New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 1023
Comments: 21
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image cybsec: Advisories!: Secunia Weekly Advisory image
Cyber Security

The Secunia Weekly Advisory Summary


2004-05-06
2004-05-13




This week : 42 advisories

Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Secunia has launched a new service called Secunia Virus Information.
Secunia Virus Information is based on information automatically
collected from seven different anti-virus vendors. The data will be
parsed and indexed, resulting in a chronological list, a searchable
index, and grouped profiles with information from the seven vendors.

Furthermore, when certain criteria are triggered virus alerts will be
issued. You can sign-up for the alerts here:

Sign-up for Secunia Virus Alerts:
http://secunia.com/secunia_virus_alerts/

Secunia Virus Information:
http://secunia.com/virus_information/


========================================================================


2) This Week in Brief:


ADVISORIES:

Two vulnerabilities have been reported in the Eudora mail client.

The first vulnerability was discovered by Paul Szabo and can be
triggered by embedding an overly long link in an e-mail. Successful
exploitation may allow execution of arbitrary code.

The second vulnerability was discovered by Brett Glass and can be
exploited to obfuscate the actual link contained in an e-mail.

Reference:
http://secunia.com/SA11581
http://secunia.com/SA11568

--

Microsoft has reported a vulnerability in Windows Help and Support
Center, which can be exploited to compromise a user's system. However,
this will require some user interaction.

Patches have been issued for this. Please refer to Secunia advisory
below.

Reference:
http://secunia.com/SA11590


VIRUS ALERTS:

During the last week, Secunia issued two MEDIUM RISK virus alerts.
Please refer to the grouped virus profiles below for more information:

Wallon.A - MEDIUM RISK Virus Alert - 2004-05-11 18:49 GMT+1
http://secunia.com/virus_information/9320/wallon.a/

Sasser.E - MEDIUM RISK Virus Alert - 2004-05-11 06:46 GMT+1
http://secunia.com/virus_information/9263/sasser.e/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1. [SA11539] Mac OS X Security Update Fixes Multiple Vulnerabilities
2. [SA11568] Eudora URL Handling Buffer Overflow Vulnerability
3. [SA11582] Microsoft Internet Explorer and Outlook URL Obfuscation
Issue
4. [SA10395] Internet Explorer URL Spoofing Vulnerability
5. [SA11482] Windows Explorer / Internet Explorer Long Share Name
Buffer Overflow
6. [SA11590] Microsoft Windows Help and Support Center URL Validation
Vulnerability
7. [SA10328] Linux Kernel do_brk() Privilege Escalation
Vulnerability
8. [SA11558] Exim Buffer Overflow Vulnerabilities
9. [SA11064] Microsoft Windows 14 Vulnerabilities
10. [SA11553] PHP-Nuke Multiple Vulnerabilities

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA11590] Microsoft Windows Help and Support Center URL Validation
Vulnerability
[SA11588] MailEnable Professional HTTPMail Service Buffer Overflow
Vulnerabilities
[SA11568] Eudora URL Handling Buffer Overflow Vulnerability
[SA11566] MyWeb HTTP GET Request Buffer Overflow Vulnerability
[SA11589] eMule Web Interface Negative Content Length Denial of
Service
[SA11578] Icecast Basic Authorization Denial of Service Vulnerability
[SA11573] efFingerD Denial of Service Vulnerabilities
[SA11572] Microsoft Outlook Predictable File Location Weakness
[SA11595] Microsoft Outlook External Reference Vulnerability
[SA11576] TrendMicro OfficeScan Weak Permissions
[SA11582] Microsoft Internet Explorer and Outlook URL Obfuscation
Issue
[SA11581] Eudora URL Obfuscation Issue
[SA11563] Microsoft IIS Inappropriate Cookie Handling Error

UNIX/Linux:
[SA11597] Debian update for exim-tls
[SA11571] OpenPKG update for ssmtp
[SA11562] Debian update for exim
[SA11559] P4DB Input Validation Vulnerabilities
[SA11558] Exim Buffer Overflow Vulnerabilities
[SA11599] Red Hat update for ipsec-tools
[SA11598] OpenPKG update for apache
[SA11592] Gentoo update for OpenOffice
[SA11575] Gentoo update for neon
[SA11574] Gentoo update for LHA
[SA11565] HP WBEM Services OpenSSL Handshake Denial of Service
Vulnerabilities
[SA11564] Conectiva update for lha
[SA11584] Mandrake update for apache2
[SA11583] Mandrake update for rsync
[SA11600] Red Hat update for kernel
[SA11586] SCO OpenServer Insecure Default XHost Access Controls
[SA11585] NetBSD Systrace Privilege Escalation Vulnerability
[SA11580] IBM Parallel Environment Sample Code Privilege Escalation
Vulnerability
[SA11561] OpenPKG update for kolab
[SA11560] Kolab Server OpenLDAP Root Password Disclosure
[SA11591] Gentoo update for ClamAV
[SA11577] Linux Kernel IO Bitmap Access Permissions Inheritance
Vulnerability

Other:


Cross Platform:
[SA11587] phpShop Arbitrary File Inclusion Vulnerability
[SA11569] DeleGate SSLway Filter Buffer Overflow Vulnerability
[SA11579] NukeJokes SQL Injection Vulnerabilities
[SA11570] Sun Java Runtime Environment Unspecified Denial of Service
Vulnerability
[SA11567] e107 Login Name/Author Script Insertion Vulnerability
[SA11593] BEA WebLogic weblogic.xml May Reset to Default Permissions
[SA11594] BEA WebLogic Admins and Operators May be Able to Stop the
Service

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA11590] Microsoft Windows Help and Support Center URL Validation
Vulnerability

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-05-11

Microsoft has issued patches for Microsoft Windows to fix a
vulnerability in the Help and Support Center.

Full Advisory:
http://secunia.com/advisories/11590/

--

[SA11588] MailEnable Professional HTTPMail Service Buffer Overflow
Vulnerabilities

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-05-11

Behrang Fouladi has discovered two vulnerabilities in MailEnable
Professional, which potentially can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11588/

--

[SA11568] Eudora URL Handling Buffer Overflow Vulnerability

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-05-07

Paul Szabo has reported a vulnerability in Eudora, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/11568/

--

[SA11566] MyWeb HTTP GET Request Buffer Overflow Vulnerability

Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2004-05-08

badpack3t has reported a vulnerability in MyWeb, which can be exploited
by malicious people to cause a DoS (Denial of Service) and potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11566/

--

[SA11589] eMule Web Interface Negative Content Length Denial of
Service

Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2004-05-11

A vulnerability has been discovered in eMule, which can be exploited by
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/11589/

--

[SA11578] Icecast Basic Authorization Denial of Service Vulnerability

Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2004-05-12

ned has discovered a vulnerability in Icecast, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/11578/

--

[SA11573] efFingerD Denial of Service Vulnerabilities

Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2004-05-10

Dr_insane has reported a vulnerability in efFingerD, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/11573/

--

[SA11572] Microsoft Outlook Predictable File Location Weakness

Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2004-05-10

http-equiv has reported a security issue in Microsoft Outlook,
potentially allowing malicious people to place a file in a predictable
location.

Full Advisory:
http://secunia.com/advisories/11572/

--

[SA11595] Microsoft Outlook External Reference Vulnerability

Critical: Less critical
Where: From remote
Impact: Security Bypass
Released: 2004-05-12

http-equiv has reported a security issue in Microsoft Outlook,
potentially allowing malicious people (spammers) to verify if a
recipient has read an email.

Full Advisory:
http://secunia.com/advisories/11595/

--

[SA11576] TrendMicro OfficeScan Weak Permissions

Critical: Less critical
Where: Local system
Impact: Security Bypass
Released: 2004-05-10

Matt has reported a vulnerability in TrendMicro OfficeScan, allowing
local users to stop the virus scanning.

Full Advisory:
http://secunia.com/advisories/11576/

--

[SA11582] Microsoft Internet Explorer and Outlook URL Obfuscation
Issue

Critical: Not critical
Where: From remote
Impact: ID Spoofing
Released: 2004-05-10

http-equiv has discovered an issue in Microsoft Internet Explorer,
Outlook and Outlook Express, allowing malicious people to obfuscate
URLs.

Full Advisory:
http://secunia.com/advisories/11582/

--

[SA11581] Eudora URL Obfuscation Issue

Critical: Not critical
Where: From remote
Impact: ID Spoofing
Released: 2004-05-10

Brett Glass has reported an issue in Eudora, allowing malicious people
to obfuscate URLs.

Full Advisory:
http://secunia.com/advisories/11581/

--

[SA11563] Microsoft IIS Inappropriate Cookie Handling Error

Critical: Not critical
Where: From remote
Impact: Exposure of system information
Released: 2004-05-10

Cesar Cerrudo has reported a security issue in Microsoft Internet
Information Services (IIS), potentially allowing malicious people to
gain knowledge of certain details about server side scripts.

Full Advisory:
http://secunia.com/advisories/11563/


UNIX/Linux:--

[SA11597] Debian update for exim-tls

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-05-12

Debian has issued updated packages for exim. These fix two
vulnerabilities, which potentially can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11597/

--

[SA11571] OpenPKG update for ssmtp

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-05-08

OpenPKG has issued an update for sSMTP. This fixes two vulnerabilities,
allowing malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11571/

--

[SA11562] Debian update for exim

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-05-07

Debian has issued updated packages for exim. These fix two
vulnerabilities, which potentially can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11562/

--

[SA11559] P4DB Input Validation Vulnerabilities

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-05-06

Jon McClintock has reported some vulnerabilities in P4DB, potentially
allowing malicious people to execute system commands.

Full Advisory:
http://secunia.com/advisories/11559/

--

[SA11558] Exim Buffer Overflow Vulnerabilities

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-05-06

Georgi Guninski has reported two vulnerabilities in exim, which
potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/11558/

--

[SA11599] Red Hat update for ipsec-tools

Critical: Moderately critical
Where: From remote
Impact: Hijacking, Security Bypass, Manipulation of data, DoS
Released: 2004-05-12

Red Hat has issued updated packages for ipsec-tools. These fix various
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service), establish unauthorised connections, and
conduct MitM (Man-in-the-Middle) attacks.

Full Advisory:
http://secunia.com/advisories/11599/

--

[SA11598] OpenPKG update for apache

Critical: Moderately critical
Where: From remote
Impact: DoS, Manipulation of data, ID Spoofing, Security Bypass
Released: 2004-05-12

OpenPKG has issued updates for apache. These fix various
vulnerabilities, which can be exploited to inject potentially malicious
characters into error logfiles, bypass certain restrictions, gain
unauthorised access, or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/11598/

--

[SA11592] Gentoo update for OpenOffice

Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2004-05-12

Gentoo has issued updates for OpenOffice. These fix a vulnerability
allowing malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/11592/

--

[SA11575] Gentoo update for neon

Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2004-05-10

Gentoo has issued updated packages for neon. These fix multiple
vulnerabilities, allowing malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/11575/

--

[SA11574] Gentoo update for LHA

Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2004-05-10

Gentoo has issued an update for lha. This fixes multiple
vulnerabilities, which potentially can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11574/

--

[SA11565] HP WBEM Services OpenSSL Handshake Denial of Service
Vulnerabilities

Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2004-05-07

HP has reported that WBEM Services is affected by the OpenSSL handshake
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/11565/

--

[SA11564] Conectiva update for lha

Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2004-05-07

Conectiva has issued updated packages for lha. These fix multiple
vulnerabilities, which potentially can be exploited by malicious people
to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11564/

--

[SA11584] Mandrake update for apache2

Critical: Less critical
Where: From remote
Impact: DoS
Released: 2004-05-11

MandrakeSoft has issued updated packages for Apache 2. These fix a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/11584/

--

[SA11583] Mandrake update for rsync

Critical: Less critical
Where: From remote
Impact: Security Bypass, Manipulation of data
Released: 2004-05-11

MandrakeSoft has issued updated packages for rsync. These fix a
vulnerability, potentially allowing malicious people to write files
outside the intended directory.

Full Advisory:
http://secunia.com/advisories/11583/

--

[SA11600] Red Hat update for kernel

Critical: Less critical
Where: Local system
Impact: Privilege escalation, Exposure of sensitive information,
Exposure of system information
Released: 2004-05-12

Red Hat has issued updated packages for the kernel. These fix various
vulnerabilities, which can be exploited by malicious, local users to
gain knowledge of sensitive information or gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/11600/

--

[SA11586] SCO OpenServer Insecure Default XHost Access Controls

Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-05-12

SCO has fixed an old security issue, which can be exploited by
malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/11586/

--

[SA11585] NetBSD Systrace Privilege Escalation Vulnerability

Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-05-11

Stefan Esser has reported a vulnerability in the NetBSD -current
implementation of the systrace utility and in a FreeBSD port by
Vladimir Kotal, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/11585/

--

[SA11580] IBM Parallel Environment Sample Code Privilege Escalation
Vulnerability

Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-05-10

A vulnerability has been discovered in IBM Parallel Environment (PE),
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/11580/

--

[SA11561] OpenPKG update for kolab

Critical: Less critical
Where: Local system
Impact: Exposure of system information, Exposure of sensitive
information
Released: 2004-05-06

OpenPKG has issued an updated version of kolab. This fixes a
vulnerability, which can be exploited by malicious, local users to gain
knowledge of the OpenLDAP root password.

Full Advisory:
http://secunia.com/advisories/11561/

--

[SA11560] Kolab Server OpenLDAP Root Password Disclosure

Critical: Less critical
Where: Local system
Impact: Exposure of system information, Exposure of sensitive
information
Released: 2004-05-06

Luca Villani has discovered a vulnerability in Kolab Server, which can
be exploited by malicious, local users to gain knowledge of sensitive
information.

Full Advisory:
http://secunia.com/advisories/11560/

--

[SA11591] Gentoo update for ClamAV

Critical: Not critical
Where: Local system
Impact: Privilege escalation
Released: 2004-05-12

Gentoo has issued an update for clamav. This fixes a vulnerability,
which potentially can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/11591/

--

[SA11577] Linux Kernel IO Bitmap Access Permissions Inheritance
Vulnerability

Critical: Not critical
Where: Local system
Impact: DoS
Released: 2004-05-10

Stas Sergeev has reported a vulnerability in the Linux kernel, which
potentially can be exploited by malicious, local users to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/11577/


Other:


Cross Platform:--

[SA11587] phpShop Arbitrary File Inclusion Vulnerability

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-05-11

Calum Power has reported a vulnerability in phpShop, potentially
allowing malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/11587/

--

[SA11569] DeleGate SSLway Filter Buffer Overflow Vulnerability

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-05-07

Joel Eriksson has reported a vulnerability in DeleGate, which
potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/11569/

--

[SA11579] NukeJokes SQL Injection Vulnerabilities

Critical: Moderately critical
Where: From remote
Impact: Manipulation of data
Released: 2004-05-10

Janek Vind has reported multiple vulnerabilities in NukeJokes, allowing
malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/11579/

--

[SA11570] Sun Java Runtime Environment Unspecified Denial of Service
Vulnerability

Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2004-05-08

An unspecified vulnerability has been discovered in the Java Runtime
Environment, which can be exploited by malicious people to cause the
Java Virtual Machine to become unresponsive.

Full Advisory:
http://secunia.com/advisories/11570/

--

[SA11567] e107 Login Name/Author Script Insertion Vulnerability

Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting
Released: 2004-05-08

SmOk3 has reported a vulnerability in e107, which can be exploited to
conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/11567/

--

[SA11593] BEA WebLogic weblogic.xml May Reset to Default Permissions

Critical: Less critical
Where: From remote
Impact: Security Bypass
Released: 2004-05-12

BEA has issued updates for WebLogic Server and WebLogic Express. These
fix a security issue, which potentially could grant inapropriate
privileges.

Full Advisory:
http://secunia.com/advisories/11593/

--

[SA11594] BEA WebLogic Admins and Operators May be Able to Stop the
Service

Critical: Not critical
Where: From local network
Impact: DoS
Released: 2004-05-12

BEA has issued updates for WebLogic Server and WebLogic Express. These
fix a weakness allowing certain administrative users to stop the
service.

Full Advisory:
http://secunia.com/advisories/11594/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web : http://secunia.com/
E-mail : [email protected]
Tel : +45 70 20 51 44
Fax : +45 70 20 51 45

Posted on Thursday, 13 May 2004 @ 09:37:21 EDT by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Linux.com
· IBM
· PHP HomePage
· MandrakeSoft
· Red Hat
· Debian GNU/Linux
· FreeBSD
· Microsoft
· Microsoft
· Linux Kernel Archives
· PHP-Nuke
· HotScripts
· Apache Web Server
· W3 Consortium
· Open Office
· Hewlett Packard
· Spam Cop
· More about Cyber Security
· News by phoenix22


Most read story about Cyber Security:
Booby Trapped software!

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register