Information Security News mailing list archives

Secunia Weekly Summary - Issue: 2004-15


From: InfoSec News <isn () c4i org>
Date: Fri, 9 Apr 2004 03:08:26 -0500 (CDT)

========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2004-04-01 - 2004-04-08                        

                       This week : 46 advisories                       

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Secunia has launched a new service called Secunia Virus Information.
Secunia Virus Information is based on information automatically
collected from 7 different anti-virus vendors. The data will be parsed
and indexed, resulting in a cronological list, a searchable index, and
grouped profiles with information from the 7 vendors.

Example:
http://secunia.com/virus_information/8592/

Furthermore, when certain criteria are triggered virus alerts will be
issued. You can sign-up for the alerts here:

Secunia Virus Alerts:
http://secunia.com/secunia_virus_alerts/

Secunia Virus Information:
http://secunia.com/virus_information/

========================================================================
2) This Week in Brief:

A vulnerability has been reported in Panda ActiveScan, which can be
exploited by malicious people to compromise a vulnerable system.

Currently no response or patch is available from the vendor. Please
refer to referenced Secunia Advisory for more information.

Reference:
http://secunia.com/SA11312


Peter Winter-Smith of NGSSoftware has identified a vulnerability in the
very popular music player Winamp versions 2.91 through 5.02.

The vulnerability may be triggered by visiting a malicious website with
a vulnerable Winamp client. All users are advised to update to version
5.03.

Reference:
http://secunia.com/SA11285


Apple has release a security update for Mac OS X, which corrects
multiple vulnerabilities.

The update is available from the vendor website.

Reference:
http://secunia.com/SA11303


========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA11273] Internet Explorer/Outlook Express Restricted Zone Status
              Bar Spoofing
2.  [SA10395] Internet Explorer URL Spoofing Vulnerability
3.  [SA10523] Internet Explorer showHelp() Restriction Bypass
              Vulnerability
4.  [SA11285] Winamp "in_mod.dll" Heap Overflow Vulnerability
5.  [SA11082] Sun Java System (Sun ONE) SSL Vulnerabilities
6.  [SA11139] OpenSSL SSL/TLS Handshake Denial of Service
              Vulnerabilities
7.  [SA11297] F-Secure Anti-Virus for MIMEsweeper Virus Detection
              Bypass
8.  [SA11293] Citrix MetaFrame Password Manager Authentication
              Information Disclosure
9.  [SA11301] F-Secure BackWeb Privilege Escalation Vulnerability
10. [SA10736] Internet Explorer File Download Extension Spoofing

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA11312] Panda ActiveScan Control "Internacional" Property Heap
Overflow Vulnerability
[SA11298] Perl win32_stat Function Buffer Overflow Vulnerability
[SA11289] eMule "DecodeBase16()" Buffer Overflow Vulnerability
[SA11285] Winamp "in_mod.dll" Heap Overflow Vulnerability
[SA11292] Microsoft SharePoint Portal Server Cross-Site Scripting
Vulnerabilities
[SA11286] FTGate Web Mail Cross-Site Scripting and Path Exposure
[SA11279] MondoSearch Multiple Vulnerabilities
[SA11294] IBM Director Agent Denial of Service Vulnerability
[SA11301] F-Secure BackWeb Privilege Escalation Vulnerability
[SA11293] Citrix MetaFrame Password Manager Authentication Information
Disclosure
[SA11313] McAfee McFreeScan Module System Information Disclosure
[SA11273] Internet Explorer/Outlook Express Restricted Zone Status Bar
Spoofing

UNIX/Linux:
[SA11311] Gentoo update for tcpdump
[SA11308] Gentoo update for KDE
[SA11303] Mac OS X Security Update Fixes Multiple Vulnerabilities
[SA11296] OpenPKG update for mc
[SA11295] Mandrake update for mplayer
[SA11282] IRIX update for ftpd
[SA11281] Debian update for oftpd
[SA11274] HP OpenCall MultiService Controller H.323 Vulnerabilities
[SA11272] CactuShop Multiple Vulnerabilities
[SA11304] Monit Web-based Administration Interface Multiple
Vulnerabilities
[SA11271] Gentoo update for monit
[SA11309] Debian update for tcpdump
[SA11283] IRIX Frame Padding Vulnerability
[SA11280] Debian update for interchange
[SA11306] Debian update for heimdal
[SA11275] Heimdal Cross-Realm Trust Spoofing Vulnerability
[SA11310] Gentoo update for sysstat
[SA11307] Debian update for xine-ui
[SA11305] Gentoo update for Portage
[SA11300] SuSE Linux YaST Temporary File Creation Vulnerability
[SA11291] Debian update for fte
[SA11290] FTE Text Editor Multiple Buffer Overflow Vulnerabilities

Other:
[SA11278] Sidewinder Potential OpenSSL Vulnerabilities
[SA11276] VMware ESX Server Privilege Escalation Vulnerabilities

Cross Platform:
[SA11314] RealPlayer/RealOne R3T File Handling Buffer Overflow
Vulnerability
[SA11299] IGI 2: Covert Strike RCON Command Format String
Vulnerability
[SA11288] HAHTsite Scenario Server Project Name Buffer Overflow
Vulnerability
[SA11287] ADA Image Server Request Buffer Overflow and Directory
Traversal
[SA11297] F-Secure Anti-Virus for MIMEsweeper Virus Detection Bypass
[SA11270] Roger Wilco Multiple Vulnerabilities
[SA11315] Intel Server Control and Server Management Insecure Firmware
Setting
[SA11302] Qmail Non-Delivery Notification DDoS Security Issue
[SA11277] ADA Image Server Directory Listing Vulnerability
[SA11284] Dreamweaver Database Connection Script Security Issue

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA11312] Panda ActiveScan Control "Internacional" Property Heap
Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-04-07

Rafel Ivgi has discovered a vulnerability in Panda ActiveScan Control,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/11312/

 --

[SA11298] Perl win32_stat Function Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-04-06

iDEFENSE has discovered a vulnerability in Perl and ActivePerl, which
potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/11298/

 --

[SA11289] eMule "DecodeBase16()" Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-04-05

Kostya Kortchinsky has reported a vulnerability in eMule, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11289/

 --

[SA11285] Winamp "in_mod.dll" Heap Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-04-05

NGSSoftware has discovered a vulnerability in Winamp, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/11285/

 --

[SA11292] Microsoft SharePoint Portal Server Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-04-06

Ory Segal has reported multiple vulnerabilities in Microsoft SharePoint
Portal Server 2001, which can be exploited by malicious people to
conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/11292/

 --

[SA11286] FTGate Web Mail Cross-Site Scripting and Path Exposure

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of system information
Released:    2004-04-06

Dr_insane has discovered some vulnerabilities in FTGate Web Mail, where
the most serious can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/11286/

 --

[SA11279] MondoSearch Multiple Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information, DoS
Released:    2004-04-02

Protego has reported flere vulnerabilities in MondoSearch, which can be
exploited by malicious people to use the application as a proxy, cause
a DoS (Denial of Service), or disclose certain administrative
usernames.

Full Advisory:
http://secunia.com/advisories/11279/

 --

[SA11294] IBM Director Agent Denial of Service Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2004-04-08

Juanma Merino has reported a vulnerability in IBM Director Agent, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/11294/

 --

[SA11301] F-Secure BackWeb Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-04-06

A vulnerability has been discovered in F-Secure BackWeb, which can be
exploited by malicious, local users to gain SYSTEM privileges on a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/11301/

 --

[SA11293] Citrix MetaFrame Password Manager Authentication Information
Disclosure

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2004-04-05

A security issue has been reported in Citrix MetaFrame Password
Manager, which may disclose authentication information.

Full Advisory:
http://secunia.com/advisories/11293/

 --

[SA11313] McAfee McFreeScan Module System Information Disclosure

Critical:    Not critical
Where:       From remote
Impact:      Exposure of system information
Released:    2004-04-07

A vulnerability has been discovered in McAfee McFreeScan Module, which
can be exploited by malicious people to gain knowledge of certain
information about a user's system.

Full Advisory:
http://secunia.com/advisories/11313/

 --

[SA11273] Internet Explorer/Outlook Express Restricted Zone Status Bar
Spoofing

Critical:    Not critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-04-01

http-equiv has discovered a weakness in Internet Explorer, which
potentially can be exploited by malicious people to trick users into
visiting a malicious website.

Full Advisory:
http://secunia.com/advisories/11273/


UNIX/Linux:--

[SA11311] Gentoo update for tcpdump

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-04-07

Gentoo has issued an update for tcpdump. This fixes one vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a system running tcpdump.

Full Advisory:
http://secunia.com/advisories/11311/

 --

[SA11308] Gentoo update for KDE

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-04-07

Gentoo has issued an update for kdepim. These fix a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/11308/

 --

[SA11303] Mac OS X Security Update Fixes Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-04-07

The vendor has acknowledged multiple vulnerabilities in Apple Mac OS X,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11303/

 --

[SA11296] OpenPKG update for mc

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-04-06

OpenPKG has issued an updated package for mc. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/11296/

 --

[SA11295] Mandrake update for mplayer

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-04-06

MandrakeSoft has issued an update for mplayer. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/11295/

 --

[SA11282] IRIX update for ftpd

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-04-05

SGI has issued updates for ftpd. These fixes a vulnerability allowing
malicious users to cause a Denial of Service.

Full Advisory:
http://secunia.com/advisories/11282/

 --

[SA11281] Debian update for oftpd

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-04-05

Debian has issued updated packages for oftpd. These fix a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/11281/

 --

[SA11274] HP OpenCall MultiService Controller H.323 Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-04-01

HP has acknowledged some vulnerabilities in the HP OpenCall
Multiservice Controller (OCMC) H.323 implementation, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/11274/

 --

[SA11272] CactuShop Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2004-04-01

Nick Gudov has reported two vulnerabilities in CactuShop, allowing
malicious people to conduct SQL injection and Cross Site Scripting
attacks.

Full Advisory:
http://secunia.com/advisories/11272/

 --

[SA11304] Monit Web-based Administration Interface Multiple
Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2004-04-06

Matthew Murphy has discovered multiple vulnerabilities in Monit, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/11304/

 --

[SA11271] Gentoo update for monit

Critical:    Moderately critical
Where:       From local network
Impact:      System access, DoS
Released:    2004-04-01

Gentoo has issued an update for monit. This fixes two vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11271/

 --

[SA11309] Debian update for tcpdump

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2004-04-07

Debian has issued updated packages for tcpdump. These fix two
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/11309/

 --

[SA11283] IRIX Frame Padding Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2004-04-05

SGI has acknowledged an older information disclosure vulnerability
within certain network drivers.

Full Advisory:
http://secunia.com/advisories/11283/

 --

[SA11280] Debian update for interchange

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information, Exposure of system
information
Released:    2004-04-05

Debian has issued updated packages for interchange. These fix a
vulnerability, which can be exploited by malicious people to gain
knowledge of sensitive information.

Full Advisory:
http://secunia.com/advisories/11280/

 --

[SA11306] Debian update for heimdal

Critical:    Less critical
Where:       From local network
Impact:      ID Spoofing
Released:    2004-04-07

Debian has issued updated packages for heimdal. These fix a
vulnerability, which can allow certain people to impersonate others.

Full Advisory:
http://secunia.com/advisories/11306/

 --

[SA11275] Heimdal Cross-Realm Trust Spoofing Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      ID Spoofing
Released:    2004-04-02

A vulnerability has been reported in Heimdal, which may allow certain
people to impersonate others.

Full Advisory:
http://secunia.com/advisories/11275/

 --

[SA11310] Gentoo update for sysstat

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-04-07

Gentoo has issued updated packages for sysstat. These fix a
vulnerability, allowing malicious local users to escalate their
privileges.

Full Advisory:
http://secunia.com/advisories/11310/

 --

[SA11307] Debian update for xine-ui

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-04-07

Debian has issued updated packages for xine-ui. These fix a
vulnerability, which potentially can be exploited by malicious, local
users to escalate their privileges on a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11307/

 --

[SA11305] Gentoo update for Portage

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-04-07

Gentoo has issued an update for Portage. This fixes a vulnerability,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/11305/

 --

[SA11300] SuSE Linux YaST Temporary File Creation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-04-08

l0om has reported a vulnerability in SuSE Linux, which can be exploited
by malicious, local users to perform certain actions on a vulnerable
system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/11300/

 --

[SA11291] Debian update for fte

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-04-05

Debian has issued updated packages for fte. These fix multiple
vulnerabilities, which can be exploited by malicious, local users to
gain "root" privileges on a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11291/

 --

[SA11290] FTE Text Editor Multiple Buffer Overflow Vulnerabilities

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-04-05

Steve Kemp has reported multiple vulnerabilities in FTE Text Editor,
which potentially can be exploited by malicious, local users to gain
escalated privileges on a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11290/


Other:--

[SA11278] Sidewinder Potential OpenSSL Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-04-02

Secure Computing Corporation has issued a patch for their Sidewinder
firewall.

Full Advisory:
http://secunia.com/advisories/11278/

 --

[SA11276] VMware ESX Server Privilege Escalation Vulnerabilities

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-04-02

VMware has issued updated packages for the kernel. These fix three
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/11276/


Cross Platform:--

[SA11314] RealPlayer/RealOne R3T File Handling Buffer Overflow
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-04-07

NGSSoftware has discovered a vulnerability in RealOne Player /
RealPlayer, which can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/11314/

 --

[SA11299] IGI 2: Covert Strike RCON Command Format String
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-04-06

Luigi Auriemma has reported a vulnerability in IGI 2: Covert Strike,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/11299/

 --

[SA11288] HAHTsite Scenario Server Project Name Buffer Overflow
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-04-05

Dennis Rand has reported a vulnerability in HAHTsite Scenario Server,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/11288/

 --

[SA11287] ADA Image Server Request Buffer Overflow and Directory
Traversal

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2004-04-05

Dr_insane has discovered two vulnerabilities in ADA Image Server, which
can be exploited by malicious people to compromise a vulnerable system
or gain knowledge of sensitive information.

Full Advisory:
http://secunia.com/advisories/11287/

 --

[SA11297] F-Secure Anti-Virus for MIMEsweeper Virus Detection Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-04-06

A vulnerability has been reported in F-Secure Anti-Virus for
MIMEsweeper, potentially allowing malware to bypass the virus
detection.

Full Advisory:
http://secunia.com/advisories/11297/

 --

[SA11270] Roger Wilco Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, DoS
Released:    2004-04-02

Luigi Auriemma has reported some vulnerabilities in Roger Wilco, which
can be exploited by malicious people to cause a DoS (Denial of Service)
and bypass certain restrictions.

Full Advisory:
http://secunia.com/advisories/11270/

 --

[SA11315] Intel Server Control and Server Management Insecure Firmware
Setting

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2004-04-07

A vulnerability has been reported in certain Intel Server Control and
Server Management utilities, potentially allowing malicious people
unauthorised access.

Full Advisory:
http://secunia.com/advisories/11315/

 --

[SA11302] Qmail Non-Delivery Notification DDoS Security Issue

Critical:    Less critical
Where:       From remote
Impact:      
Released:    2004-04-08

Stefan Frei, Ivo Silvestri, and Gunter Ollmann recently published a
paper describing a way to utilise certain mail servers for DDoS
(Distributed Denial-of-Service) attacks on other systems.

Full Advisory:
http://secunia.com/advisories/11302/

 --

[SA11277] ADA Image Server Directory Listing Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2004-04-02

Donato Ferrante has discovered a vulnerability in ADA Image Server
(ImgSvr), which can be exploited by malicious people to disclose the
content of a directory.

Full Advisory:
http://secunia.com/advisories/11277/

 --

[SA11284] Dreamweaver Database Connection Script Security Issue

Critical:    Not critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-04-05

Macromedia has issued an advisory regarding a security issue in
Dreamweaver, potentially allowing malicious people to manipulate
databases.

Full Advisory:
http://secunia.com/advisories/11284/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web     : http://secunia.com/
E-mail  : support () secunia com
Tel     : +45 70 20 51 44
Fax     : +45 70 20 51 45

========================================================================



_________________________________________
ISN mailing list
Sponsored by: OSVDB.org


Current thread: