnerability in iSync, which can be
exploited by malicious, local users to gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/13965/
--
[SA13961] SUSE update for kernel
Critical: Less critical
Where: Local system
Impact: Privilege escalation, DoS
Released: 2005-01-24
SUSE has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service) or gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/13961/
--
[SA13959] Gentoo update for mysql
Critical: Less critical
Where: Local system
Impact: Manipulation of data, Exposure of sensitive information,
Privilege escalation
Released: 2005-01-24
Gentoo has issued an update for mysql. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.
Full Advisory:
http://secunia.com/advisories/13959/
--
[SA13944] Ubuntu update for php4
Critical: Less critical
Where: Local system
Impact: Security Bypass
Released: 2005-01-21
Ubuntu has issued an update for php4. This fixes a vulnerability, which
can be exploited to access files outside the "open_basedir" root and
potentially bypass safe_mode restrictions.
Full Advisory:
http://secunia.com/advisories/13944/
--
[SA13938] Debian xtrlock Security Bypass Vulnerability
Critical: Less critical
Where: Local system
Impact: Security Bypass
Released: 2005-01-20
Debian has issued an update for xtrlock. This fixes a vulnerability,
which can be exploited by a malicious person with physical access to a
system to bypass certain security restrictions.
Full Advisory:
http://secunia.com/advisories/13938/
--
[SA13933] Ghostscript Various Scripts Insecure Temporary File Creation
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-01-21
Javier Fernández-Sanguino Peña has reported some vulnerabilities in
Ghostscript, which potentially can be exploited by malicious, local
users to conduct certain actions on a vulnerable system with escalated
privileges.
Full Advisory:
http://secunia.com/advisories/13933/
--
[SA13932] Ubuntu update for apache-utils
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-01-20
Ubuntu has issued an update for apache-utils. This fixes a
vulnerability, which can be exploited by malicious, local users to
perform certain actions on a vulnerable system with escalated
privileges.
Full Advisory:
http://secunia.com/advisories/13932/
--
[SA13947] SCO OpenServer update for bind
Critical: Not critical
Where: From local network
Impact: DoS
Released: 2005-01-21
SCO has issued an update for bind in OpenServer. This fixes a
vulnerability, which can be exploited by malicious people to poison the
DNS cache.
Full Advisory:
http://secunia.com/advisories/13947/
--
[SA14037] Sun Solaris UDP End Point Handling Denial of Service
Critical: Not critical
Where: Local system
Impact: DoS
Released: 2005-01-27
A vulnerability has been reported in Sun Solaris, which potentially can
be exploited by malicious, local users to cause a DoS (Denial of
Service).
Full Advisory:
http://secunia.com/advisories/14037/
Other:--
[SA14049] Juniper JUNOS Unspecified Packet Processing Denial of
Service
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2005-01-27
A vulnerability has been reported in JUNOS, which can be exploited by
malicious people to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/14049/
--
[SA14032] Cisco IOS IPv6 Packet Processing Denial of Service
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2005-01-27
A vulnerability has been reported in Cisco IOS, which can be exploited
by malicious people to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/14032/
--
[SA13942] OfficeConnect Wireless 11g Access Point Information
Disclosure
Critical: Moderately critical
Where: From local network
Impact: Exposure of system information, Exposure of sensitive
information
Released: 2005-01-20
A vulnerability has been reported in 3Com OfficeConnect Wireless 11g
Access Point, which can be exploited by malicious people to gain
knowledge of sensitive information.
Full Advisory:
http://secunia.com/advisories/13942/
--
[SA14034] Cisco IOS BGP Protocol Processing Denial of Service
Critical: Less critical
Where: From remote
Impact: DoS
Released: 2005-01-27
A vulnerability has been reported in Cisco IOS, which can be exploited
by malicious people to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/14034/
--
[SA14031] Cisco IOS MPLS Packet Processing Denial of Service
Critical: Less critical
Where: From local network
Impact: DoS
Released: 2005-01-27
A vulnerability has been reported in Cisco IOS, which can be exploited
by malicious people to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/14031/
--
[SA13971] Xerox WorkCentre Pro PostScript Directory Traversal
Critical: Less critical
Where: From local network
Impact: Exposure of sensitive information
Released: 2005-01-24
A vulnerability has been reported in Xerox WorkCentre Pro, which can be
exploited by malicious users to gain knowledge of sensitive
information.
Full Advisory:
http://secunia.com/advisories/13971/
Cross Platform:--
[SA13948] TikiWiki "temp" Arbitrary Script Execution Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-01-21
Some vulnerabilities have been reported in TikiWiki, which can be
exploited by malicious people to compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/13948/
--
[SA14027] Citadel/UX FD_SET Overflow Vulnerability
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2005-01-26
3APA3A has reported a vulnerability in Citadel/UX, which can be
exploited by malicious people to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/14027/
--
[SA14001] MoinMoin Unspecified Search ACL Security Bypass
Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Security Bypass
Released: 2005-01-26
A vulnerability has been reported in MoinMoin, which can be exploited
by malicious people to bypass certain security restrictions.
Full Advisory:
http://secunia.com/advisories/14001/
--
[SA13980] IDA Pro Import Library Name Handling Buffer Overflow
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-01-25
Lord Yup has reported a vulnerability in IDA Pro, which potentially can
be exploited by malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/13980/
--
[SA13976] BRIBBLE webadmin Authentication Bypass Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Security Bypass
Released: 2005-01-25
A vulnerability has been reported in BRIBBLE, which can be exploited by
malicious people to bypass certain security restrictions.
Full Advisory:
http://secunia.com/advisories/13976/
--
[SA13962] SquirrelMail Three Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting, Exposure of sensitive information
Released: 2005-01-24
Three vulnerabilities have been reported in SquirrelMail, which can be
exploited by malicious people to gain knowledge of sensitive
information or conduct cross-site scripting attacks.
Full Advisory:
http://secunia.com/advisories/13962/
--
[SA13935] Help Desk Reloaded Unspecified Login Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Unknown
Released: 2005-01-24
A vulnerability with an unknown impact has been reported in Help Desk
Reloaded.
Full Advisory:
http://secunia.com/advisories/13935/
--
[SA14000] phpEventCalendar Events Script Insertion Vulnerability
Critical: Less critical
Where: From remote
Impact: Cross Site Scripting
Released: 2005-01-26
Madelman has reported a vulnerability in phpEventCalendar, which can be
exploited by malicious people to conduct script insertion attacks.
Full Advisory:
http://secunia.com/advisories/14000/
--
[SA13988] Exponent CMS "module" Parameter Cross-Site Scripting
Vulnerability
Critical: Less critical
Where: From remote
Impact: Cross Site Scripting, Exposure of system information
Released: 2005-01-26
y3dips has reported a vulnerability in Exponent CMS, which can be
exploited by malicious people to conduct cross-site scripting attacks.
Full Advisory:
http://secunia.com/advisories/13988/
--
[SA14010] iChain Mutual Authentication Unauthorised Resource Access
Critical: Less critical
Where: From local network
Impact: Security Bypass
Released: 2005-01-27
A security issue has been reported in Novell iChain, which potentially
can be exploited by malicious people to bypass certain security
restrictions.
Full Advisory:
http://secunia.com/advisories/14010/
--
[SA13936] OpenH323 Gatekeeper Multiple Sockets Buffer Overflow
Critical: Less critical
Where: From local network
Impact: DoS
Released: 2005-01-24
A vulnerability has been reported in OpenH323 Gatekeeper, which can be
exploited by malicious people to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/13936/
========================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Subscribe:
http://secunia.com/secunia_weekly_summary/
Contact details:
Web : http://secunia.com/
E-mail : support at secunia.com
Tel : +45 70 20 51 44
Fax : +45 70 20 51 45
More information about the ISN
mailing list