Information Security News mailing list archives

Secunia Weekly Summary - Issue: 2004-5


From: William Knowles <wk () c4i org>
Date: Thu, 29 Jan 2004 04:30:44 -0600 (CST)

========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2004-01-22 - 2004-01-29                        

                       This week : 41 advisories                       

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Secunia Advisory IDs

Every advisory issued by Secunia has an unique identifier: The Secunia
Advisory ID (SA ID). The SA IDs make it very easy to reference,
identify, and find Secunia advisories.

A Shortcut to Secunia Advisories

Finding Secunia Advisories using SA IDs is easily done at the Secunia
website; either by simply entering the SA ID in our search form placed
on the right side of every Secunia web page, or by entering the SA ID
directly after the domain when visiting the Secunia website e.g.
http://secunia.com/SA10736

In the Secunia Weekly Summary SA IDs are displayed in brackets e.g.
[SA10736]

========================================================================
2) This Week in Brief:

Security researcher http-equiv has reported a vulnerability, which can
be exploited to spoof the "File name" field in Internet Explorer when
downloading files.
Secunia has made a simple demonstration of this vulnerability; a link
to the test can be found in the referenced Secunia Advisory.
Reference: [SA10736]

http-equiv has also demonstrated how it is possible to make a normal
looking "folder" in Windows XP contain arbitrary code, which will be
executed automatically on a users system when opened.
Reference: [SA10708]

Apple has issued a security update for Mac OS X. The update fixes
several vulnerabilities some of which are already known and others are
new.
Reference: [SA10723]

A vulnerability has been reported in the very popular FTP server
Serv-U, which can be exploited to execute arbitrary code on vulnerable
systems.
Reportedly, the vulnerability is addressed in version 5.0.
Reference: [SA10706]

TIP:
Finding Secunia advisories is easily done through the Secunia web site.
Simply enter the SA ID in the URL:
http://secunia.com/SA10736

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA10736] Internet Explorer File Download Extension Spoofing
2.  [SA10708] Windows XP Malicious Folder Automatic Code Execution
              Vulnerability
3.  [SA10395] Internet Explorer URL Spoofing Vulnerability
4.  [SA10723] Mac OS X Security Update Fixes Multiple Vulnerabilities
5.  [SA9580]  Microsoft Internet Explorer Multiple Vulnerabilities
6.  [SA9213]  XBlockOut "-display" Privilege Escalation Vulnerability
7.  [SA9223]  Cisco Catalyst Switch Non-Standard TCP Flag Combination
              DoS Vulnerability
8.  [SA10700] Need for Speed Client Buffer Overflow Vulnerability
9.  [SA10289] Internet Explorer System Compromise Vulnerabilities
10. [SA10523] Internet Explorer showHelp() Restriction Bypass
              Vulnerability

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA10700] Need for Speed Client Buffer Overflow Vulnerability
[SA10736] Internet Explorer File Download Extension Spoofing
[SA10710] Mbedthis AppWeb HTTP Request Denial of Service
Vulnerabilities
[SA10708] Windows XP Malicious Folder Automatic Code Execution
Vulnerability
[SA10707] TinyServer Multiple Vulnerabilities
[SA10704] Q-Shop SQL Injection and Cross Site Scripting
Vulnerabilities
[SA10724] ProxyNow! HTTP Request Buffer Overflow Vulnerabilities
[SA10714] FinJan SurfinGate Proxy Access to Admin Functions
[SA10741] BRS WebWeaver "ISAPISkeleton.dll" Cross Site Scripting
Vulnerability
[SA10739] BlackICE PC Protection Privilege Escalation Vulnerability

UNIX/Linux:
[SA10738] Gentoo update for gaim
[SA10735] Gentoo update for mod_python
[SA10723] Mac OS X Security Update Fixes Multiple Vulnerabilities
[SA10721] Red Hat update for gaim
[SA10719] Slackware update for gaim
[SA10718] Mandrake update for tcpdump
[SA10717] Mandrake update for gaim
[SA10716] Mandrake update for mc
[SA10715] Debian update for gnupg
[SA10705] Gaim Multiple Buffer Overflow Vulnerabilities
[SA10696] Cisco Voice Products Director Agent Insecure Default
Installation
[SA10703] Mandrake update for jabber
[SA10701] Cherokee Error Page Cross-Site Scripting Vulnerability
[SA10722] Fedora update for slocate
[SA10720] Red Hat update for slocate
[SA10702] Mandrake update for slocate
[SA10698] Red Hat update for slocate

Other:
[SA10711] NetWare Enterprise Web Server Cross Site Scripting
Vulnerability

Cross Platform:
[SA10712] Gallery Arbitrary File Inclusion Vulnerability
[SA10706] Serv-U FTP Server "SITE CHMOD" Command Buffer Overflow
Vulnerability
[SA10725] BEA WebLogic May Provide Access to Wrong Identity
[SA10713] Novell Groupwise Cross Site Scripting Vulnerability
[SA10709] IBM Net.Data Error Message Cross-Site Scripting
Vulnerability
[SA10737] IBM Informix Database Multiple Local Vulnerabilities
[SA10729] BEA WebLogic Boot Credentials Disclosure Vulnerability
[SA10728] BEA WebLogic Administrative Password Exposure Vulnerability
[SA10727] BEA WebLogic Exposure of Password to Operators
[SA10697] mod_perl File Descriptor Leakage Vulnerability
[SA10726] BEA WebLogic HTTP TRACE Response Cross-Site Scripting Issue
[SA10731] BremsServer Cross Site Scripting and Directory Traversal

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA10700] Need for Speed Client Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-01-23

Luigi Auriemma has reported a vulnerability in Need for Speed Hot
Pursuit 2, which potentially can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://www.secunia.com/advisories/10700/

 --

[SA10736] Internet Explorer File Download Extension Spoofing

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-01-28

http-equiv has identified a vulnerability in Internet Explorer,
allowing malicious web sites to spoof the file extension of
downloadable files.

Full Advisory:
http://www.secunia.com/advisories/10736/

 --

[SA10710] Mbedthis AppWeb HTTP Request Denial of Service
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-01-26

Ziv Kamir has reported two vulnerabilities in Mbedthis AppWeb, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://www.secunia.com/advisories/10710/

 --

[SA10708] Windows XP Malicious Folder Automatic Code Execution
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Privilege escalation, System access
Released:    2004-01-26

http-equiv has reported a vulnerability in Windows XP, which can be
exploited by malicious people to compromise a user's system or gain
escalated privileges.

Full Advisory:
http://www.secunia.com/advisories/10708/

 --

[SA10707] TinyServer Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of sensitive information,
DoS
Released:    2004-01-26

Donato Ferrante has reported multiple vulnerabilities in TinyServer,
allowing malicious people to view sensitive information or cause a
Denial of Service.

Full Advisory:
http://www.secunia.com/advisories/10707/

 --

[SA10704] Q-Shop SQL Injection and Cross Site Scripting
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Manipulation of
data
Released:    2004-01-26

Nick Gudov has reported multiple vulnerabilities in Q-Shop, allowing
malicious people to conduct Cross Site Scripting or SQL injection
attacks.

Full Advisory:
http://www.secunia.com/advisories/10704/

 --

[SA10724] ProxyNow! HTTP Request Buffer Overflow Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2004-01-27

Peter Winter-Smith has reported two vulnerabilities in ProxyNow!, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://www.secunia.com/advisories/10724/

 --

[SA10714] FinJan SurfinGate Proxy Access to Admin Functions

Critical:    Moderately critical
Where:       From local network
Impact:      Security Bypass, System access
Released:    2004-01-27

David Byrne has reported a vulnerability in Finjan SurfinGate, allowing
malicious people to access administrative functions.

Full Advisory:
http://www.secunia.com/advisories/10714/

 --

[SA10741] BRS WebWeaver "ISAPISkeleton.dll" Cross Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-01-29

Oliver Karow has reported a vulnerability in BRS WebWeaver, allowing
malicious people to conduct Cross Site Scripting attacks.

Full Advisory:
http://www.secunia.com/advisories/10741/

 --

[SA10739] BlackICE PC Protection Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-01-28

KF has reported a privilege escalation vulnerability in BlackICE PC
Protection, allowing malicious users to gain SYSTEM privileges.

Full Advisory:
http://www.secunia.com/advisories/10739/


UNIX/Linux:--

[SA10738] Gentoo update for gaim

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-01-28

Gentoo has issued updated packages for gaim. These fix multiple
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://www.secunia.com/advisories/10738/

 --

[SA10735] Gentoo update for mod_python

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-01-28

Gentoo has issued an update for mod_python. This fix a vulnerability,
which can be exploited by malicious people to cause a Denial of
Service.

Full Advisory:
http://www.secunia.com/advisories/10735/

 --

[SA10723] Mac OS X Security Update Fixes Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Privilege escalation, DoS
Released:    2004-01-27

Apple has issued a security update for Mac OS X, which fixes some
older, known vulnerabilities along with some new unspecified issues.

Full Advisory:
http://www.secunia.com/advisories/10723/

 --

[SA10721] Red Hat update for gaim

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-01-27

Red Hat has issued updated packages for gaim. These fix multiple
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://www.secunia.com/advisories/10721/

 --

[SA10719] Slackware update for gaim

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-01-27

Slackware has issued updated packages for gaim. These fix multiple
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://www.secunia.com/advisories/10719/

 --

[SA10718] Mandrake update for tcpdump

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-01-27

MandrakeSoft has issued updated packages for tcpdump. These fix
multiple vulnerabilities, which can be exploited by malicious people to
crash tcpdump and potentially compromise a vulnerable system.

Full Advisory:
http://www.secunia.com/advisories/10718/

 --

[SA10717] Mandrake update for gaim

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-01-27

MandrakeSoft has issued updated packages for gaim. These fix multiple
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://www.secunia.com/advisories/10717/

 --

[SA10716] Mandrake update for mc

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-01-27

MandrakeSoft has issued updated packages for mc. These fix a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://www.secunia.com/advisories/10716/

 --

[SA10715] Debian update for gnupg

Critical:    Moderately critical
Where:       From remote
Impact:      ID Spoofing, Exposure of sensitive information
Released:    2004-01-27

Debian has issued updated packages for gnupg. These fix a
vulnerability, which exposes the private key when using El-Gamal type
20 keys.

Full Advisory:
http://www.secunia.com/advisories/10715/

 --

[SA10705] Gaim Multiple Buffer Overflow Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-01-27

Stefan Esser has identified multiple vulnerabilities in Gaim, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://www.secunia.com/advisories/10705/

 --

[SA10696] Cisco Voice Products Director Agent Insecure Default
Installation

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2004-01-22

Cisco has reported a vulnerability in multiple voice products on the
IBM platform, which can be exploited by malicious people to cause a DoS
(Denial of Service) or compromise a vulnerable system.

Full Advisory:
http://www.secunia.com/advisories/10696/

 --

[SA10703] Mandrake update for jabber

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2004-01-26

MandrakeSoft has issued updated packages for jabber. These fix a
vulnerability, which can be exploited by malicious people to cause a
Denial of Service.

Full Advisory:
http://www.secunia.com/advisories/10703/

 --

[SA10701] Cherokee Error Page Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-01-26

César Fernández has identified a vulnerability in Cherokee, which can
be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://www.secunia.com/advisories/10701/

 --

[SA10722] Fedora update for slocate

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-01-27

Red Hat has issued updated packages for slocate. These fix a
vulnerability, which can be exploited by malicious, local users to gain
"slocate" group privileges.

Full Advisory:
http://www.secunia.com/advisories/10722/

 --

[SA10720] Red Hat update for slocate

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-01-27

Red Hat has issued updated packages for slocate. These fix a
vulnerability, which can be exploited by malicious, local users to gain
"slocate" group privileges.

Full Advisory:
http://www.secunia.com/advisories/10720/

 --

[SA10702] Mandrake update for slocate

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-01-26

MandrakeSoft has issued updated packages for slocate. These fix a
vulnerability, which can be exploited by malicious, local users to gain
"slocate" group privileges.

Full Advisory:
http://www.secunia.com/advisories/10702/

 --

[SA10698] Red Hat update for slocate

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-01-23

Red Hat has issued updated packages for slocate. These fix a
vulnerability, which can be exploited by malicious, local users to gain
"slocate" group privileges.

Full Advisory:
http://www.secunia.com/advisories/10698/


Other:--

[SA10711] NetWare Enterprise Web Server Cross Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of system information
Released:    2004-01-26

Rafel Ivgi has reported a vulnerability in Novell NetWare Enterprise
Web Server, allowing malicious people to conduct cross site scripting
attacks.

Full Advisory:
http://www.secunia.com/advisories/10711/


Cross Platform:--

[SA10712] Gallery Arbitrary File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-01-26

The Gallery Development Team has fixed a vulnerability in Gallery,
allowing malicious people to compromise a vulnerable system.

Full Advisory:
http://www.secunia.com/advisories/10712/

 --

[SA10706] Serv-U FTP Server "SITE CHMOD" Command Buffer Overflow
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-01-26

kkqq has reported a vulnerability in Serv-U FTP Server, which can be
exploited by malicious users to compromise a vulnerable system.

Full Advisory:
http://www.secunia.com/advisories/10706/

 --

[SA10725] BEA WebLogic May Provide Access to Wrong Identity

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2004-01-27

BEA has reported a security issue in WebLogic, which may provide users
access to the wrong profile.

Full Advisory:
http://www.secunia.com/advisories/10725/

 --

[SA10713] Novell Groupwise Cross Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-01-27

A vulnerability has been identified in Novell Groupwise WebAccess
allowing malicious people to conduct Cross Site Scripting attacks.

Full Advisory:
http://www.secunia.com/advisories/10713/

 --

[SA10709] IBM Net.Data Error Message Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-01-26

Secunia has identified a vulnerability in IBM Net.Data, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://www.secunia.com/advisories/10709/

 --

[SA10737] IBM Informix Database Multiple Local Vulnerabilities

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-01-28

IBM has issued updates for Informix. These fix multiple vulnerabilities
allowing malicious users to escalate their privileges.

Full Advisory:
http://www.secunia.com/advisories/10737/

 --

[SA10729] BEA WebLogic Boot Credentials Disclosure Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2004-01-27

BEA has reported a vulnerability in WebLogic Server and Express, which
may expose the boot credentials to a malicious user.

Full Advisory:
http://www.secunia.com/advisories/10729/

 --

[SA10728] BEA WebLogic Administrative Password Exposure Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information, Privilege escalation
Released:    2004-01-27

BEA has reported a vulnerability in WebLogic, which possibly may expose
administrative passwords to users.

Full Advisory:
http://www.secunia.com/advisories/10728/

 --

[SA10727] BEA WebLogic Exposure of Password to Operators

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-01-27

BEA has reported a vulnerability in WebLogic, which allows operators to
gain knowledge of passwords.

Full Advisory:
http://www.secunia.com/advisories/10727/

 --

[SA10697] mod_perl File Descriptor Leakage Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-01-22

Steve Grubb has reported a vulnerability in mod_perl, which potentially
can be exploited by malicious, local users to hi-jack the HTTPS port.

Full Advisory:
http://www.secunia.com/advisories/10697/

 --

[SA10726] BEA WebLogic HTTP TRACE Response Cross-Site Scripting Issue

Critical:    Not critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-01-27

BEA has confirmed a problem in WebLogic Server and Express, which
potentially can be exploited to conduct cross-site scripting attacks
against users.

Full Advisory:
http://www.secunia.com/advisories/10726/

 --

[SA10731] BremsServer Cross Site Scripting and Directory Traversal

Critical:    Not critical
Where:       From local network
Impact:      Cross Site Scripting, Exposure of sensitive information
Released:    2004-01-28

Donato Ferrante has reported some issues in Der Herberlin BremsServer.
Allowing malicious people to conduct Cross Site Scripting and directory
traversal.

Full Advisory:
http://www.secunia.com/advisories/10731/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://www.secunia.com/about_secunia_advisories/

Subscribe:
http://www.secunia.com/secunia_weekly_summary/

Contact details:
Web     : http://www.secunia.com/
E-mail  : support () secunia com
Tel     : +45 70 20 51 44
Fax     : +45 70 20 51 45

========================================================================



-
ISN is currently hosted by Attrition.org

To unsubscribe email majordomo () attrition org with 'unsubscribe isn'
in the BODY of the mail.


Current thread: