News

Tuesday, October 24, 2006

SecurityFocus Newsletter #373

SecurityFocus Newsletter #373
----------------------------------------

This Issue is Sponsored by: Lancope

"Revolutionize the way you view your network security"
How do you protect what you can't see? Stop protecting while blind. Gain network visibility now. Learn how Cisco NetFlow gives visibility and enables cost-effective security across distributed enterprise networks. StealthWatch, the veteran Network Behavior Analysis (NBA) and Response solution, leverages Cisco NetFlow to provide scalable, internal network security.
ALERT: Download FREE White Paper "Network Behavior Analysis (NBA) in the Enterprise."

http://www.lancope.com/resource/

------------------------------------------------------------------
I. FRONT AND CENTER
1. Viruses, Phishing, and Trojans For Profit
II. BUGTRAQ SUMMARY
1. CPanel Multiple Cross-Site Scripting Vulnerabilities
2. Sun Solaris Netscape Portable Runtime API Local Privilege Escalation Vulnerability
3. Castor RS.PHP Remote File Include Vulnerability
4. Simple Machines Forum Index.PHP Cross-Site Scripting Vulnerability
5. Open Meetings Filing Application Multiple Remote File Include Vulnerabilities
6. Sudo Perl Environment Variable Handling Security Bypass Vulnerability
7. BlueShoes Framework Multiple Remote File Include Vulnerabilities
8. Virtual Law Office Multiple Remote File Include Vulnerabilities
9. Novell eDirectory iMonitor HTTPSTK Buffer Overflow Vulnerability
10. RSSonate Multiple Remote File Include Vulnerabilities
11. PHP Multiple Input Validation Vulnerabilities
12. OneOrZero Open Source Task Management and Help Desk System Information Disclosure Vulnerability
13. PHP SSCANF() Safe_Mode Restriction-Bypass Vulnerability
14. Web Group Communication Center Quiz.PHP SQL Injection Vulnerability
15. Apache mod_php Module File Descriptor Leakage Vulnerability
16. Xerox WorkCentre / CopyCentre Multiple Vulnerabilities
17. ImageMagick SGI Image File Remote Heap Buffer Overflow Vulnerability
18. Clam Anti-Virus CHM Unpacker Denial Of Service Vulnerability
19. KnowledgeBank Multiple Cross-Site Scripting Vulnerabilities
20. OpenSSH-Portable GSSAPI Authentication Abort Information Disclosure Weakness
21. HP DTMail Attachment Argument Buffer Overflow Vulnerability
22. Mambo Multiple Input Validation Vulnerabilities
23. Maarch View Documents Information Disclosure Vulnerability
24. Yahoo! Messenger Service 18 Remote Buffer Overflow Vulnerability
25. PHP Poll Creator Poll_Vote.PHP Remote File Include Vulnerability
26. Delta Scripts PHP Classifieds Functions.PHP Remote File Include Vulnerability
27. WikiNi Multiple HTML-Injection Vulnerabilities
28. Retired: Trawler Multiple Remote File Include Vulnerabilities
29. MDWeb Multiple Remote File Include Vulnerabilities
30. QK SMTP Remote Buffer Overflow Vulnerability
31. RETIRED: Microsoft Windows CMD.EXE Buffer Overflow Vulnerability
32. Shop-Script Multiple HTTP Response Splitting Vulnerabilities
33. Linux Kernel UDF Denial of Service Vulnerability
34. Python Repr() Function Remote Code Execution Vulnerability
35. WebAPP Apage.CGI Remote Command Execution Vulnerability
36. Microsoft PowerPoint Remote Unspecified Code Execution Vulnerability
37. Symantec AntiVirus SAVRT.SYS Local Privilege Escalation Vulnerability
38. Oracle October 2006 Security Update Multiple Vulnerabilities
39. JaxUltraBB Delete.PHP HTML Injection Vulnerability
40. OpenVMPS Logging Function Format String Vulnerability
41. GTetrinet Index Out of Bounds Unspecified Remote Code Execution Vulnerability
42. Apache Mod_TCL Remote Format String Vulnerability
43. RMSOFT Gallery System Images.PHP Cross-Site Scripting Vulnerability
44. Cheese Tracker XM Loader Buffer Overflow Vulnerability
45. OpenSSL SSL_Get_Shared_Ciphers Buffer Overflow Vulnerability
46. Apple Mac OS X BlueTooth Directory Traversal Vulnerability
47. OpenSSL ASN.1 Structures Denial of Service Vulnerability
48. OpenSSL Public Key Processing Denial of Service Vulnerability
49. OpenSSL SSLv2 Null Pointer Dereference Client Denial of Service Vulnerability
50. Clam Anti-Virus PE Rebuilding Heap Buffer Overflow Vulnerability
51. CAPI4Hylafax Remote Arbitrary Command Execution Vulnerability
52. Mozilla Firefox JavaScript Handler Race Condition Memory Corruption Vulnerability
53. SAPHPLesson Multiple SQL Injection Vulnerabilities
54. Learn.com Learncenter.ASP Cross-Site Scripting Vulnerability
55. PHP ZendEngine ECalloc Integer Overflow Vulnerability
56. SchoolAlumni Portal Multiple Input Validation Vulnerabilities
57. PHP-Nuke Encyclopedia Module SQL Injection Vulnerability
58. Smarty Smarty.Class.PHP Remote File Include Vulnerability
59. Multiple X.Org Products SetUID Local Privilege Escalation Vulnerability
60. Cisco VPN 3000 Concentrator FTP Arbitrary File Access Vulnerability
61. PHPAdsNew and PHPPGAds Multiple Input Validation Vulnerabilities
62. Vitrax Premodded Functions_Portal.PHP Remote File Include Vulnerability
63. ClanLite Config-PHP.PHP Remote File Include Vulnerability
64. Trolltech QT Pixmap Images Integer Overflow Vulnerability
65. Wireshark Multiple Vulnerabilities
66. HP-UX Software Distributor Lang Environment Variable Local Buffer Overrun Vulnerability
67. GeoNetwork Opensource Login SQL Injection Vulnerability
68. AROUNDMe P_New_Password.TPL.PHP Remote File Include Vulnerability
69. EZ-Ticket Common.PHP Remote File Include Vulnerability
70. PGOSD Function.PHP3 Remote File Include Vulnerability
71. RETIRED PHP Generator Of Object SQL Database Function.PHP3 Remote File Include Vulnerability
72. X.Org LibXfont CID Font File Multiple Integer Overflow Vulnerabilities
73. Perl Perl_sv_vcatpvfn Format String Integer Wrap Vulnerability
74. Webmin/Usermin Unspecifed Information Disclosure Vulnerability
75. Webmin and Usermin HTML Injection and Information Disclosure Vulnerability
76. Novell eDirectory EvtFilteredMonitorEventsRequest Multiple Vulnerabilities
77. Mambo MambWeather Module Savant2_Plugin_Options.PHP Remote File Include Vulnerability
78. Net_DNS RR.PHP Remote File Include Vulnerability
79. PH Pexplorer Language Local File Include Vulnerability
80. Novell eDirectory NCP Packet Processing Remote Heap Overflow Vulnerability
81. Trawler Web CMS Multiple Remote File Include Vulnerabilities
82. Hosting Controller Multiple SQL Injection Vulnerabilities
83. SimpNews Multiple Cross-Site Scripting Vulnerabilities
84. FreeBSD Crypto Local Denial of Service Vulnerability
85. Snitz Forums 2000 Pop_Mail.ASP SQL Injection Vulnerability
86. Crafty Syntax Live Help Multiple Remote File Include Vulnerabilities
87. Ascended Guestbook Embedded.PHP Remote File Include Vulnerability
88. RevilloC MailServer Remote SMTP Buffer Overflow Vulnerability
89. Sun Java System/iPlanet Messaging Server Webmail JavaScript Injection Vulnerability
90. GraphicsMagick PALM DCM Buffer Overflow Vulnerabilities
91. HP-UX SWPackage Local Buffer Overflow Vulnerability
92. CMS Faethon Mainpath Parameter Multiple Remote File Include Vulnerabilities
93. Microsoft Internet Explorer ADODB.Connection Execute Denial of Service Vulnerability
94. Intelimen InteliEditor Lib.Editor.Inc.PHP Remote File Include Vulnerability
95. Der Dirigent Multiple Remote File Include Vulnerabilities
96. 2BGal Multiple Remote File Include Vulnerabilities
97. Cruiseworks Cws.exe Doc Buffer Overflow Vulnerability
98. Cruiseworks Cws.EXE Doc Directory Traversal Vulnerability
99. Sudo Python Environment Variable Handling Security Bypass Vulnerability
100. Kawf Main.PHP Remote File Include Vulnerability
III. SECURITYFOCUS NEWS
1. Researcher attempts to shed light on security troll
2. Targeted Trojan attacks on the rise
3. Google Code Search peers into programs' flaws
4. Mozilla flaws more joke than jeopardy
IV. SECURITY JOBS LIST SUMMARY
1. [SJ-JOB] Manager, Information Security, Slough, Leeds or Northampton
2. [SJ-JOB] Manager, Information Security, Slough
3. [SJ-JOB] Security Engineer, Calgary
4. [SJ-JOB] Security Engineer, Wilmington
5. [SJ-JOB] Security System Administrator, Calgary
6. [SJ-JOB] Sales Engineer, Boston
7. [SJ-JOB] Sales Engineer, Detroit
8. [SJ-JOB] Security Consultant, St.Louis
9. [SJ-JOB] Sales Engineer, New York
10. [SJ-JOB] Sales Engineer, Minneapolis
11. [SJ-JOB] Sales Engineer, Austin
12. [SJ-JOB] Security Consultant, Vienna
13. [SJ-JOB] Sales Engineer, Boulder
14. [SJ-JOB] Manager, Information Security, Baltimore
15. [SJ-JOB] Security Researcher, Atlanta
16. [SJ-JOB] Sales Engineer, New York
17. [SJ-JOB] Technical Support Engineer, Sydney
18. [SJ-JOB] Security Engineer, Philadelphia
19. [SJ-JOB] CHECK Team Leader, London
20. [SJ-JOB] Developer, Canberra
21. [SJ-JOB] Sales Representative, Cincinnati
22. [SJ-JOB] Technical Writer, Chicago
23. [SJ-JOB] Security Engineer, Chicago/Waukegan
24. [SJ-JOB] Manager, Information Security, Chicago/Waukegan
25. [SJ-JOB] Disaster Recovery Coordinator, Washington DC
26. [SJ-JOB] Security Consultant, Chicago
27. [SJ-JOB] Security Researcher, Pittsburgh
28. [SJ-JOB] Software Engineer, Pittsburgh
29. [SJ-JOB] Software Engineer, Pittsburgh
30. [SJ-JOB] Account Manager, Herndon
31. [SJ-JOB] Forensics Engineer, Pittsburgh
32. [SJ-JOB] Security Engineer, Austin
33. [SJ-JOB] VP, Information Security, London
34. [SJ-JOB] Sales Representative, Dallas
35. [SJ-JOB] Security Consultant, Richmond
36. [SJ-JOB] Principal Software Engineer, Richardson
37. [SJ-JOB] Developer, Boca Raton
38. [SJ-JOB] Sr. Security Analyst, Nashville
39. [SJ-JOB] Developer, Boca Raton
40. [SJ-JOB] Security Consultant, San Francisco or Los Angeles
41. [SJ-JOB] Security Engineer, Milpitas
42. [SJ-JOB] Manager, Information Security, Melbourne
43. [SJ-JOB] Sr. Security Engineer, Bellevue
44. [SJ-JOB] Penetration Engineer, London
45. [SJ-JOB] Forensics Engineer, London
46. [SJ-JOB] Forensics Engineer, London
47. [SJ-JOB] Forensics Engineer, London
48. [SJ-JOB] Jr. Security Analyst, Pittsburgh
49. [SJ-JOB] Jr. Security Analyst, Pittsburgh
50. [SJ-JOB] Security Engineer, Doha
V. INCIDENTS LIST SUMMARY
1. Malware/trojan attacks
2. nmap reveals trinoo_master on router
VI. VULN-DEV RESEARCH LIST SUMMARY
1. Fwd: HP Tru64 dtmail bug - Really exploitable?
2. [semi-OT] code crunching, crazy asm tricks? - code crunchers mailing list
3. Windows Command Processor CMD.EXE Buffer Overflow
VII. MICROSOFT FOCUS LIST SUMMARY
1. SecurityFocus Microsoft Newsletter #313
2. Hacker Defender v0.84-1.0.0 backdoor -wath Vulnerabiliti it uses to get in
3. Set dialup password from cmdline
VIII. SUN FOCUS LIST SUMMARY
1. Dealing with BSM Audit Logs
2. Securing Solaris 10
3. Detecting Brute-Force and Dictionary attacks
IX. LINUX FOCUS LIST SUMMARY
1. Detecting Brute-Force and Dictionary attacks
X. UNSUBSCRIBE INSTRUCTIONS
XI. SPONSOR INFORMATION

I. FRONT AND CENTER
---------------------
1. Viruses, Phishing, and Trojans For Profit
By Kelly Martin
Following the 2006 International Virus Bulletin Conference, Kelly Martin takes a look at the profit motives of the cyber criminals behind modern viruses, targeted trojans, phishing scams and botnet attacks that are stealing millions from organizations and individuals.
http://www.securityfocus.com/columnists/419


II. BUGTRAQ SUMMARY
--------------------
1. CPanel Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 20683
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20683
Summary:
cPanel is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.

An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

cPanel version 10.9.0 is vulnerable; other versions may also be affected.

2. Sun Solaris Netscape Portable Runtime API Local Privilege Escalation Vulnerability
BugTraq ID: 20471
Remote: No
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20471
Summary:
The Netscape Portable Runtime API running on Sun Solaris 10 operating system is prone to a local privilege-escalation vulnerability.

A successful exploit of this issue allows an attacker to gain superuser privileges, completely compromising the affected computer.

Version 4.6.1 running on Sun Solaris 10 is vulnerable to this issue.

3. Castor RS.PHP Remote File Include Vulnerability
BugTraq ID: 20658
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/20658
Summary:
CASTOR is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

CASTOR 1.1.1 and earlier versions are vulnerable; other versions may also be affected.

4. Simple Machines Forum Index.PHP Cross-Site Scripting Vulnerability
BugTraq ID: 20629
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/20629
Summary:
Simple Machines Forum is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Version 1.1 RC2 is reported vulnerable.

5. Open Meetings Filing Application Multiple Remote File Include Vulnerabilities
BugTraq ID: 20656
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/20656
Summary:
Open Meetings Filing Application is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.

Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

6. Sudo Perl Environment Variable Handling Security Bypass Vulnerability
BugTraq ID: 15394
Remote: No
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/15394
Summary:
Sudo is prone to a security-bypass vulnerability that could lead to arbitrary code execution. This issue is due to an error in the application when handling the 'PERLLIB', 'PERL5LIB', and 'PERL5OPT' environment variables when tainting is ignored.

An attacker can exploit this vulnerability to bypass security restrictions and include arbitrary library files.

To exploit this vulnerability, an attacker must be able to run Perl scripts through Sudo.

7. BlueShoes Framework Multiple Remote File Include Vulnerabilities
BugTraq ID: 18261
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/18261
Summary:
BlueShoes Framework is prone to multiple remote file-include vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.

An attacker can exploit these issues to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.

8. Virtual Law Office Multiple Remote File Include Vulnerabilities
BugTraq ID: 20657
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/20657
Summary:
Virtual Law Office is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.

Exploiting this may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

9. Novell eDirectory iMonitor HTTPSTK Buffer Overflow Vulnerability
BugTraq ID: 20655
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/20655
Summary:
The Novell eDirectory server iMonitor is prone to a buffer-overflow vulnerability because it fails to perform sufficient bounds checking on client-supplied data before copying it to a buffer.

An attacker could leverage this issue to have arbitrary code execute with administrative privileges. A successful exploit could result in the complete compromise of the affected system.

These versions are vulnerable:

- eDirectory 8.7.3.8 and prior
- OES SP2

10. RSSonate Multiple Remote File Include Vulnerabilities
BugTraq ID: 20654
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/20654
Summary:
RSSonate is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.

Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

11. PHP Multiple Input Validation Vulnerabilities
BugTraq ID: 19582
Remote: No
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/19582
Summary:
PHP is prone to multiple input-validation vulnerabilities. Successful exploits could allow an attacker to write files in unauthorized locations, cause a denial-of-service condition, and potentially execute code.

These issues are reported to affect PHP versions 4.4.3 and 5.1.4; other versions may also be vulnerable.

12. OneOrZero Open Source Task Management and Help Desk System Information Disclosure Vulnerability
BugTraq ID: 20651
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/20651
Summary:
OneOrZero Open Source Task Management and Help Desk System are prone to an information-disclosure vulnerability.

An attacker may exploit this issue to reset the administrative password and gain full access to the vulnerable software. This may lead to other attacks.

Versions 1.6.0 to 1.6.4 are vulnerable to this issue.

13. PHP SSCANF() Safe_Mode Restriction-Bypass Vulnerability
BugTraq ID: 19415
Remote: No
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/19415
Summary:
PHP is prone to a 'safe_mode' restriction-bypass vulnerability. Successful exploits could allow an attacker to write files in unauthorized locations and potentially execute code.

This vulnerability would be an issue in shared-hosting configurations where multiple users can create and execute arbitrary PHP script code, all assuming that the 'safe_mode' restriction will isolate the users from each other.

This issue is reported to affect PHP versions 4.4.3 and 5.1.4; other versions may also be vulnerable.

14. Web Group Communication Center Quiz.PHP SQL Injection Vulnerability
BugTraq ID: 20653
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/20653
Summary:
Web Group Communication Center is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

This issue affects version 0.5.6 and earlier; other versions may also be affected.

15. Apache mod_php Module File Descriptor Leakage Vulnerability
BugTraq ID: 9302
Remote: No
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/9302
Summary:
Reportedly, the Apache mod_php module may be prone to a vulnerability that may allow a local attacker to gain access to privileged file descriptors. As a result, the attacker may pose as a legitimate server and possibly steal or manipulate sensitive information.

16. Xerox WorkCentre / CopyCentre Multiple Vulnerabilities
BugTraq ID: 17014
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/17014
Summary:
Xerox WorkCentre / CopyCentre are prone to multiple vulnerabilities.

Exploiting these issues can allow remote attackers to trigger a denial-of-service condition in a device. Some of these issues may allow for arbitrary code execution as well, but this is unconfirmed.

These software versions are vulnerable:

- 1.001.02.073 or prior
- Versions greater than 1.001.02.074 but less than 1.001.02.715.

17. ImageMagick SGI Image File Remote Heap Buffer Overflow Vulnerability
BugTraq ID: 19507
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/19507
Summary:
ImageMagick is prone to a remote heap buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

This issue allows attackers to execute arbitrary machine code in the context of applications that use the ImageMagick library.

ImageMagick versions in the 6.x series, up to version 6.2.8, are vulnerable to this issue.

18. Clam Anti-Virus CHM Unpacker Denial Of Service Vulnerability
BugTraq ID: 20537
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/20537
Summary:
ClamAV is prone to a denial-of-service vulnerability because of an unspecified failure in the CHM unpacker.

Exploitation could cause the application to crash, resulting in a denial of service.

19. KnowledgeBank Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 20641
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/20641
Summary:
KnowledgeBank is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input data.

An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

KnowledgeBank version 1.01 is vulnerable to these issues; other versions may also be affected.

20. OpenSSH-Portable GSSAPI Authentication Abort Information Disclosure Weakness
BugTraq ID: 20245
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/20245
Summary:
OpenSSH-Portable is prone to an information-disclosure weakness. The issue stems from a GSSAPI authentication abort.

Reportedly, attackers may leverage a GSSAPI authentication abort to determine the presence and validity of usernames on unspecified platforms.

This issue occurs when OpenSSH-Portable is configured to accept GSSAPI authentication.

OpenSSH-Portable 4.3p1 and prior versions exhibit this weakness.

21. HP DTMail Attachment Argument Buffer Overflow Vulnerability
BugTraq ID: 20580
Remote: No
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/20580
Summary:
A buffer-overflow vulnerability occurs in dtmail when processing an overly long argument to the application's '-a' option. The problem occurs because the application fails to perform sufficient boundary checks when copying a filename argument into an internal memory buffer.

An attacker may exploit this buffer overflow to execute arbitrary code. In the case where an application has the 'setgid' bit turned on, a compromise in the context of a member of the group 'mail' is possible.

This vulnerability resides in dtmail version 5.1b; other versions might also be affected.

22. Mambo Multiple Input Validation Vulnerabilities
BugTraq ID: 20650
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/20650
Summary:
Mambo is prone to multiple input-validation vulnerabilities, including a cross-site scripting and an SQL-injection issue, because the application fails to properly sanitize user-supplied input.

A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.

23. Maarch View Documents Information Disclosure Vulnerability
BugTraq ID: 20647
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/20647
Summary:
Maarch is prone to an information-disclosure vulnerability.

An attacker can exploit this issue to retrieve potentially sensitive information; this may lead to other attacks.

Versions prior to 2.0.1 are vulnerable to this issue.

24. Yahoo! Messenger Service 18 Remote Buffer Overflow Vulnerability
BugTraq ID: 20625
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/20625
Summary:
Yahoo! Messenger is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer.

This vulnerability allows remote attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely crash the server, denying further service to legitimate users.

Yahoo! Messenger 8 with Voice is vulnerable.

25. PHP Poll Creator Poll_Vote.PHP Remote File Include Vulnerability
BugTraq ID: 13760
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/13760
Summary:
PHP Poll Creator is affected by a remote file-include vulnerability because the application fails to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.

UPDATE: Further information shows that this issue does not affect version 1.04.

26. Delta Scripts PHP Classifieds Functions.PHP Remote File Include Vulnerability
BugTraq ID: 20649
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/20649
Summary:
Delta Scripts PHP Classifieds is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

Version 7.1 is vulnerable; other versions may also be affected.

27. WikiNi Multiple HTML-Injection Vulnerabilities
BugTraq ID: 20688
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20688
Summary:
WikiNi is prone to multiple HTML-injection vulnerabilities because it fails to sufficiently sanitize user-supplied input data before using it in dynamically generated content.

An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may allow an attacker to steal cookie-based authentication credentials, control how the site is rendered, and launch other attacks.

WikiNi versions prior to 0.4.4 are vulnerable.

28. Retired: Trawler Multiple Remote File Include Vulnerabilities
BugTraq ID: 20678
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20678
Summary:
Trawler is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.

Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

Trawler 1.8.1 and prior versions are vulnerable to this issue; other versions may also be affected.

Note: Since the issues discussed in this BID are a duplicate of those in BID 20662 (Trawler Web CMS Multiple Remote File Include Vulnerabilities), this BID is being retired.

29. MDWeb Multiple Remote File Include Vulnerabilities
BugTraq ID: 20687
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20687
Summary:
MDweb is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.

This may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

This issue affects version 1.3; earlier versions may also be vulnerable.

30. QK SMTP Remote Buffer Overflow Vulnerability
BugTraq ID: 20681
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20681
Summary:
QK SMTP is prone to a remote buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.

An attacker can exploit this issue to execute arbitrary code in the context of the affected application. This may facilitate a remote-compromise of affected computers. Failed exploit attempts will likely crash the server, effectively denying service to legitimate users.

QK SMTP 3.01 and prior versions are vulnerable to this issue.

31. RETIRED: Microsoft Windows CMD.EXE Buffer Overflow Vulnerability
BugTraq ID: 20652
Remote: No
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20652
Summary:
Microsoft Windows is prone to a buffer-overflow vulnerability because the software fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.

An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Arbitrary code execution may be possible, but this has not been confirmed.

This issue affects Microsoft Windows XP SP2.

Note: Further analysis reveals that this is not a vulnerability; this BID is now retired.

32. Shop-Script Multiple HTTP Response Splitting Vulnerabilities
BugTraq ID: 20685
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20685
Summary:
Shop-Script is prone to multiple HTTP response-splitting vulnerabilities because the application fails to properly sanitize user-supplied input.

A remote attacker may exploit this vulnerability to influence or misrepresent how web content is served, cached, or interpreted. This could aid in various attacks that attempt to entice client users into a false sense of trust.

33. Linux Kernel UDF Denial of Service Vulnerability
BugTraq ID: 19562
Remote: No
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/19562
Summary:
The Linux kernel UDF file module is prone to a denial-of-service vulnerability.

An attacker can exploit this issue to crash the kernel, denying further service to legitimate users.

34. Python Repr() Function Remote Code Execution Vulnerability
BugTraq ID: 20376
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20376
Summary:
Python is prone to a remote code-execution vulnerability because the application fails to properly handle UTF-32/UCS-4 strings.

Exploiting this issue allows remote attackers to execute arbitrary machine code with the privileges of the Python application.

35. WebAPP Apage.CGI Remote Command Execution Vulnerability
BugTraq ID: 13637
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/13637
Summary:
WebAPP is prone to a remote command-execution vulnerability because it fails to properly sanitize user-supplied input.

36. Microsoft PowerPoint Remote Unspecified Code Execution Vulnerability
BugTraq ID: 20495
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20495
Summary:
Microsoft PowerPoint is prone to an unspecified remote code-execution vulnerability.

Successfully exploiting this issue allows a remote attacker to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely crash the application.

Due to a lack of information, further details cannot be provided. This BID will be updated when more information becomes available.

37. Symantec AntiVirus SAVRT.SYS Local Privilege Escalation Vulnerability
BugTraq ID: 20684
Remote: No
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20684
Summary:
Symantec AntiVirus and Symantec Client Security are prone to a privilege-escalation vulnerability.

Local attackers can exploit this issue to corrupt memory and execute arbitrary code with kernel-level privileges. Successful exploits may facilitate a complete system compromise.

This issue affects:

- Symantec AntiVirus Corporate Edition
- Symantec Client Security.

38. Oracle October 2006 Security Update Multiple Vulnerabilities
BugTraq ID: 20588
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20588
Summary:
Multiple vulnerabilities affect various Oracle applications, including:

Oracle Database
Oracle Application Server
Oracle Application Express
Oracle Collaboration Suite
Oracle E-Business Suite
Oracle Pharmaceutical Applications
Oracle PeopleSoft Enterprise PeopleTools and Portal Solutions
JD Edwards EnterpriseOne
JD Edwards OneWorld Tools

Oracle has released a Critical Patch Update advisory for October 2006 to address these vulnerabilities for supported releases. Earlier unsupported releases are likely to be affected by these issues as well.

The Oracle advisory details 101 vulnerabilities in all. This BID will be updated as further analysis of the individual issues reveals more detailed information.

39. JaxUltraBB Delete.PHP HTML Injection Vulnerability
BugTraq ID: 20679
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20679
Summary:
JaxUltraBB is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

JaxUltraBB 2.0 and prior versions are vulnerable; other versions may also be affected.

40. OpenVMPS Logging Function Format String Vulnerability
BugTraq ID: 15072
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/15072
Summary:
OpenVMPS is affected by a remote format-string vulnerability. The application fails to properly sanitize user-supplied input before using it as the format specifier in a system-log entry.

Remote attackers may exploit this issue to execute arbitrary machine code in the context of the affected service.

41. GTetrinet Index Out of Bounds Unspecified Remote Code Execution Vulnerability
BugTraq ID: 19766
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/19766
Summary:
GTetrinet is prone to an unspecified remote vulnerability. This issue is reportedly due to multiple out-of-bounds index-access flaws.

A remote attacker may exploit this issue to execute arbitrary machine code on the affected computer with the privileges of the user running the vulnerable application.

Very little information is currently available on this vulnerability. This BID will be updated as more information becomes available.

42. Apache Mod_TCL Remote Format String Vulnerability
BugTraq ID: 20527
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20527
Summary:
Apache mod_tcl is prone to a remote format-string vulnerability because the application fails to properly sanitize user-supplied input before including it in the format-specifier argument of a formatted-printing function.

Successfully exploiting this issue allows remote attackers to execute arbitrary machine code in the context of webserver processes running the affected Apache module. This facilitates the remote compromise of affected computers.

Apache mod_tcl version 1.0 is vulnerable to this issue.

43. RMSOFT Gallery System Images.PHP Cross-Site Scripting Vulnerability
BugTraq ID: 20676
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20676
Summary:
RMSOFT Gallery System is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

RMSOFT Gallery System version 2.0 is vulnerable; earlier versions may also be affected.

44. Cheese Tracker XM Loader Buffer Overflow Vulnerability
BugTraq ID: 19115
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/19115
Summary:
Cheese Tracker is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input data before copying it to an insufficiently sized memory buffer.

An attacker may cause malicious code to execute by supplying a malicious XM file. This may facilitate unauthorized remote access with the privileges of the user running the vulnerable application.

45. OpenSSL SSL_Get_Shared_Ciphers Buffer Overflow Vulnerability
BugTraq ID: 20249
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20249
Summary:
OpenSSL is prone to a buffer-overflow vulnerability because the library fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

Successfully exploiting this issue may result in the execution of arbitrary machine code in the context of applications that use the affected library. Failed exploit attempts may crash applications, denying service to legitimate users.

46. Apple Mac OS X BlueTooth Directory Traversal Vulnerability
BugTraq ID: 13491
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/13491
Summary:
Apple Mac OS X is prone to a directory-traversal vulnerability. Since the software fails to sufficiently sanitize input, a remote attacker could use the Bluetooth file- and object-exchange services to access files outside the default file-exchange directory.

This issue was initially reported in BID 13480 (Apple Mac OS X Multiple Vulnerabilities). Due to the availability of more information, this issue is being assigned a new BID.

47. OpenSSL ASN.1 Structures Denial of Service Vulnerability
BugTraq ID: 20248
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20248
Summary:
OpenSSL is prone to a denial-of-service vulnerability.

An attacker may exploit this issue to cause applications that use the vulnerable library to consume excessive CPU and memory resources and crash, denying further service to legitimate users.

48. OpenSSL Public Key Processing Denial of Service Vulnerability
BugTraq ID: 20247
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20247
Summary:
OpenSSL is prone to a denial-of-service vulnerability because it fails to validate the lengths of public keys being used.

An attacker can exploit this issue to crash an affected server using OpenSSL.

49. OpenSSL SSLv2 Null Pointer Dereference Client Denial of Service Vulnerability
BugTraq ID: 20246
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20246
Summary:
OpenSSL is prone to a denial-of-service vulnerability.

A malicious server could cause a vulnerable client application to crash, effectively denying service.

50. Clam Anti-Virus PE Rebuilding Heap Buffer Overflow Vulnerability
BugTraq ID: 20535
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20535
Summary:
ClamAV is prone to a heap-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer.

Exploiting this issue could allow attacker-supplied machine code to execute in the context of the affected application. The issue would occur when the malformed file is scanned manually or automatically in deployments such as email gateways.

ClamAV version 0.88.4 is vulnerable to this issue.

51. CAPI4Hylafax Remote Arbitrary Command Execution Vulnerability
BugTraq ID: 19801
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/19801
Summary:
CAP4Hylafax is prone to an arbitrary command-execution vulnerability.

An attacker can exploit this vulnerability to execute arbitrary commands in the context of the affected application.

52. Mozilla Firefox JavaScript Handler Race Condition Memory Corruption Vulnerability
BugTraq ID: 19488
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/19488
Summary:
Mozilla Firefox is prone to a remote memory-corruption vulnerability. This issue is due to a race condition that may result in double-free or other memory-corruption issues.

Attackers may likely exploit this issue to execute arbitrary machine code in the context of the vulnerable application, but this has not been confirmed. Failed exploit attempts will likely crash the application.

Mozilla Firefox is vulnerable to this issue. Due to code reuse, other Mozilla products are also likely affected.

53. SAPHPLesson Multiple SQL Injection Vulnerabilities
BugTraq ID: 18501
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/18501
Summary:
The saphplesson module is prone to multiple SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries.

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

54. Learn.com Learncenter.ASP Cross-Site Scripting Vulnerability
BugTraq ID: 19781
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/19781
Summary:
Learn.com learncenter is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

55. PHP ZendEngine ECalloc Integer Overflow Vulnerability
BugTraq ID: 20349
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20349
Summary:
PHP is prone to an integer-overflow vulnerability because the application fails to do proper bounds checking on user-supplied data.

An attacker can exploit this vulnerability to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely cause denial-of-service conditions.

56. SchoolAlumni Portal Multiple Input Validation Vulnerabilities
BugTraq ID: 20673
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20673
Summary:
SchoolAlumni portal is prone to multiple input-validation vulnerabilities because the application fails to sufficiently sanitize user-supplied input. These issues include a local file-include vulnerability and a cross-site scripting vulnerability.

A successful exploit may allow an attacker to compromise the application, access sensitive information, execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, and launch other attacks.

Version 2.26 is vulnerable to this issue; other versions may also be affected.

57. PHP-Nuke Encyclopedia Module SQL Injection Vulnerability
BugTraq ID: 20674
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20674
Summary:
PHP-Nuke is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

This issue affects version 7.9 and earlier.

58. Smarty Smarty.Class.PHP Remote File Include Vulnerability
BugTraq ID: 20557
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20557
Summary:
Smarty is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input.

An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.

Version 2.6.9 is affected.

59. Multiple X.Org Products SetUID Local Privilege Escalation Vulnerability
BugTraq ID: 19742
Remote: No
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/19742
Summary:
Multiple X.org products are prone to a local privilege-escalation vulnerability.

A local attacker can exploit this issue to gain superuser privileges. A successful exploit would lead to the complete compromise of the affected computer.

60. Cisco VPN 3000 Concentrator FTP Arbitrary File Access Vulnerability
BugTraq ID: 19680
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/19680
Summary:
The Cisco VPN 3000 series concentrators are prone to an arbitrary file-access vulnerability.

An attacker can exploit this issue to rename and delete arbitrary files on the affected device in the context of the FTP server process. This may facilitate further attacks.

61. PHPAdsNew and PHPPGAds Multiple Input Validation Vulnerabilities
BugTraq ID: 17251
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/17251
Summary:
phpAdsNew and phpPgAds are prone to multiple input-validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.

An attacker can exploit these issues to execute arbitrary HTML and script code in the browser of a victim user in the context of the affected website. This may allow the attacker to steal cookie-based authentication credentials, to control how the site is rendered to the user, and to launch other attacks.

62. Vitrax Premodded Functions_Portal.PHP Remote File Include Vulnerability
BugTraq ID: 19979
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/19979
Summary:
Vitrax Premodded is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input.

An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.

63. ClanLite Config-PHP.PHP Remote File Include Vulnerability
BugTraq ID: 20672
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20672
Summary:
ClanLite is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

64. Trolltech QT Pixmap Images Integer Overflow Vulnerability
BugTraq ID: 20599
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20599
Summary:
Qt is prone to an integer-overflow vulnerability because the library fails to do proper bounds checking on user-supplied data.

An attacker can exploit this vulnerability to execute arbitrary code in the context of the application using the vulnerable library. Failed exploit attempts will likely cause denial-of-service conditions.

65. Wireshark Multiple Vulnerabilities
BugTraq ID: 19690
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/19690
Summary:
Wireshark is prone to multiple vulnerabilities:

- Multiple denial-of-service vulnerabilities.
- Multiple off-by-one vulnerabilities.

These may permit attackers to execute arbitrary code, which can facilitate a compromise of an affected computer or cause a denial-of-service condition to legitimate users of the application.

66. HP-UX Software Distributor Lang Environment Variable Local Buffer Overrun Vulnerability
BugTraq ID: 8986
Remote: No
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/8986
Summary:
HP has reported that some Software Distributor (SD) utilities are prone to locally exploitable buffer overrun vulnerability. Affected utilities include swinstall(1M) and swverify(1M).

67. GeoNetwork Opensource Login SQL Injection Vulnerability
BugTraq ID: 20671
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20671
Summary:
GeoNetwork opensource is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

This issue affects version 2.0.2 and earlier.

68. AROUNDMe P_New_Password.TPL.PHP Remote File Include Vulnerability
BugTraq ID: 20553
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20553
Summary:
AROUNDMe is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue could allow an attacker to compromise the application and the underlying system; other attacks are also possible.

This issue affects version 0.5.2 and earlier.

69. EZ-Ticket Common.PHP Remote File Include Vulnerability
BugTraq ID: 20669
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20669
Summary:
EZ-Ticket is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

EZ-Ticket 0.0.1 is vulnerable; other versions may also be affected.

70. PGOSD Function.PHP3 Remote File Include Vulnerability
BugTraq ID: 20668
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20668
Summary:
PGOSD is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

71. RETIRED PHP Generator Of Object SQL Database Function.PHP3 Remote File Include Vulnerability
BugTraq ID: 20677
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20677
Summary:
PHP Generator of Object SQL Database is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

UPDATE: This BID is being retired because it contains information already available in a previous BID.

72. X.Org LibXfont CID Font File Multiple Integer Overflow Vulnerabilities
BugTraq ID: 19974
Remote: No
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/19974
Summary:
The libXfont library is prone to multiple integer-overflow vulnerabilities.

Attackers can exploit this issue to execute arbitrary code with superuser privileges. A successful exploit will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial of service.

73. Perl Perl_sv_vcatpvfn Format String Integer Wrap Vulnerability
BugTraq ID: 15629
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/15629
Summary:
Perl is susceptible to a format-string vulnerability. This issue is due to the programming language's failure to properly handle format specifiers in formatted-printing functions.

An attacker may leverage this issue to write to arbitrary process memory, facilitating code execution in the context of the Perl interpreter process. This can result in unauthorized remote access.

Developers should treat the formatted printing functions in Perl as equivalently vulnerable to exploitation as the C library versions, and should properly sanitize all data passed in the format-specifier argument.

All applications that use formatted-printing functions in an unsafe manner should be considered exploitable.

74. Webmin/Usermin Unspecifed Information Disclosure Vulnerability
BugTraq ID: 18744
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/18744
Summary:
Webmin and Usermin are prone to an unspecified information-disclosure vulnerability. This issue is due to a failure in the applications to properly sanitize user-supplied input.

An attacker can exploit this issue to retrieve potentially sensitive information.

This issue affects Webmin versions prior to 1.290 and Usermin versions prior to 1.220.

Unconfirmed reports suggest that this issue is the same as the one discussed in BID 18613 (Webmin Remote Directory Traversal Vulnerability). However, the fixes associated with that issue did not completely solve the vulnerability.

75. Webmin and Usermin HTML Injection and Information Disclosure Vulnerability
BugTraq ID: 19820
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/19820
Summary:
Webmin and Usermin are prone to an HTML-injection issue and an information-disclosure issue.

Attacker-supplied HTML and script code would execute in the context of the affected website, potentially allowing an attacker to steal cookie-based authentication credentials and to control how the site is rendered to the user and gain sensitive information.

Usermin versions prior to 1.226 and Webmin versions prior to 1.296 are vulnerable to this issue.

76. Novell eDirectory EvtFilteredMonitorEventsRequest Multiple Vulnerabilities
BugTraq ID: 20663
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20663
Summary:
The Novell eDirectory server is prone to buffer-overflow and invalid-free vulnerabilities because it fails to perform sufficient bounds checking on client-supplied data before copying it to a buffer or referencing a value outside of an array.

An attacker could leverage these issues to have arbitrary code execute with administrative privileges. A successful exploit could result in a denial of service or code execution, possibly leading to the complete compromise of the affected system.

eDirectory 8.8/8.8.1 are vulnerable to these issues; prior versions may be affected as well.

77. Mambo MambWeather Module Savant2_Plugin_Options.PHP Remote File Include Vulnerability
BugTraq ID: 20667
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20667
Summary:
The Mambo MambWeather module is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input.

An attacker can exploit this issue to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and to gain access to the underlying system.

This issue affects version 1.8.1 and earlier.

78. Net_DNS RR.PHP Remote File Include Vulnerability
BugTraq ID: 20666
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20666
Summary:
Net_DNS is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

This issue affects Net_DNS 0.3 and prior versions.

79. PH Pexplorer Language Local File Include Vulnerability
BugTraq ID: 20665
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20665
Summary:
PH Pexplorer is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input.

A remote attacker can exploit this vulnerability by uploading a malicious file and executing it in the context of the vulnerable application. Other attacks may also be possible.

This issue affects version 0.24; other versions may also be vulnerable.

80. Novell eDirectory NCP Packet Processing Remote Heap Overflow Vulnerability
BugTraq ID: 20664
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20664
Summary:
The Novell eDirectory server is prone to a heap-overflow vulnerability because it fails to perform sufficient bounds checking on client-supplied data before copying it to a buffer.

An attacker could leverage this issue to have arbitrary code execute with administrative privileges. A successful exploit could result in the complete compromise of the affected system.

eDirectory versions 8.8.1 and 8.8 were reported vulnerable; other versions may be vulnerable as well.

81. Trawler Web CMS Multiple Remote File Include Vulnerabilities
BugTraq ID: 20662
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20662
Summary:
Trawler web CMS is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

These issues affect version 1.8.1 and prior; other versions may also be affected.

82. Hosting Controller Multiple SQL Injection Vulnerabilities
BugTraq ID: 20661
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20661
Summary:
Hosting Controller is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

Hosting Controller 6.1 Hotfix 3.2 and prior versions are vulnerable; other versions may also be affected.

83. SimpNews Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 20714
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20714
Summary:
SimpNews is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input data.

An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

SimpNews versions prior to 2.34.01 are vulnerable.

84. FreeBSD Crypto Local Denial of Service Vulnerability
BugTraq ID: 20713
Remote: No
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20713
Summary:
FreeBSD is prone to a local denial-of-service vulnerability because it fails to handle exceptional conditions.

An attacker may leverage this issue to crash the affected computer, denying service to legitimate users. Under certain conditions, successful exploits may also corrupt the filesystem.

FreeBSD version 6.1 is vulnerable to this issue; other versions may also be affected. The reporter of this issue states that OpenBSD may also be affected.

85. Snitz Forums 2000 Pop_Mail.ASP SQL Injection Vulnerability
BugTraq ID: 20712
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20712
Summary:
Snitz Forums 2000 is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

Version 3.4.06 is vulnerable to this issue; other versions may also be affected.

86. Crafty Syntax Live Help Multiple Remote File Include Vulnerabilities
BugTraq ID: 20711
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20711
Summary:
Crafty Syntax Live Help is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.

This may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

Note that these issues only affect the version of Crafty Syntax Live Help which includes the Text Based Database Support package (Txt-db-api).

Version 2.9.9 is vulnerable; other versions may also be affected.

87. Ascended Guestbook Embedded.PHP Remote File Include Vulnerability
BugTraq ID: 20710
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20710
Summary:
Ascended Guestbook is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input.

An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.

Version 1.0.0 and prior are vulnerable to this issue.

88. RevilloC MailServer Remote SMTP Buffer Overflow Vulnerability
BugTraq ID: 20709
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20709
Summary:
RevilloC MailServer is prone to a remote buffer-overflow vulnerability. This issue is due to a failure of the application to properly bounds check user-supplied input prior to copying it to an insufficiently-sized memory buffer.

Successfully exploiting this issue likely allows remote attackers to execute arbitrary machine code with elevated privileges, facilitating the complete remote compromise of affected computers. Failed exploit attempts result in application crashes.

Specific version information is not currently available, this BID will be updated as more information is disclosed.

89. Sun Java System/iPlanet Messaging Server Webmail JavaScript Injection Vulnerability
BugTraq ID: 20708
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20708
Summary:
Sun Java Messaging Server and iPlanet Messaging Server are prone to a vulnerability that may permit the execution of arbitrary attacker-supplied JavaScript. This issue exists in the Webmail facility and may be exploited by injecting hostile script code through emails. When such an email is read by a user of the Webmail system, attacker-supplied JavaScript could be rendered in their browser.

90. GraphicsMagick PALM DCM Buffer Overflow Vulnerabilities
BugTraq ID: 20707
Remote: No
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20707
Summary:
GraphicsMagick is prone to multiple buffer overflow vulnerabilities because it fails to perform adequate bounds checking on user-supplied data before copying it to insufficiently sized buffers.

Successful exploits may allow an attacker to execute arbitrary machine code to compromise affected computer or to cause denial-of-service conditions.

GraphicsMagick version 1.1.7 and prior are vulnerable.

91. HP-UX SWPackage Local Buffer Overflow Vulnerability
BugTraq ID: 20706
Remote: No
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20706
Summary:
HP-UX is prone to a local buffer-overflow vulnerability because it fails to properly bound-check user-supplied input before copying it into an insufficiently sized buffer.

An attacker can exploit this issue to execute arbitrary code with superuser privileges, completely compromising affected computers.

92. CMS Faethon Mainpath Parameter Multiple Remote File Include Vulnerabilities
BugTraq ID: 20705
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20705
Summary:
CMS Faethon is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.

Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

Versions 2.0 and prior are vulnerable to these issues.

93. Microsoft Internet Explorer ADODB.Connection Execute Denial of Service Vulnerability
BugTraq ID: 20704
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20704
Summary:
Microsoft Internet Explorer is prone to a denial-of-service condition when processing a specific method from the 'ADODB.Connection.2.7' instantiated ActiveX Object.

Successful exploits may allow attackers to crash the application, denying further service to users.

94. Intelimen InteliEditor Lib.Editor.Inc.PHP Remote File Include Vulnerability
BugTraq ID: 20703
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20703
Summary:
Intelimen InteliEditor is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

Version 1.2.2.1 is vulnerable; other versions may also be affected.

95. Der Dirigent Multiple Remote File Include Vulnerabilities
BugTraq ID: 20702
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20702
Summary:
Der Dirigent is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.

Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

96. 2BGal Multiple Remote File Include Vulnerabilities
BugTraq ID: 20701
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20701
Summary:
2BGal is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input.

A successful exploit of these issues allows an attacker to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.

2BGal version 3.0 is reported to be vulnerable; other versions may also be affected.

97. Cruiseworks Cws.exe Doc Buffer Overflow Vulnerability
BugTraq ID: 20699
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20699
Summary:
Cruiseworks is prone to a remote buffer-overflow vulnerability.

Specifically, the application fails to validate input passed to the 'doc' parameter of the '/scripts/cruise/cms.exe' application.

Cruiseworks version 1.09c and 1.09d are reported vulnerable; other versions may be affected as well.

98. Cruiseworks Cws.EXE Doc Directory Traversal Vulnerability
BugTraq ID: 20698
Remote: Yes
Last Updated: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20698
Summary:
Cruiseworks is prone to a directory-traversal vulnerability because the application fails to properly sanitize user-supplied input.

An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid attackers in further attacks.

Cruiseworks versions 1.09c and 1.09d are reported vulnerable; other versions may be affected as well.

99. Sudo Python Environment Variable Handling Security Bypass Vulnerability
BugTraq ID: 16184
Remote: No
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/16184
Summary:
Sudo is prone to a security-bypass vulnerability that could lead to arbitrary code execution. This issue is due to an error in the application when handling environment variables.

A local attacker with the ability to run Python scripts can exploit this vulnerability to gain access to an interactive Python prompt. That attacker may then execute arbitrary code with elevated privileges, facilitating the complete compromise of affected computers.

An attacker must have the ability to run Python scripts through Sudo to exploit this vulnerability.

This issue is similar to BID 15394 (Sudo Perl Environment Variable Handling Security Bypass Vulnerability).

100. Kawf Main.PHP Remote File Include Vulnerability
BugTraq ID: 20659
Remote: Yes
Last Updated: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/20659
Summary:
Kawf is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

Version 1.0 is vulnerable; other versions may also be affected.

III. SECURITYFOCUS NEWS ARTICLES
--------------------------------
1. Researcher attempts to shed light on security troll
By: Robert Lemos
A security consultant claims to have identified a group of people that taunted researchers and hackers on the Full Disclosure mailing list, arguing that the group is linked to the retired hacker known as Gobbles.
http://www.securityfocus.com/news/11419

2. Targeted Trojan attacks on the rise
By: Robert Lemos
Attacks crafted to escape detection by antivirus software are increasingly being used to gain entrance into corporate networks.
http://www.securityfocus.com/news/11418

3. Google Code Search peers into programs' flaws
By: Robert Lemos
Security professionals warn coders that they need to be aware that their open-source repositories are now searchable, allowing attackers to target programs that are likely to be flawed.
http://www.securityfocus.com/news/11417

4. Mozilla flaws more joke than jeopardy
By: Robert Lemos
Two ToorCon presenters razz the open-source browser group for an alleged flawed implementation of Javascript, but the lecture appears to be more stand-up comedy than substantiative research.
http://www.securityfocus.com/news/11416

IV. SECURITY JOBS LIST SUMMARY
-------------------------------
1. [SJ-JOB] Manager, Information Security, Slough, Leeds or Northampton
http://www.securityfocus.com/archive/77/449590

2. [SJ-JOB] Manager, Information Security, Slough
http://www.securityfocus.com/archive/77/449589

3. [SJ-JOB] Security Engineer, Calgary
http://www.securityfocus.com/archive/77/449591

4. [SJ-JOB] Security Engineer, Wilmington
http://www.securityfocus.com/archive/77/449594

5. [SJ-JOB] Security System Administrator, Calgary
http://www.securityfocus.com/archive/77/449604

6. [SJ-JOB] Sales Engineer, Boston
http://www.securityfocus.com/archive/77/449595

7. [SJ-JOB] Sales Engineer, Detroit
http://www.securityfocus.com/archive/77/449597

8. [SJ-JOB] Security Consultant, St.Louis
http://www.securityfocus.com/archive/77/449602

9. [SJ-JOB] Sales Engineer, New York
http://www.securityfocus.com/archive/77/449559

10. [SJ-JOB] Sales Engineer, Minneapolis
http://www.securityfocus.com/archive/77/449557

11. [SJ-JOB] Sales Engineer, Austin
http://www.securityfocus.com/archive/77/449558

12. [SJ-JOB] Security Consultant, Vienna
http://www.securityfocus.com/archive/77/449560

13. [SJ-JOB] Sales Engineer, Boulder
http://www.securityfocus.com/archive/77/449556

14. [SJ-JOB] Manager, Information Security, Baltimore
http://www.securityfocus.com/archive/77/449479

15. [SJ-JOB] Security Researcher, Atlanta
http://www.securityfocus.com/archive/77/449515

16. [SJ-JOB] Sales Engineer, New York
http://www.securityfocus.com/archive/77/449516

17. [SJ-JOB] Technical Support Engineer, Sydney
http://www.securityfocus.com/archive/77/449449

18. [SJ-JOB] Security Engineer, Philadelphia
http://www.securityfocus.com/archive/77/449448

19. [SJ-JOB] CHECK Team Leader, London
http://www.securityfocus.com/archive/77/449450

20. [SJ-JOB] Developer, Canberra
http://www.securityfocus.com/archive/77/449345

21. [SJ-JOB] Sales Representative, Cincinnati
http://www.securityfocus.com/archive/77/449324

22. [SJ-JOB] Technical Writer, Chicago
http://www.securityfocus.com/archive/77/449325

23. [SJ-JOB] Security Engineer, Chicago/Waukegan
http://www.securityfocus.com/archive/77/449326

24. [SJ-JOB] Manager, Information Security, Chicago/Waukegan
http://www.securityfocus.com/archive/77/449327

25. [SJ-JOB] Disaster Recovery Coordinator, Washington DC
http://www.securityfocus.com/archive/77/449328

26. [SJ-JOB] Security Consultant, Chicago
http://www.securityfocus.com/archive/77/449288

27. [SJ-JOB] Security Researcher, Pittsburgh
http://www.securityfocus.com/archive/77/449302

28. [SJ-JOB] Software Engineer, Pittsburgh
http://www.securityfocus.com/archive/77/449285

29. [SJ-JOB] Software Engineer, Pittsburgh
http://www.securityfocus.com/archive/77/449286

30. [SJ-JOB] Account Manager, Herndon
http://www.securityfocus.com/archive/77/449287

31. [SJ-JOB] Forensics Engineer, Pittsburgh
http://www.securityfocus.com/archive/77/449284

32. [SJ-JOB] Security Engineer, Austin
http://www.securityfocus.com/archive/77/449251

33. [SJ-JOB] VP, Information Security, London
http://www.securityfocus.com/archive/77/449253

34. [SJ-JOB] Sales Representative, Dallas
http://www.securityfocus.com/archive/77/449204

35. [SJ-JOB] Security Consultant, Richmond
http://www.securityfocus.com/archive/77/449250

36. [SJ-JOB] Principal Software Engineer, Richardson
http://www.securityfocus.com/archive/77/449252

37. [SJ-JOB] Developer, Boca Raton
http://www.securityfocus.com/archive/77/449175

38. [SJ-JOB] Sr. Security Analyst, Nashville
http://www.securityfocus.com/archive/77/449192

39. [SJ-JOB] Developer, Boca Raton
http://www.securityfocus.com/archive/77/449195

40. [SJ-JOB] Security Consultant, San Francisco or Los Angeles
http://www.securityfocus.com/archive/77/449172

41. [SJ-JOB] Security Engineer, Milpitas
http://www.securityfocus.com/archive/77/449174

42. [SJ-JOB] Manager, Information Security, Melbourne
http://www.securityfocus.com/archive/77/449193

43. [SJ-JOB] Sr. Security Engineer, Bellevue
http://www.securityfocus.com/archive/77/449165

44. [SJ-JOB] Penetration Engineer, London
http://www.securityfocus.com/archive/77/449166

45. [SJ-JOB] Forensics Engineer, London
http://www.securityfocus.com/archive/77/449085

46. [SJ-JOB] Forensics Engineer, London
http://www.securityfocus.com/archive/77/449067

47. [SJ-JOB] Forensics Engineer, London
http://www.securityfocus.com/archive/77/449068

48. [SJ-JOB] Jr. Security Analyst, Pittsburgh
http://www.securityfocus.com/archive/77/449069

49. [SJ-JOB] Jr. Security Analyst, Pittsburgh
http://www.securityfocus.com/archive/77/449070

50. [SJ-JOB] Security Engineer, Doha
http://www.securityfocus.com/archive/77/449072

V. INCIDENTS LIST SUMMARY
---------------------------
1. Malware/trojan attacks
http://www.securityfocus.com/archive/75/449563

2. nmap reveals trinoo_master on router
http://www.securityfocus.com/archive/75/449083

VI. VULN-DEV RESEARCH LIST SUMMARY
-----------------------------------
1. Fwd: HP Tru64 dtmail bug - Really exploitable?
http://www.securityfocus.com/archive/82/449433

2. [semi-OT] code crunching, crazy asm tricks? - code crunchers mailing list
http://www.securityfocus.com/archive/82/449300

3. Windows Command Processor CMD.EXE Buffer Overflow
http://www.securityfocus.com/archive/82/449266

VII. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. SecurityFocus Microsoft Newsletter #313
http://www.securityfocus.com/archive/88/449080

2. Hacker Defender v0.84-1.0.0 backdoor -wath Vulnerabiliti it uses to get in
http://www.securityfocus.com/archive/88/448826

3. Set dialup password from cmdline
http://www.securityfocus.com/archive/88/448518

VIII. SUN FOCUS LIST SUMMARY
----------------------------
1. Dealing with BSM Audit Logs
http://www.securityfocus.com/archive/92/449244

2. Securing Solaris 10
http://www.securityfocus.com/archive/92/449115

3. Detecting Brute-Force and Dictionary attacks
http://www.securityfocus.com/archive/92/449109

IX. LINUX FOCUS LIST SUMMARY
----------------------------
1. Detecting Brute-Force and Dictionary attacks
http://www.securityfocus.com/archive/91/449157

X. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to sf-news-unsubscribe@securityfocus.com from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email listadmin@securityfocus.com and ask to be manually removed.

XI. SPONSOR INFORMATION
------------------------
This Issue is Sponsored by: Lancope

"Revolutionize the way you view your network security"
How do you protect what you can't see? Stop protecting while blind. Gain network visibility now. Learn how Cisco NetFlow gives visibility and enables cost-effective security across distributed enterprise networks. StealthWatch, the veteran Network Behavior Analysis (NBA) and Response solution, leverages Cisco NetFlow to provide scalable, internal network security.
ALERT: Download FREE White Paper "Network Behavior Analysis (NBA) in the Enterprise."

http://www.lancope.com/resource/

No comments:

Blog Archive