[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[ISN] Secunia Weekly Summary - Issue: 2004-43



========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2004-10-14 - 2004-10-21                        

                       This week : 71 advisories                       

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

The Secunia staff is spending hours every day to assure you the best
and most reliable source for vulnerability information. Every single 
vulnerability report is being validated and verified before a Secunia
advisory is written.

Secunia validates and verifies vulnerability reports in many different
ways e.g. by downloading the software and performing comprehensive
tests, by reviewing source code, or by validating the credibility of
the source from which the vulnerability report was issued.

As a result, Secunia's database is the most correct and complete source
for recent vulnerability information available on the Internet.

Secunia Online Vulnerability Database:
http://secunia.com/

========================================================================
2) This Week in Brief:


ADVISORIES:

Secunia Research has discovered two spoofing vulnerabilities, affecting
most browsers supporting tabbed browsing.

The first vunerability allows inactive tabs to spawn dialog boxes,
which appear to be from a web site in another tab e.g. a trusted bank
site.

The second vulnerability allows inactive tabs to "steal" focus from
input fields from other tabs, which can lead the user into sending
sensitive information to a malicious web site.

Secunia has developed tests for both vulnerabilities, which can be
found below.

Dialog Box Spoofing Vulnerability Test:
http://secunia.com/multiple_browsers_dialog_box_spoofing_test/

Form Field Focus Vulnerability Test:
http://secunia.com/multiple_browsers_form_field_focus_test/

References:
http://secunia.com/SA12706
http://secunia.com/SA12712
http://secunia.com/SA12713
http://secunia.com/SA12714
http://secunia.com/SA12717
http://secunia.com/SA12731
http://secunia.com/SA12892

--

Microsoft's patch for the Drag'n'Drop vulnerability in Internet
Explorer has been proven insufficient by security researchers
http-equiv and Andreas Sandblad, Secunia Research.

Prior variants of the Drag'n'Drop vulnerability have been used on the
Internet to compromise vulnerable systems. It is therefore very likely
that this new unpatched variant of this issue, also will be used by
malicious people to compromise systems.

Currently, Microsoft has no solution to this issue, and users are
therefore advised to disable Active Scripting or to use another
browser.

Reference:
http://secunia.com/SA12889


VIRUS ALERTS:

Secunia has not issued any virus alerts during the last week.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA12712] Mozilla / Mozilla Firefox / Camino Tabbed Browsing
              Vulnerabilities
2.  [SA12806] Internet Explorer Multiple Vulnerabilities
3.  [SA12809] Adobe Acrobat / Adobe Reader Disclosure of Sensitive
              Information
4.  [SA12758] Microsoft Word Document Parsing Buffer Overflow
              Vulnerability
5.  [SA12889] Microsoft Internet Explorer Two Vulnerabilities
6.  [SA12804] Microsoft Windows Multiple Vulnerabilities
7.  [SA12863] Symantec Norton AntiVirus Unprivileged Auto-Protection
              Deactivation
8.  [SA12793] Windows XP Internet Connection Firewall Bypass Weakness
9.  [SA12892] Safari Dialog Box Spoofing Vulnerability
10. [SA12304] Internet Explorer Address Bar Spoofing Vulnerability

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA12889] Microsoft Internet Explorer Two Vulnerabilities
[SA12900] Abyss Web Server MS-DOS Device Names Denial of Service
Vulnerability
[SA12844] AliveSites Forum Unspecified Cross-Site Scripting and SQL
Injection
[SA12841] Dmxready Site Chassis Manager Unspecified Cross-Site
Scripting and SQL Injection
[SA12835] Ideal BB Multiple Unspecified Vulnerabilities
[SA12834] NatterChat Unspecified SQL Injection Vulnerability
[SA12883] Saleslogix Multiple Vulnerabilities
[SA12849] Yak! File Upload Directory Traversal Vulnerability
[SA12881] Nortel Contivity VPN Client Open Tunnel Certificate
Verification Issue
[SA12842] CyberStrong eShop ASP Shopping Card Unspecified Cross-Site
Scripting
[SA12839] Express-Web Content Management System Unspecified Cross-Site
Scripting
[SA12890] Vypress Tonecast Client Denial of Service Vulnerability
[SA12894] Protector Plus 2000 Antivirus MS-DOS Device Name Handling
Weakness
[SA12893] AntiVir Antivirus MS-DOS Device Name Handling Weakness
[SA12870] Twister Anti-TrojanVirus MS-DOS Device Name Handling
Weakness
[SA12863] Symantec Norton AntiVirus Unprivileged Auto-Protection
Deactivation

UNIX/Linux:
[SA12910] Red Hat update for gaim
[SA12887] Gaim MSN SLP Message Handling Buffer Overflow Vulnerability
[SA12886] Mandrake update for mozilla
[SA12885] Mandrake update for libtiff
[SA12872] Conectiva update for gtk+
[SA12864] Debian update for netkit-telnet-ssl
[SA12859] Gentoo update for phpMyAdmin
[SA12851] Debian update for tiff
[SA12833] VERITAS Cluster Server Unspecified System Compromise
Vulnerability
[SA12832] Fedora update for libtiff
[SA12831] WeHelpBUS Arbitrary Command Execution Vulnerability
[SA12892] Safari Dialog Box Spoofing Vulnerability
[SA12871] UnixWare update for zlib
[SA12855] Gnofract 4D ".fct" Arbitrary Code Execution Vulnerability
[SA12845] Gentoo update for bnc
[SA12827] Gentoo update for wordpress
[SA12825] MediaWiki Multiple Vulnerabilities
[SA12896] HP-UX Java XSLT Processor Privilege Escalation Vulnerability
[SA12882] cabextract Directory Traversal Vulnerability
[SA12865] cPanel Manipulation and Disclosure of Sensitive information
Vulnerabilities
[SA12857] Unzoo Directory Traversal Vulnerability
[SA12847] mod_ssl SSLCipherSuite Security Bypass
[SA12895] HP CIFS Server Arbitrary File Access Vulnerability
[SA12866] Gentoo update for squid
[SA12848] Trustix update for mysql
[SA12830] Conectiva update for cups
[SA12829] Conectiva update for samba
[SA12914] Gentoo update for openoffice
[SA12873] Sun Solaris LDAP and RBAC Privilege Escalation Vulnerability
[SA12867] Gentoo update for postgresql
[SA12860] PostgreSQL "make_oidjoins_check" Insecure Temporary File
Handling
[SA12852] Debian update for cyrus-sasl-mit
[SA12838] Debian update for cupsys
[SA12837] Fedora update for ruby
[SA12828] KDocker "kdocker.cpp" Privilege Escalation Vulnerability
[SA12884] Mandrake update for cvs
[SA12836] ProFTPD User Enumeration Weakness

Other:
[SA12846] 3Com OfficeConnect ADSL Wireless 11g Firewall Router
Information Disclosure

Cross Platform:
[SA12880] PBLang Unspecified Vulnerabilities
[SA12879] RAV Antivirus Zip Archive Virus Detection Bypass
Vulnerability
[SA12878] NOD32 Antivirus Zip Archive Virus Detection Bypass
Vulnerability
[SA12877] eTrust Antivirus Zip Archive Virus Detection Bypass
Vulnerability
[SA12876] McAfee Anti-Virus Zip Archive Virus Detection Bypass
Vulnerability
[SA12874] Kaspersky Anti-Virus Zip Archive Virus Detection Bypass
Vulnerability
[SA12868] PSCRIPT Forum SQL Injection Vulnerabilities
[SA12861] Anaconda Foundation Directory "template" Disclosure of
Sensitive Information
[SA12850] CoolPHP Cross-Site Scripting and Arbitrary Local File
Inclusion Vulnerabilities
[SA12843] WowBB Forum Unspecified SQL Injection and Cross-Site
Scripting
[SA12840] DevoyBB Unspecified Cross-Site Scripting and SQL Injection
Vulnerabilities
[SA12891] IBM Lotus Notes/Domino Cross-Site Scripting Vulnerability
[SA12858] YaPiG comments Cross-Site Scripting Vulnerability
[SA12854] MediaWiki Unspecified Security Issue
[SA12826] SCT Campus Pipeline Cross-Site Scripting Vulnerability
[SA12875] Sophos Anti-Virus Zip Archive Virus Detection Bypass
[SA12862] ClientExec Exposure of Sensitive Information

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA12889] Microsoft Internet Explorer Two Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, System access
Released:    2004-10-20

http-equiv has discovered two vulnerabilities in Internet Explorer,
which can be exploited by malicious people to compromise a user's
system, link to local resources, and bypass a security feature in
Microsoft Windows XP SP2.

Full Advisory:
http://secunia.com/advisories/12889/

 --

[SA12900] Abyss Web Server MS-DOS Device Names Denial of Service
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-10-21

R00tCr4ck has reported a vulnerability in Abyss Web Server for Windows,
which potentially can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/12900/

 --

[SA12844] AliveSites Forum Unspecified Cross-Site Scripting and SQL
Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2004-10-15

Positive Technologies has reported some vulnerabilities in AliveSites
Forum, which can be exploited by malicious people to conduct cross-site
scripting and SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/12844/

 --

[SA12841] Dmxready Site Chassis Manager Unspecified Cross-Site
Scripting and SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2004-10-15

Positive Technologies has reported some vulnerabilities in Dmxready
Site Chassis Manager, which can be exploited by malicious people to
conduct cross-site scripting and SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/12841/

 --

[SA12835] Ideal BB Multiple Unspecified Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2004-10-15

Positive Technologies has reported some vulnerabilities in Ideal BB,
which can be exploited by malicious people to conduct SQL injection,
cross-site scripting and HTTP response splitting attacks.

Full Advisory:
http://secunia.com/advisories/12835/

 --

[SA12834] NatterChat Unspecified SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2004-10-15

Positive Technologies has reported a vulnerability in NatterChat, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/12834/

 --

[SA12883] Saleslogix Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      Security Bypass, Spoofing, Manipulation of data, Exposure
of system information, Exposure of sensitive information, DoS, System
access
Released:    2004-10-19

Carl Livitt has reported some vulnerabilities in SalesLogix, which can
be exploited by malicious people to spoof users, cause a DoS (Denial of
Service), disclose system and sensitive information, conduct SQL
injection, bypass certain security restrictions, and potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12883/

 --

[SA12849] Yak! File Upload Directory Traversal Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2004-10-15

Luigi Auriemma has reported a vulnerability in Yak!, which potentially
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/12849/

 --

[SA12881] Nortel Contivity VPN Client Open Tunnel Certificate
Verification Issue

Critical:    Less critical
Where:       From remote
Impact:      Spoofing
Released:    2004-10-20

Roger Sylvain has reported a vulnerability in Nortel Contivity VPN
Client, potentially allowing malicious people to open a VPN tunnel to
the client.

Full Advisory:
http://secunia.com/advisories/12881/

 --

[SA12842] CyberStrong eShop ASP Shopping Card Unspecified Cross-Site
Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-10-15

Positive Technologies has reported a vulnerability in CyberStrong eShop
ASP Shopping Card, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/12842/

 --

[SA12839] Express-Web Content Management System Unspecified Cross-Site
Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-10-15

Positive Technologies has reported a vulnerability in Express-Web
Content Management System, which can be exploited by malicious people
to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/12839/

 --

[SA12890] Vypress Tonecast Client Denial of Service Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2004-10-20

Luigi Auriemma has reported a vulnerability in Vypress Tonecast, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/12890/

 --

[SA12894] Protector Plus 2000 Antivirus MS-DOS Device Name Handling
Weakness

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2004-10-20

Sowhat has reported a weakness in Protector Plus 2000 Antivirus
Software, which can be exploited by malware to bypass certain scanning
functionality.

Full Advisory:
http://secunia.com/advisories/12894/

 --

[SA12893] AntiVir Antivirus MS-DOS Device Name Handling Weakness

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2004-10-20

Sowhat has reported a weakness in Antivir Antivirus, which can be
exploited by malware to bypass certain scanning functionality.

Full Advisory:
http://secunia.com/advisories/12893/

 --

[SA12870] Twister Anti-TrojanVirus MS-DOS Device Name Handling
Weakness

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2004-10-20

Sowhat has reported a weakness in Twister Anti-TrojanVirus, which can
be exploited by malware to bypass certain scanning functionality.

Full Advisory:
http://secunia.com/advisories/12870/

 --

[SA12863] Symantec Norton AntiVirus Unprivileged Auto-Protection
Deactivation

Critical:    Not critical
Where:       Local system
Impact:      Unknown
Released:    2004-10-18

Daniel Milisic has reported an issue in Symantec Norton AntiVirus /
Norton Internet Security.

Full Advisory:
http://secunia.com/advisories/12863/


UNIX/Linux:--

[SA12910] Red Hat update for gaim

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-10-21

Red Hat has issued an update for gaim. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/12910/

 --

[SA12887] Gaim MSN SLP Message Handling Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-10-20

A vulnerability has been reported in Gaim, which potentially can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/12887/

 --

[SA12886] Mandrake update for mozilla

Critical:    Highly critical
Where:       From remote
Impact:      System access, Exposure of system information,
Manipulation of data, Cross Site Scripting
Released:    2004-10-20

MandrakeSoft has issued an update for mozilla. This fixes several
vulnerabilities, which potentially can be exploited by malicious people
to conduct cross-site scripting attacks, access and modify sensitive
information, and compromise a user's system.

Full Advisory:
http://secunia.com/advisories/12886/

 --

[SA12885] Mandrake update for libtiff

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-10-20

MandrakeSoft has issued an update for libtiff. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/12885/

 --

[SA12872] Conectiva update for gtk+

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-10-19

Conectiva has issued an update for gtk+. This fixes multiple
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12872/

 --

[SA12864] Debian update for netkit-telnet-ssl

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-10-18

Debian has issued an update for netkit-telnet-ssl. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12864/

 --

[SA12859] Gentoo update for phpMyAdmin

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-10-19

Gentoo has issued an update for phpMyAdmin. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/12859/

 --

[SA12851] Debian update for tiff

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-10-18

Debian has issued an update for tiff. This fixes some vulnerabilities,
which can be exploited by malicious people to compromise a vulnerable
system or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/12851/

 --

[SA12833] VERITAS Cluster Server Unspecified System Compromise
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-10-15

A vulnerability has been reported in VERITAS Cluster Server, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12833/

 --

[SA12832] Fedora update for libtiff

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-10-15

Fedora has issued an update for libtiff. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12832/

 --

[SA12831] WeHelpBUS Arbitrary Command Execution Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-10-15

A vulnerability has been reported in WeHelpBUS, which can be exploited
by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/12831/

 --

[SA12892] Safari Dialog Box Spoofing Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Spoofing
Released:    2004-10-20

Secunia Research has discovered a vulnerability in Safari, which can be
exploited by malicious web sites to spoof dialog boxes.

Full Advisory:
http://secunia.com/advisories/12892/

 --

[SA12871] UnixWare update for zlib

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-10-19

SCO has issued an update for zlib. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/12871/

 --

[SA12855] Gnofract 4D ".fct" Arbitrary Code Execution Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-10-18

A vulnerability has been reported in Gnofract 4D, which potentially can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/12855/

 --

[SA12845] Gentoo update for bnc

Critical:    Moderately critical
Where:       From remote
Impact:      Spoofing
Released:    2004-10-15

Gentoo has issued an update for bnc. This fixes a vulnerability, which
can be exploited by malicious users to spoof their identity.

Full Advisory:
http://secunia.com/advisories/12845/

 --

[SA12827] Gentoo update for wordpress

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-10-14

Gentoo has issued an update for wordpress. This fixes multiple
vulnerabilities, which can be exploited by malicious people to conduct
script insertion and cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/12827/

 --

[SA12825] MediaWiki Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2004-10-14

Multiple vulnerabilities have been reported in MediaWiki, which can be
exploited by malicious people to conduct script insertion, cross-site
scripting, and SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/12825/

 --

[SA12896] HP-UX Java XSLT Processor Privilege Escalation Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information, Privilege escalation
Released:    2004-10-20

HP has acknowledged a vulnerability in the Java Runtime Environment
software for HP-UX, which can be exploited by untrusted applets to gain
escalated privileges on a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12896/

 --

[SA12882] cabextract Directory Traversal Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-10-19

A vulnerability has been reported in cabextract, which potentially can
be exploited to overwrite arbitrary files on a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12882/

 --

[SA12865] cPanel Manipulation and Disclosure of Sensitive information
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2004-10-19

Karol Wiesek has reported two vulnerabilities in cPanel, which can be
exploited by malicious, authenticated users to manipulate and disclose
sensitive information.

Full Advisory:
http://secunia.com/advisories/12865/

 --

[SA12857] Unzoo Directory Traversal Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2004-10-18

Doubles has discovered a vulnerability in Unzoo, which potentially can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/12857/

 --

[SA12847] mod_ssl SSLCipherSuite Security Bypass

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-10-15

Hartmut Keil has reported a security issue in mod_ssl, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/12847/

 --

[SA12895] HP CIFS Server Arbitrary File Access Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass
Released:    2004-10-20

HP has acknowledged a vulnerability in HP CIFS Server, which can be
exploited by malicious users to access arbitrary files and
directories.

Full Advisory:
http://secunia.com/advisories/12895/

 --

[SA12866] Gentoo update for squid

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2004-10-19

Gentoo has issued an update for squid. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/12866/

 --

[SA12848] Trustix update for mysql

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass, Privilege escalation, DoS, System access
Released:    2004-10-15

Trustix has issued an update for mysql. This fixes multiple
vulnerabilities, which can be exploited by malicious users to bypass
certain security restrictions, cause a DoS (Denial of Service), and
potentially compromise the system.

Full Advisory:
http://secunia.com/advisories/12848/

 --

[SA12830] Conectiva update for cups

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2004-10-14

Conectiva has issued an update for cups. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/12830/

 --

[SA12829] Conectiva update for samba

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass, DoS
Released:    2004-10-14

Conectiva has issued an update for samba. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and access arbitrary files and directories.

Full Advisory:
http://secunia.com/advisories/12829/

 --

[SA12914] Gentoo update for openoffice

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2004-10-21

Gentoo has issued an update for openoffice. This fixes a vulnerability,
which can be exploited by malicious, local users to gain knowledge of
sensitive information.

Full Advisory:
http://secunia.com/advisories/12914/

 --

[SA12873] Sun Solaris LDAP and RBAC Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-10-19

A vulnerability has been reported in Sun Solaris, which can be
exploited by malicious, local users to escalate their privileges.

Full Advisory:
http://secunia.com/advisories/12873/

 --

[SA12867] Gentoo update for postgresql

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-10-19

Gentoo has issued an update for PostgreSQL. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/12867/

 --

[SA12860] PostgreSQL "make_oidjoins_check" Insecure Temporary File
Handling

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-10-19

A vulnerability has been reported in PostgreSQL, which can be exploited
by malicious, local users to perform certain actions on a vulnerable
system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/12860/

 --

[SA12852] Debian update for cyrus-sasl-mit

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-10-18

Debian has issued an update for cyrus-sasl-mit. This fixes a
vulnerability, which can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/12852/

 --

[SA12838] Debian update for cupsys

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2004-10-15

Debian has issued an update for cupsys. This fixes a vulnerability,
which can be exploited by malicious, local users to gain knowledge of
sensitive information.

Full Advisory:
http://secunia.com/advisories/12838/

 --

[SA12837] Fedora update for ruby

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2004-10-15

Fedora has issued an update for ruby. This fixes a vulnerability, which
potentially can be exploited by malicious, local users to gain knowledge
of sensitive information.

Full Advisory:
http://secunia.com/advisories/12837/

 --

[SA12828] KDocker "kdocker.cpp" Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-10-14

A vulnerability has been reported in KDocker, which potentially can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/12828/

 --

[SA12884] Mandrake update for cvs

Critical:    Not critical
Where:       From remote
Impact:      Exposure of system information
Released:    2004-10-20

MandrakeSoft has issued an update for cvs. This fixes a weakness, which
potentially can be exploited by malicious users to gain knowledge of
certain system information.

Full Advisory:
http://secunia.com/advisories/12884/

 --

[SA12836] ProFTPD User Enumeration Weakness

Critical:    Not critical
Where:       From remote
Impact:      Exposure of system information
Released:    2004-10-15

LSS Security Team has reported a weakness in ProFTPD, which potentially
can be exploited by malicious people to determine valid usernames.

Full Advisory:
http://secunia.com/advisories/12836/


Other:--

[SA12846] 3Com OfficeConnect ADSL Wireless 11g Firewall Router
Information Disclosure

Critical:    Moderately critical
Where:       From local network
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2004-10-15

Karb0nOxyde has reported a security issue in 3Com OfficeConnect ADSL
Wireless 11g Firewall Router, which can be exploited by malicious
people to gain knowledge of sensitive information.

Full Advisory:
http://secunia.com/advisories/12846/


Cross Platform:--

[SA12880] PBLang Unspecified Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown
Released:    2004-10-19

Some vulnerabilities with an unknown impact have been reported in
PBLang.

Full Advisory:
http://secunia.com/advisories/12880/

 --

[SA12879] RAV Antivirus Zip Archive Virus Detection Bypass
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-10-20

A vulnerability has been reported in RAV Antivirus, which can be
exploited by malware to bypass certain scanning functionality.

Full Advisory:
http://secunia.com/advisories/12879/

 --

[SA12878] NOD32 Antivirus Zip Archive Virus Detection Bypass
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-10-20

A vulnerability has been reported in NOD32 Antivirus, which can be
exploited by malware to bypass certain scanning functionality.

Full Advisory:
http://secunia.com/advisories/12878/

 --

[SA12877] eTrust Antivirus Zip Archive Virus Detection Bypass
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-10-20

A vulnerability has been reported in eTrust Antivirus, which can be
exploited by malware to bypass certain scanning functionality.

Full Advisory:
http://secunia.com/advisories/12877/

 --

[SA12876] McAfee Anti-Virus Zip Archive Virus Detection Bypass
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-10-20

A vulnerability has been reported in McAfee Anti-Virus Engine, which
can be exploited by malware to bypass certain scanning functionality.

Full Advisory:
http://secunia.com/advisories/12876/

 --

[SA12874] Kaspersky Anti-Virus Zip Archive Virus Detection Bypass
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-10-20

A vulnerability has been reported in Kaspersky Anti-Virus, which can be
exploited by malware to bypass certain scanning functionality.

Full Advisory:
http://secunia.com/advisories/12874/

 --

[SA12868] PSCRIPT Forum SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2004-10-19

Christoph Jeschke has reported some vulnerabilities PSCRIPT Forum,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/12868/

 --

[SA12861] Anaconda Foundation Directory "template" Disclosure of
Sensitive Information

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2004-10-19

Zero X has discovered a vulnerability in Anaconda Foundation Directory,
which can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/12861/

 --

[SA12850] CoolPHP Cross-Site Scripting and Arbitrary Local File
Inclusion Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of system information,
Exposure of sensitive information
Released:    2004-10-18

R00tCr4ck has reported some vulnerabilities in CoolPHP, which can be
exploited by malicious people to conduct cross-site scripting attacks
and disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/12850/

 --

[SA12843] WowBB Forum Unspecified SQL Injection and Cross-Site
Scripting

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2004-10-15

Positive Technologies has reported some vulnerabilities in WowBB Forum,
which can be exploited by malicious people to conduct cross-site
scripting and SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/12843/

 --

[SA12840] DevoyBB Unspecified Cross-Site Scripting and SQL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2004-10-15

Positive Technologies has reported some vulnerabilities in DevoyBB,
which can be exploited by malicious people to conduct cross-site
scripting and SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/12840/

 --

[SA12891] IBM Lotus Notes/Domino Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-10-20

Juan C Calderon has reported a vulnerability in IBM Lotus Notes/Domino,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/12891/

 --

[SA12858] YaPiG comments Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-10-18

A vulnerability has been reported in YaPiG, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/12858/

 --

[SA12854] MediaWiki Unspecified Security Issue

Critical:    Less critical
Where:       From remote
Impact:      Unknown
Released:    2004-10-18

The vendor has reported a security issue in MediaWiki, with an unknown
impact.

Full Advisory:
http://secunia.com/advisories/12854/

 --

[SA12826] SCT Campus Pipeline Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-10-14

Spiffomatic64 has reported a vulnerability in SCT Campus Pipeline,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/12826/

 --

[SA12875] Sophos Anti-Virus Zip Archive Virus Detection Bypass

Critical:    Not critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-10-20

A weakness has been reported in Sophos Anti-Virus, which can be
exploited by malware to bypass certain scanning functionality.

Full Advisory:
http://secunia.com/advisories/12875/

 --

[SA12862] ClientExec Exposure of Sensitive Information

Critical:    Not critical
Where:       From remote
Impact:      Exposure of system information
Released:    2004-10-18

A security issue has been reported in ClientExec, which can be
exploited by malicious people to gain knowledge of various system
information.

Full Advisory:
http://secunia.com/advisories/12862/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@xxxxxxxxxxx
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45

========================================================================



_________________________________________
Open Source Vulnerability Database (OSVDB) Everything is Vulnerable - http://www.osvdb.org/