Information Security News mailing list archives

Secunia Weekly Summary


From: InfoSec News <isn () c4i org>
Date: Fri, 23 May 2003 00:20:19 -0500 (CDT)

===========================================================================

                    The Secunia Weekly Advisory Summary
                          2003-05-15 - 2003-05-22

                         This week : 41 advisories

===========================================================================

    An effective security solution starts with a position of expertise.


The following 41 advisories are written by Secunia. 
Customers instantly receive relevant advisories to their unique system by
E-mail and textmessage, enabling them to react efficiently.

Security Experts at Secunia constantly search for new vulnerabilities and
threats.

Vast amounts of advisories, vulnerabilities and security news is gathered
and assessed daily.


 - Stay Secure

===========================================================================

============
 2003-05-22
============

Slackware update for mod_ssl
Less critical
http://www.secunia.com/advisories/8830/

 -- 

Slackware update for EPIC4
Moderately critical
http://www.secunia.com/advisories/8829/

 -- 

Slackware update for BitchX
Moderately critical
http://www.secunia.com/advisories/8828/

 -- 

Maelstrom Privilege Escalation Vulnerability
Not critical
http://www.secunia.com/advisories/8827/


============
 2003-05-21
============

SGI IRIX update for MediaBase
Highly critical
http://www.secunia.com/advisories/8826/

 -- 

CesarFTP Store Passwords in Clear Text
Not critical
http://www.secunia.com/advisories/8825/

 -- 

Cerberus FTP Server Store Passwords in Clear Text
Not critical
http://www.secunia.com/advisories/8824/

 -- 

Linux Kernel 2.4 "ioperm" Privilege Escalation Vulnerability
Less critical
http://www.secunia.com/advisories/8823/

 -- 

MailMAX Buffer Overflow in IMAPMax Module
Moderately critical
http://www.secunia.com/advisories/8822/

 -- 

Venturi Client acts as proxy
Less critical
http://www.secunia.com/advisories/8820/

 -- 

Snowblind Web Server Directory Traversal and Denial of Service
Moderately critical
http://www.secunia.com/advisories/8819/

 -- 

BSDftpd-ssl Username Enumeration Vulnerability
Less critical
http://www.secunia.com/advisories/8818/

 -- 

HP-UX "ipcs" Privilege Escalation Vulnerability
Less critical
http://www.secunia.com/advisories/8817/


============
 2003-05-20
============

Maelstrom Privilege Escalation Vulnerability
Not critical
http://www.secunia.com/advisories/8816/

 -- 

Immunix update for fileutils
Less critical
http://www.secunia.com/advisories/8815/

 -- 

eZ publish Cross Site Scripting
Less critical
http://www.secunia.com/advisories/8814/

 -- 

Red Hat update for tcpdump
Not critical
http://www.secunia.com/advisories/8813/

 -- 

Microsoft ISA Server 2000 Cross Site Scripting
Less critical
http://www.secunia.com/advisories/8812/

 -- 

Owl Intranet Engine User Authentication Bypass Vulnerability
Less critical
http://www.secunia.com/advisories/8811/

 -- 

Multiple IMAP Clients System Access Vulnerabilities
Less critical
http://www.secunia.com/advisories/8810/

 -- 

Sun Cobalt update for Samba
Highly critical
http://www.secunia.com/advisories/8809/

 -- 

php-proxima File Disclosure Vulnerability
Less critical
http://www.secunia.com/advisories/8808/

 -- 

Internet Explorer Automatic File Download and Execution Vulnerability
Moderately critical
http://www.secunia.com/advisories/8807/

 -- 

Debian update for ircii-pana
Moderately critical
http://www.secunia.com/advisories/8806/

 -- 

Palm OS Denial of Service Vulnerability
Less critical
http://www.secunia.com/advisories/8804/


============
 2003-05-19
============

IP Messenger remotely exploitable buffer overflow
Moderately critical
http://www.secunia.com/advisories/8805/

 -- 

Cisco VPN Client Arbitrary Program Execution Vulnerability
Less critical
http://www.secunia.com/advisories/8803/

 -- 

Poster version.two Admin Access Vulnerability
Less critical
http://www.secunia.com/advisories/8802/

 -- 

PHP-Nuke SQL injection
Less critical
http://www.secunia.com/advisories/8801/

 -- 

PoPToP BCRELAY Privilege Escalation Vulnerability
Less critical
http://www.secunia.com/advisories/8800/

 -- 

OneOrZero Helpdesk SQL injection and Security Bypass
Less critical
http://www.secunia.com/advisories/8799/

 -- 

Apple Mac OS X IPSec ACL Bypass
Less critical
http://www.secunia.com/advisories/8798/


============
 2003-05-16
============

Debian update for sendmail
Less critical
http://www.secunia.com/advisories/8797/

 -- 

Debian update for MySQL
Less critical
http://www.secunia.com/advisories/8796/

 -- 

Debian update for lv
Less critical
http://www.secunia.com/advisories/8795/

 -- 

Red Hat update for lv
Less critical
http://www.secunia.com/advisories/8794/

 -- 

Mandrake update for cdrecord
Less critical
http://www.secunia.com/advisories/8793/

 -- 

Java Media Framework Privilege Escalation
Less critical
http://www.secunia.com/advisories/8792/

 -- 

EnGarde update for kernel
Moderately critical
http://www.secunia.com/advisories/8791/

 -- 

EnGarde sudo Privilege Escalation
Less critical
http://www.secunia.com/advisories/8790/


============
 2003-05-15
============

IBM AIX lpd Privilege Escalation
Less critical
http://www.secunia.com/advisories/8789/


===========================================================================

Secunia recommends that you verify all advisories you receive, by clicking
the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Contact details:
Web     : http://www.secunia.com/
E-mail  : support () secunia com
Tel     : +44 (0) 20 7016 2693
Fax     : +44 (0) 20 7637 0419

===========================================================================



-
ISN is currently hosted by Attrition.org

To unsubscribe email majordomo () attrition org with 'unsubscribe isn'
in the BODY of the mail.


Current thread: