[ISN] Secunia Weekly Summary - Issue: 2006-3

InfoSec News isn at c4i.org
Fri Jan 20 01:13:53 EST 2006


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2006-01-12 - 2006-01-19                        

                       This week : 92 advisories                       

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

The Secunia staff is spending hours every day to assure you the best
and most reliable source for vulnerability information. Every single 
vulnerability report is being validated and verified before a Secunia
advisory is written.

Secunia validates and verifies vulnerability reports in many different
ways e.g. by downloading the software and performing comprehensive
tests, by reviewing source code, or by validating the credibility of
the source from which the vulnerability report was issued.

As a result, Secunia's database is the most correct and complete source
for recent vulnerability information available on the Internet.

Secunia Online Vulnerability Database:
http://secunia.com/

========================================================================
2) This Week in Brief:

82 vulnerabilities and security issues have been reported in various
Oracle products. Some have an unknown impact, and others can be
exploited to gain knowledge of certain information, overwrite arbitrary
files, and to conduct SQL injection attacks.

Additional details about the vulnerabilities can be found in the
referenced Secunia advisory below.

Reference:
http://secunia.com/SA18493

--

A vulnerability has been reported in AOL, which can be exploited by
malicious people to cause a DoS (Denial of Service) and potentially
compromise a user's system.

Fixes are available from the vendor, please refer to the referenced
Secunia advisory for details.

Reference:
http://secunia.com/SA18521


VIRUS ALERTS:

Secunia has not issued any virus alerts during the week.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA18255] Microsoft Windows WMF "SETABORTPROC" Arbitrary Code
              Execution
2.  [SA18368] Microsoft Outlook / Exchange TNEF Decoding Arbitrary Code
              Execution Vulnerability
3.  [SA15546] Microsoft Internet Explorer "window()" Arbitrary Code
              Execution Vulnerability
4.  [SA18521] AOL You've Got Pictures ActiveX Control Buffer Overflow
5.  [SA18131] Symantec AntiVirus RAR Archive Decompression Buffer
              Overflow
6.  [SA18370] QuickTime Multiple Image/Media File Handling
              Vulnerabilities
7.  [SA18493] Oracle Products Multiple Vulnerabilities and Security
              Issues
8.  [SA15907] Mozilla Thunderbird Attachment Spoofing Vulnerability
9.  [SA15601] Mozilla / Mozilla Firefox Frame Injection Vulnerability
10. [SA11762] Opera Browser Favicon Displaying Address Bar Spoofing
              Vulnerability

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA18521] AOL You've Got Pictures ActiveX Control Buffer Overflow
[SA18522] BitComet Client URI Handling Buffer Overflow Vulnerability
[SA18508] Farmers WIFE FTP Directory Traversal Vulnerability
[SA18488] SimpleBlog Script Insertion and SQL Injection
Vulnerabilities
[SA18439] Mini-NUKE SQL Injection and Unauthenticated Password Change
[SA18492] Helm Web Hosting Control Panel "txtEmailAddress" Cross-Site
Scripting
[SA18466] AmbiCom Blue Neighbors Object Push Service Buffer Overflow
[SA18443] FogBugz "dest" Cross-Site Scripting Vulnerability
[SA18531] CA DM Deployment Common Component Denial of Service
[SA18494] Cisco CallManager Connection Handling Denial of Service
[SA18437] Toshiba Bluetooth Stack File Upload Directory Traversal
Vulnerability

UNIX/Linux:
[SA18517] SGI Advanced Linux Environment Multiple Updates
[SA18503] SUSE update for multiple packages
[SA18484] Novell Open Enterprise Server Remote Manager Buffer Overflow
[SA18478] Mandriva update for clamav
[SA18463] Trustix update for multiple packages
[SA18453] Gentoo update for clamav
[SA18435] Gentoo update for
sun-jdk/sun-jre-bin/blackdown-jdk/blackdown-jre
[SA18520] Fedora update for kdegraphics
[SA18509] OpenServer update for gdk-pixbuf
[SA18507] Avaya PDS HP-UX SecureShell Denial of Service Vulnerability
[SA18496] Debian update for albatross
[SA18491] Avaya Products xloadimage NIFF Image Handling Buffer
Overflow
[SA18489] Mandriva update for hylafax
[SA18482] Linux Kernel Multiple Denial of Service Vulnerabilities
[SA18481] Debian update for mantis
[SA18457] Albatross Arbitrary Command Execution Vulnerability
[SA18456] Ubuntu update for mailman
[SA18452] Gentoo update for blender
[SA18451] Gentoo update for wine
[SA18449] Mailman Dates Denial of Service Vulnerability
[SA18448] Fedora update for tetex
[SA18436] Debian update for gpdf
[SA18525] CMU SNMP snmptrapd Format String Vulnerability
[SA18495] EMC NetWorker Denial of Service and Buffer Overflow
Vulnerabilities
[SA18526] Red Hat update for apache
[SA18510] Red Hat update for kernel
[SA18472] Widexl Download Tracker "ID" Parameter Cross-Site Scripting
[SA18468] Faq-O-Matic Cross-Site Scripting Vulnerabilities
[SA18530] Debian update for antiword
[SA18527] Ubuntu update for kernel
[SA18502] Avaya Products util-linux / mount Security Issue and
Vulnerability
[SA18498] Sun Solaris lpsched Unspecified Vulnerability
[SA18497] Serial Line Sniffer "HOME" Environment Variable Buffer
Overflow
[SA18487] Linux Kernel dm-crypt Driver Information Disclosure
[SA18476] Debian update for tuxpaint
[SA18475] Tux Paint Insecure Temporary File Creation Vulnerability
[SA18474] Ubuntu update for tuxpaint
[SA18438] Kolab Server Secure SMTP Message Logging Security Issue
[SA18433] Debian update for fetchmail
[SA18458] grsecurity RBAC Admin Role Dropping Security Issue

Other:
[SA18483] Intracom JetSpeed ADSL Modem Information Disclosure
[SA18528] Cisco IOS CDP Status Page Script Insertion Vulnerability
[SA18514] ACT WLAN Phone P202S Multiple Security Issues
[SA18505] Clipcomm CWP-100/CP-100E Debug Service Unauthenticated
Access
[SA18490] Cisco IOS Stack Group Bidding Protocol Denial of Service
[SA18479] Cisco IP Phones SYN Flood Device Reload Vulnerability
[SA18461] Linksys BEFVP41 IP Option Length Denial of Service
[SA18512] MPN HP-180W Wireless IP Phone Information Disclosure
[SA18511] ZyXEL P-2000W_v2 VoIP Wi-Fi Phone Information Disclosure

Cross Platform:
[SA18450] Light Weight Calendar "date" PHP Code Execution
Vulnerability
[SA18432] ACal "ACalAuthenticate" Authentication Bypass Vulnerability
[SA18518] phpXplorer "sShare" Local File Inclusion Vulnerability
[SA18513] Joomla! Multiple Unspecified Vulnerabilities
[SA18504] geoBlog "cat" Parameter SQL Injection Vulnerability
[SA18499] WB News "name" Script Insertion Vulnerability
[SA18493] Oracle Products Multiple Vulnerabilities and Security Issues
[SA18485] Apache Geronimo Web-Access-Log Viewer Script Insertion
[SA18471] WP-Stats WordPress Plug-in "author" SQL Injection
Vulnerability
[SA18467] BlogPHP "username" SQL Injection Vulnerability
[SA18465] Trac HTML WikiProcessor Script Insertion Vulnerability
[SA18464] Bit 5 Blog Script Insertion and SQL Injection
Vulnerabilities
[SA18460] WhiteAlbum "dir" SQL Injection Vulnerability
[SA18459] PDFdirectory SQL Injection Vulnerabilities
[SA18455] 123 Flash Chat Server Username Directory Traversal
Vulnerability
[SA18446] Fortinet Products ISAKMP IKE Message Processing
Vulnerabilities
[SA18444] PHP Toolkit for PayPal Payment Bypass and Exposure of
Transactions
[SA18442] microBlog "month" and "year" SQL Injection Vulnerabilities
[SA18441] TankLogger "tank_id" SQL Injection Vulnerability
[SA18440] wordcircle Script Insertion and SQL Injection
Vulnerabilities
[SA18486] Dual DHCP DNS Server DHCP Options Buffer Overflow
[SA18519] CubeCart Cross-Site Scripting Vulnerabilities
[SA18477] Ultimate Auction Cross-Site Scripting Vulnerabilities
[SA18473] RedKernel Referrer Tracker "rkrt_stats.php" Cross-Site
Scripting
[SA18470] GTP iCommerce Cross-Site Scripting Vulnerabilities
[SA18469] Netbula Anyboard "tK" Cross-Site Scripting Vulnerability
[SA18462] Benders Calendar Multiple SQL Injection Vulnerabilities
[SA18454] SMBCMS Site Search Cross-Site Scripting Vulnerability
[SA18447] H-Sphere "login" Cross-Site Scripting Vulnerability
[SA18445] Interspire TrackPoint NX "username" Cross-Site Scripting
Vulnerability
[SA18434] Mantis Multiple Cross-Site Scripting Vulnerabilities
[SA18506] Avaya gdb Integer Overflow and Insecure Initialisation File
Handling

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA18521] AOL You've Got Pictures ActiveX Control Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-01-17

A vulnerability has been reported in AOL, which can be exploited by
malicious people to cause a DoS (Denial of Service) and potentially
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/18521/

 --

[SA18522] BitComet Client URI Handling Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-01-19

Dejun Meng has reported a vulnerability in BitComet Client, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/18522/

 --

[SA18508] Farmers WIFE FTP Directory Traversal Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, System access
Released:    2006-01-17

Knud Erik Højgaard has discovered a vulnerability in Farmers WIFE,
which can be exploited by malicious users to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/18508/

 --

[SA18488] SimpleBlog Script Insertion and SQL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2006-01-16

Zinho has discovered two vulnerabilities in SimpleBlog, which can be
exploited by malicious people to conduct script insertion and SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/18488/

 --

[SA18439] Mini-NUKE SQL Injection and Unauthenticated Password Change

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2006-01-13

Mustafa Can Bjorn has reported a vulnerability and a security issue in
Mini-NUKE, which can be exploited by malicious people to bypass certain
security restrictions and conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/18439/

 --

[SA18492] Helm Web Hosting Control Panel "txtEmailAddress" Cross-Site
Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-01-16

M.Neset KABAKLI has reported a vulnerability in Helm Web Hosting
Control Panel, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/18492/

 --

[SA18466] AmbiCom Blue Neighbors Object Push Service Buffer Overflow

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-01-16

Kevin Finisterre has reported a vulnerability in AmbiCom Blue
Neighbors, which can be exploited by malicious people to cause a DoS
(Denial of Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/18466/

 --

[SA18443] FogBugz "dest" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-01-13

M.Neset KABAKLI has reported a vulnerability in FogBugz, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/18443/

 --

[SA18531] CA DM Deployment Common Component Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2006-01-18

Two vulnerabilities have been reported in various CA products, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/18531/

 --

[SA18494] Cisco CallManager Connection Handling Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2006-01-19

Some vulnerabilities has been reported in Cisco CallManager, which can
be exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/18494/

 --

[SA18437] Toshiba Bluetooth Stack File Upload Directory Traversal
Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass
Released:    2006-01-13

Kevin Finisterre has reported a vulnerability in Toshiba Bluetooth
Stack, which can be exploited by malicious people to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/18437/


UNIX/Linux:--

[SA18517] SGI Advanced Linux Environment Multiple Updates

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Privilege escalation, DoS, System
access
Released:    2006-01-19

SGI has issued a patch for SGI Advanced Linux Environment. This fixes
some vulnerabilities, where the most critical ones can be exploited by
malicious people to cause a DoS (Denial of Service), conduct cross-site
scripting attacks, and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/18517/

 --

[SA18503] SUSE update for multiple packages

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-01-16

SUSE has issued updates for multiple packages. These fix various
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and compromise a vulnerable or a user's
system.

Full Advisory:
http://secunia.com/advisories/18503/

 --

[SA18484] Novell Open Enterprise Server Remote Manager Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-01-16

A vulnerability has been reported in Novell Open Enterprise Server
Remote Manager, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/18484/

 --

[SA18478] Mandriva update for clamav

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-01-17

Mandriva has issued an update for clamav. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/18478/

 --

[SA18463] Trustix update for multiple packages

Critical:    Highly critical
Where:       From remote
Impact:      System access, DoS, Privilege escalation
Released:    2006-01-16

Trustix has issued updates for multiple packages. These fix some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges, and by malicious people to cause a DoS
(Denial of Service) and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/18463/

 --

[SA18453] Gentoo update for clamav

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-01-13

Gentoo has issued an update for clamav. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/18453/

 --

[SA18435] Gentoo update for
sun-jdk/sun-jre-bin/blackdown-jdk/blackdown-jre

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-01-16

Gentoo has issued updates for sun-jdk, sun-jre-bin, blackdown-jdk, and
blackdown-jre. These fixes some vulnerabilities, which can be exploited
by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/18435/

 --

[SA18520] Fedora update for kdegraphics

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-01-17

Fedora has issued an update for kdegraphics. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/18520/

 --

[SA18509] OpenServer update for gdk-pixbuf

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-01-16

SCO has issued an update for gdk-pixbuf. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/18509/

 --

[SA18507] Avaya PDS HP-UX SecureShell Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Privilege escalation, DoS
Released:    2006-01-18

Avaya has acknowledged a security issue and a vulnerability in
Predictive Dialer System (PDS), which can be exploited by malicious
people to cause a DoS (Denial of Service) or by malicious users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/18507/

 --

[SA18496] Debian update for albatross

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-01-16

Debian has issued an update for albatross. This fixes a vulnerability,
which can be exploited by malicious users to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/18496/

 --

[SA18491] Avaya Products xloadimage NIFF Image Handling Buffer
Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-01-17

Avaya has acknowledged a vulnerability in various products, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/18491/

 --

[SA18489] Mandriva update for hylafax

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, System access
Released:    2006-01-17

Mandrake has issued an update for hylafax. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions and by malicious users to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/18489/

 --

[SA18482] Linux Kernel Multiple Denial of Service Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-01-16

Some vulnerabilities have been reported in the Linux Kernel, which can
be exploited by malicious, local users and by malicious people to cause
a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/18482/

 --

[SA18481] Debian update for mantis

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, Cross Site Scripting, Manipulation of data,
Exposure of sensitive information
Released:    2006-01-18

Debian has issued an update for mantis. This fixes some
vulnerabilities, where some have unknown impacts and others potentially
can be exploited by malicious people to conduct cross-site scripting,
HTTP response splitting, and SQL injection attacks, and disclose
sensitive information.

Full Advisory:
http://secunia.com/advisories/18481/

 --

[SA18457] Albatross Arbitrary Command Execution Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-01-16

A vulnerability has been reported in Albatross, which can be exploited
by malicious users to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/18457/

 --

[SA18456] Ubuntu update for mailman

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-01-16

Ubuntu has issued an update for mailman. This fixes two
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/18456/

 --

[SA18452] Gentoo update for blender

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-01-13

Gentoo has issued an update for blender. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or to potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/18452/

 --

[SA18451] Gentoo update for wine

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-01-13

Gentoo has issued an update for wine. This fixes a vulnerability, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/18451/

 --

[SA18449] Mailman Dates Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-01-16

A vulnerability has been reported in Mailman, which potentially can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/18449/

 --

[SA18448] Fedora update for tetex

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-01-13

Fedora has issued an update for tetex. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/18448/

 --

[SA18436] Debian update for gpdf

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-01-13

Debian has issued an update for gpdf. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/18436/

 --

[SA18525] CMU SNMP snmptrapd Format String Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2006-01-17

Seregorn has reported a vulnerability in CMU SNMP, which can be
exploited by malicious people to cause a DoS (Denial of Service) and
potentially to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/18525/

 --

[SA18495] EMC NetWorker Denial of Service and Buffer Overflow
Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2006-01-17

Jo Goossens has reported some vulnerabilities in EMC NetWorker, which
can be exploited by malicious people to cause a DoS (Denial of Service)
or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/18495/

 --

[SA18526] Red Hat update for apache

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-01-17

Red Hat has issued an update for apache. This fixes a vulnerability,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/18526/

 --

[SA18510] Red Hat update for kernel

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information, DoS
Released:    2006-01-17

Red Hat has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited malicious, local users to cause
a DoS (Denial of Service) and gain knowledge of potentially sensitive
information, and by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/18510/

 --

[SA18472] Widexl Download Tracker "ID" Parameter Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-01-16

Preddy has reported a vulnerability in Widexl Download Tracker, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/18472/

 --

[SA18468] Faq-O-Matic Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-01-16

Preddy has reported some vulnerabilities in Faq-O-Matic, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/18468/

 --

[SA18530] Debian update for antiword

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-01-18

Debian has issued an update for antiword. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/18530/

 --

[SA18527] Ubuntu update for kernel

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information, DoS
Released:    2006-01-18

Ubuntu has issued an update for the kernel. This fixes some
vulnerabilities, which potentially can be exploited by malicious, local
users to gain knowledge of potentially sensitive information and cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/18527/

 --

[SA18502] Avaya Products util-linux / mount Security Issue and
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-01-17

Avaya has acknowledged a security issue and a vulnerability in various
products, which potentially can be exploited by malicious, local users
to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/18502/

 --

[SA18498] Sun Solaris lpsched Unspecified Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2006-01-16

A vulnerability has been reported in lpsched, which can be exploited by
malicious, local users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/18498/

 --

[SA18497] Serial Line Sniffer "HOME" Environment Variable Buffer
Overflow

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-01-16

Sintigan has discovered a vulnerability in Serial Line Sniffer
(slsnif), which potentially can be exploited by malicious, local users
to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/18497/

 --

[SA18487] Linux Kernel dm-crypt Driver Information Disclosure

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2006-01-17

Stefan Rompf has reported a vulnerability in the Linux Kernel, which
can be exploited by malicious, local users to disclose potentially
sensitive information.

Full Advisory:
http://secunia.com/advisories/18487/

 --

[SA18476] Debian update for tuxpaint

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-01-16

Debian has issued an update for tuxpaint. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/18476/

 --

[SA18475] Tux Paint Insecure Temporary File Creation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-01-16

Javier Fernandez-Sanguino Pena has reported a vulnerability in Tux
Paint (tuxpaint), which can be exploited by malicious, local users to
perform certain actions on a vulnerable system with escalated
privileges.

Full Advisory:
http://secunia.com/advisories/18475/

 --

[SA18474] Ubuntu update for tuxpaint

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-01-16

Ubuntu has issued an update for tuxpaint. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/18474/

 --

[SA18438] Kolab Server Secure SMTP Message Logging Security Issue

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2006-01-13

A security issue has been reported in Kolab Server, which potentially
can be exploited by malicious, local users to disclose certain
sensitive information.

Full Advisory:
http://secunia.com/advisories/18438/

 --

[SA18433] Debian update for fetchmail

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2006-01-13

Debian has issued an update for fetchmail. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/18433/

 --

[SA18458] grsecurity RBAC Admin Role Dropping Security Issue

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-01-16

A security issue has been reported in grsecurity, which can cause
certain services to run with escalated privileges.

Full Advisory:
http://secunia.com/advisories/18458/


Other:--

[SA18483] Intracom JetSpeed ADSL Modem Information Disclosure

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-01-16

Dinos has reported a security issue in Intracom JetSpeed ADSL Modem,
which can be exploited by malicious people to disclose potentially
sensitive information.

Full Advisory:
http://secunia.com/advisories/18483/

 --

[SA18528] Cisco IOS CDP Status Page Script Insertion Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      Cross Site Scripting
Released:    2006-01-18

Digitalmunitions.com has reported a vulnerability in Cisco IOS, which
can be exploited by malicious people to conduct script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/18528/

 --

[SA18514] ACT WLAN Phone P202S Multiple Security Issues

Critical:    Less critical
Where:       From local network
Impact:      Unknown, Security Bypass, Exposure of system information,
DoS
Released:    2006-01-17

Shawn Merdinger has reported some security issues in ACT WLAN Phone
P202S, which can be exploited by malicious people to potentially
disclose system information, potentially cause a DoS (Denial of
Service), and bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/18514/

 --

[SA18505] Clipcomm CWP-100/CP-100E Debug Service Unauthenticated
Access

Critical:    Less critical
Where:       From local network
Impact:      Hijacking, Security Bypass, Manipulation of data, Exposure
of system information
Released:    2006-01-18

Shawn Merdinger has reported a security issue in Clipcomm CWP-100 and
Clipcomm CP-100E, which can be exploited by malicious people to
disclose system information, manipulate certain information, and bypass
certain security restrictions.

Full Advisory:
http://secunia.com/advisories/18505/

 --

[SA18490] Cisco IOS Stack Group Bidding Protocol Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2006-01-19

A vulnerability has been reported in Cisco IOS, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/18490/

 --

[SA18479] Cisco IP Phones SYN Flood Device Reload Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2006-01-16

A vulnerability has been reported in Cisco 7940 and 7960 IP Phones,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/18479/

 --

[SA18461] Linksys BEFVP41 IP Option Length Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2006-01-18

Paul has reported a vulnerability in Linksys BEFVP41, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/18461/

 --

[SA18512] MPN HP-180W Wireless IP Phone Information Disclosure

Critical:    Not critical
Where:       From local network
Impact:      Exposure of system information, DoS
Released:    2006-01-17

Shawn Merdinger has reported a weakness in MPN HP-180W Wireless IP
Phone, which can be exploited by malicious people to disclose system
information and potentially cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/18512/

 --

[SA18511] ZyXEL P-2000W_v2 VoIP Wi-Fi Phone Information Disclosure

Critical:    Not critical
Where:       From local network
Impact:      Exposure of system information, DoS
Released:    2006-01-17

Shawn Merdinger has reported a weakness in ZyXEL P-2000W_v2 VoIP Wi-Fi
Phone, which can be exploited by malicious people to disclose system
information and potentially cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/18511/


Cross Platform:--

[SA18450] Light Weight Calendar "date" PHP Code Execution
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-01-13

Aliaksandr Hartsuyeu has reported a vulnerability in Light Weight
Calendar, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/18450/

 --

[SA18432] ACal "ACalAuthenticate" Authentication Bypass Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, System access
Released:    2006-01-12

Aliaksandr Hartsuyeu has discovered a vulnerability in ACal, which can
be exploited by malicious people to bypass certain security
restrictions and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/18432/

 --

[SA18518] phpXplorer "sShare" Local File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-01-17

Oriol Torrent Santiago has discovered a vulnerability in phpXplorer,
which can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/18518/

 --

[SA18513] Joomla! Multiple Unspecified Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown
Released:    2006-01-18

Multiple vulnerabilities with unknown impacts have been reported in
Joomla!.

Full Advisory:
http://secunia.com/advisories/18513/

 --

[SA18504] geoBlog "cat" Parameter SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2006-01-16

Aliaksandr Hartsuyeu has discovered a vulnerability in geoBlog, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/18504/

 --

[SA18499] WB News "name" Script Insertion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-01-18

DragoN has discovered a vulnerability in WB News, which can be
exploited by malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/18499/

 --

[SA18493] Oracle Products Multiple Vulnerabilities and Security Issues

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown, Manipulation of data, Exposure of system
information, Exposure of sensitive information
Released:    2006-01-18

82 vulnerabilities and security issues have been reported in various
Oracle products. Some have an unknown impact, and others can be
exploited to gain knowledge of certain information, overwrite arbitrary
files, and to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/18493/

 --

[SA18485] Apache Geronimo Web-Access-Log Viewer Script Insertion

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-01-16

Oliver Karow has reported a vulnerability in Apache Geronimo, which can
be exploited by malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/18485/

 --

[SA18471] WP-Stats WordPress Plug-in "author" SQL Injection
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-01-16

Preddy has discovered a vulnerability in WP-Stats, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/18471/

 --

[SA18467] BlogPHP "username" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2006-01-17

Aliaksandr Hartsuyeu has reported a vulnerability in BlogPHP, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/18467/

 --

[SA18465] Trac HTML WikiProcessor Script Insertion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-01-17

A vulnerability has been reported in Trac, which can be exploited by
malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/18465/

 --

[SA18464] Bit 5 Blog Script Insertion and SQL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Manipulation of
data
Released:    2006-01-16

Aliaksandr Hartsuyeu has reported some vulnerabilities in Bit 5 Blog,
which can be exploited by malicious people to conduct script insertion
and SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/18464/

 --

[SA18460] WhiteAlbum "dir" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-01-18

Liz0ziM has discovered a vulnerability in WhiteAlbum, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/18460/

 --

[SA18459] PDFdirectory SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-01-17

Some vulnerabilities have been reported in PDFdirectory, which
potentially can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/18459/

 --

[SA18455] 123 Flash Chat Server Username Directory Traversal
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-01-16

Jesus Olmos Gonzalez has reported a vulnerability in 123 Flash Chat
(123FlashChat) Server, which can be exploited by malicious people to
bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/18455/

 --

[SA18446] Fortinet Products ISAKMP IKE Message Processing
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-01-13

Some vulnerabilities have been reported in Fortinet Products, which can
be exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/18446/

 --

[SA18444] PHP Toolkit for PayPal Payment Bypass and Exposure of
Transactions

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information
Released:    2006-01-13

.cens has reported two security issues in PHP Toolkit for PayPal, which
can be exploited by malicious people to bypass certain security
restrictions and disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/18444/

 --

[SA18442] microBlog "month" and "year" SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-01-18

Aliaksandr Hartsuyeu has discovered two vulnerabilities in microBlog,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/18442/

 --

[SA18441] TankLogger "tank_id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-01-13

Aliaksandr Hartsuyeu has discovered a vulnerability in TankLogger,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/18441/

 --

[SA18440] wordcircle Script Insertion and SQL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Manipulation of
data
Released:    2006-01-13

Aliaksandr Hartsuyeu has discovered two vulnerabilities in wordcircle,
which can be exploited by malicious people to conduct script insertion
and SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/18440/

 --

[SA18486] Dual DHCP DNS Server DHCP Options Buffer Overflow

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2006-01-18

Luigi Auriemma has reported a vulnerability in Dual DHCP DNS Server,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/18486/

 --

[SA18519] CubeCart Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-01-17

Lostmon has discovered some vulnerabilities in CubeCart, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/18519/

 --

[SA18477] Ultimate Auction Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-01-16

Querkopf has reported two vulnerabilities in Ultimate Auction, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/18477/

 --

[SA18473] RedKernel Referrer Tracker "rkrt_stats.php" Cross-Site
Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-01-16

Preddy has discovered a vulnerability in RedKernel Referrer Tracker,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/18473/

 --

[SA18470] GTP iCommerce Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-01-16

Preddy has reported two vulnerabilities in GTP iCommerce, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/18470/

 --

[SA18469] Netbula Anyboard "tK" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-01-16

Preddy has reported a vulnerability in Netbula Anyboard, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/18469/

 --

[SA18462] Benders Calendar Multiple SQL Injection Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-01-16

Aliaksandr Hartsuyeu has discovered some vulnerabilities in Benders
Calendar, which can be exploited by malicious users to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/18462/

 --

[SA18454] SMBCMS Site Search Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-01-17

$um$id has reported a vulnerability in SMBCMS, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/18454/

 --

[SA18447] H-Sphere "login" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-01-13

M.Neset KABAKLI has reported a vulnerability in H-Sphere, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/18447/

 --

[SA18445] Interspire TrackPoint NX "username" Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-01-13

M.Neset KABAKLI has reported a vulnerability in Interspire TrackPoint
NX, which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/18445/

 --

[SA18434] Mantis Multiple Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-01-17

Some vulnerabilities have been reported in Mantis, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/18434/

 --

[SA18506] Avaya gdb Integer Overflow and Insecure Initialisation File
Handling

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-01-18

Avaya has acknowledged two vulnerabilities in various products, which
potentially can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/18506/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support at secunia.com
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45






More information about the ISN mailing list